09-12-2016 10:39 AM - edited 03-12-2019 01:15 AM
Hi All
Currently I'm trying to establish site to site vpn connection between my two asa (9.1). I tried to run site to site vpn wizard and upon setup completed I do not see any active VPN session on monitoring windows.. I do not see any session on my both Cisco ASA. Attached is the screenshot of my ASA ASDM.
Below are the detail of my ASA detail:
ASA 1
Ouside interface: 50.235.136.XXX
Inside Interface: 192.168.2.3
Local network which i want to allow to connect
Local Network: 192.168.1.0 / 255.255.255.0
Remote Network which i want to connect
Remote Network: 10.0.0.0 / 255.0.0.0
ASA 2
Ouside interface: 208.97.252.XXX
inside interface: 10.5.0.3
Local network which i want to allow to connect
Local Network: 10.0.0.0 / 255.0.0.0
Remote Network which i want to connect
Remote Network: 192.168.1.0 / 255.255.255.0
############################################################################
Basically my network being layout as below
Core switch (L3) for office 1 (Cisco ASA1) :
VLAN 100 :192.168.1.0 / 255.255.255.0 (DHCP)
VLAN 101 : 192.168.2.0 /255.255.255.0 (Static)
Cisco ASA1 connected to Core switch on VLAN 101
Core switch (L3) for office 2 (Cisco ASA 2) :
VLAN 100 :10.0.52.0 / 255.255.255.0 (DHCP)
VLAN 101 :10.2.55.0 /255.255.255.0 (DHCP)
VLAN 102 : 10.5.0.3 /255.255.255.0 (Static)
Cisco ASA2 connected to Core switch on VLAN 103
From ASA2 I want to connect network on Cisco ASA1 and ASA1 to ASA2 network.
#####################################################################
InfinityASA# sh crypto isakmp sa
There are no IKEv1 SAs
There are no IKEv2 SAs
Please do let me know if anything wrong here so that i can correct it. Thank you for the help.
Solved! Go to Solution.
09-12-2016 06:42 PM
Also on ASA 1, the crypto map acl is based only on 192.168.2.0/24. You're missing the 192.168.1.0/24. Add it on the acl
access-list ouside_cryptomap extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_10.0.0.0_8
09-12-2016 10:56 AM
Hi
First of all, on ASA 1, your local network is 192.168.1.0/24 but inside is 192.168.2.0 network. Is it a miss spelling error or 192.168.1.0/24 is behind your inside?
Other question: on ASA 2, your inside IP is 10.5.0.0 network. Why setting remote network as 10.0.0.0/8? Is there any other 10 network behind your ASA you want to be able to reach?
Then, could you share the other config part of the VPN (like nat, crypto) ?
When you try a ping 192.168.1.x from ASA 2, what logs you see on ASA 1 and ASA 2?
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
09-12-2016 11:19 AM
Basically my network being layout as below
Core switch (L3) for office 1 (Cisco ASA1) :
VLAN 100 :192.168.1.0 / 255.255.255.0 (DHCP)
VLAN 101 : 192.168.2.0 /255.255.255.0 (Static)
Cisco ASA1 connected to Core switch on VLAN 101
Core switch (L3) for office 2 (Cisco ASA 2) :
VLAN 100 :10.0.52.0 / 255.255.255.0 (DHCP)
VLAN 101 :10.2.55.0 /255.255.255.0 (DHCP)
VLAN 102 : 10.5.0.3 /255.255.255.0 (Static)
Cisco ASA2 connected to Core switch on VLAN 103
From ASA2 I want to connect network on Cisco ASA1 and ASA1 to ASA2 network.
09-12-2016 11:20 AM
Ok for networks. Did you do ping tests and check logs?
Could you share config of full vpn like nat, crypto?
Thanks
09-12-2016 11:31 AM
InfinityASA# sh run
: Saved
:
ASA Version 9.1(2)
!
hostname InfinityASA
domain-name infinity
enable password 8Ry2YjIyt7RRXU24 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
ASA Version 9.1(2)
!
hostname InfinityASA
domain-name infinityfutures
enable password 8Ry2YjIyt7RRXU24 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
names
!
interface GigabitEthernet0/0
nameif ouside
security-level 0
ip address 50.235.136.X 255.255.255.2XX
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 192.168.2.3 255.255.255.0
!
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
management-only
nameif management
security-level 0
no ip address
!
ftp mode passive
dns server-group DefaultDNS
domain-name infinityfutures
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network NETWORK_OBJ_10.0.0.0_8
subnet 10.0.0.0 255.0.0.0
object network NETWORK_OBJ_192.168.2.0_24
subnet 192.168.2.0 255.255.255.0
object-group protocol DM_INLINE_PROTOCOL_1
protocol-object icmp
protocol-object icmp6
object-group protocol DM_INLINE_PROTOCOL_2
protocol-object icmp
protocol-object icmp6
access-list inside_access_in extended permit ip any any
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any any
access-list ouside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any
access-list ouside_cryptomap extended permit ip 192.168.2.0 255.255.255.0 object NETWORK_OBJ_10.0.0.0_8
pager lines 24
logging enable
logging asdm informational
mtu ouside 1500
mtu inside 1500
mtu management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,ouside) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup
!
