06-17-2021 11:19 AM
Hello experts @balaji.bandi @Marvin Rhoads @Rob Ingram
I have ASA at site1 and it is connected via ipsec VPN with site 2. At site 2 I got snmp server (Solarwinds Orion) setup.
I cant add ASA on snmp-server for polling.
I can ping the ASA inside/management interface from Snmp-server but I cant ping the snmp-server from ASA inside interface.
If I try to connect within inside network for snmp it works fine but not over VPN.
Solved! Go to Solution.
07-20-2022 10:39 