nat (inside,ouside) after-auto source dynamic any interface
access-group ouside_access_in in interface ouside
access-group inside_access_in in interface inside
route ouside 0.0.0.0 0.0.0.0 50.235.136.XXX 1
route inside 192.168.0.0 255.255.0.0 192.168.2.1 1
route inside 192.168.1.0 255.255.255.0 192.168.2.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 192.168.2.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev2 ipsec-proposal INFINITY
protocol esp encryption 3des
protocol esp integrity md5
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto map ouside_map 1 match address ouside_cryptomap
crypto map ouside_map 1 set peer 208.97.252.XXX
crypto map ouside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map ouside_map 1 set ikev2 ipsec-proposal INFINITY DES 3DES AES AES192 AES256
crypto map ouside_map interface ouside
crypto ca trustpool policy
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption des
integrity md5
group 2
prf sha md5
lifetime seconds 28800
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable ouside
crypto ikev1 enable ouside
crypto ikev1 policy 10
authentication crack
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 40
authentication crack
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 70
authentication crack
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 100
authentication crack
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 130
authentication crack
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh 208.97.252.224 255.255.255.224 ouside
ssh 192.168.2.0 255.255.255.0 inside
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 30
ssh key-exchange group dh-group1-sha1
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
group-policy GroupPolicy_208.97.252.XXx internal
group-policy GroupPolicy_208.97.252.XXX attributes
vpn-tunnel-protocol ikev1 ikev2
username shamsul password 2naxJ/VF.PmiRbL1 encrypted privilege 15
tunnel-group 208.97.252.238 type ipsec-l2l
tunnel-group 208.97.252.238 general-attributes
default-group-policy GroupPolicy_208.97.252.XXX
tunnel-group 208.97.252.XXX ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
: end
09-12-2016 11:55 AM
I'm reading it quickly through my iphone and I see an issue on your nat exempt rule:
nat (inside,ouside) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup
You're using the object NETWORK_OBJ_192.168.2.0_24 which refers to 192.168.2.0/24 and not your 192.168.1.0/24 network.
Could you modify it and try again?
You can add modify it like that:
object network NETWORK_OBJ_192.168.1.0_24
subnet 192.168.1.0 255.255.255.0object-group network LOCAL-LAN
network-object object NETWORK_OBJ_192.168.1.0_24
network-object object NETWORK_OBJ_192.168.2.0_24
!
no nat (inside,ouside) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup
!
nat (inside,ouside) source static LOCAL-LAN LOCAL-LAN destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup
Thanks.
09-12-2016 12:10 PM
InfinityASA# sh run
: Saved
:
ASA Version 9.1(2)
!
hostname InfinityASA
domain-name infinityfutures
enable password 8Ry2YjIyt7RRXU24 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
names
!
interface GigabitEthernet0/0
nameif ouside
security-level 0
ip address 50.235.136.XXX 255.255.255.2XX
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 192.168.2.3 255.255.255.0
!
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
management-only
nameif management
security-level 0
no ip address
!
ftp mode passive
dns server-group DefaultDNS
domain-name infinityfutures
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network NETWORK_OBJ_10.0.0.0_8
subnet 10.0.0.0 255.0.0.0
object network NETWORK_OBJ_192.168.2.0_24
subnet 192.168.2.0 255.255.255.0
object network NETWORK_OBJ_192.168.1.0_24
subnet 192.168.1.0 255.255.255.0
object-group protocol DM_INLINE_PROTOCOL_1
protocol-object icmp
protocol-object icmp6
object-group protocol DM_INLINE_PROTOCOL_2
protocol-object icmp
protocol-object icmp6
object-group network LOCAL-LAN
network-object object NETWORK_OBJ_192.168.1.0_24
network-object object NETWORK_OBJ_192.168.2.0_24
access-list inside_access_in extended permit ip any any
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any any
access-list ouside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any
access-list ouside_cryptomap extended permit ip object NETWORK_OBJ_192.168.1.0_24 object NETWORK_OBJ_10.0.0.0_8
pager lines 24
logging enable
logging asdm informational
mtu ouside 1500
mtu inside 1500
mtu management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,ouside) source static LOCAL-LAN LOCAL-LAN destination static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 no-proxy-arp route-lookup
!
nat (inside,ouside) after-auto source dynamic any interface
access-group ouside_access_in in interface ouside
access-group inside_access_in in interface inside
route ouside 0.0.0.0 0.0.0.0 50.235.136.97 1
route inside 192.168.0.0 255.255.0.0 192.168.2.1 1
route inside 192.168.1.0 255.255.255.0 192.168.2.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 192.168.2.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 inside
09-12-2016 12:41 PM
As you paste again your config, that says it's not working?
What about the config of the other end ASA? Just attach the txt file please.
What do you see on logs?
Thanks
09-12-2016 01:12 PM
09-12-2016 01:17 PM
09-12-2016 01:22 PM
You can get full config file for both ASA on my initial post. Please scroll up.
Right now im able to see active site to site vpn connection as below.. but not able to ping any network from ASA1 to ASA2 network.
09-12-2016 03:23 PM
Ok from ASA2 you can reach 192.168.1.x, right?
Now what are you trying to do? Could you test ping ASA2 lan from your 192.168.1.0 subnet and tell me if it works?
Thanks
09-12-2016 04:09 PM
From ASA2 to ASA1 ping 192.168.1.1 gateway failed
CISCOASA5508-X# ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)
I'm not able to ping any of segment from ASA1 to ASA2 network and ASA2 to ASA1 network.
09-12-2016 06:38 PM
Please try directly from a host on your lan on both side (don't ping asa) and take logs to see what asa says
09-15-2016 08:45 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide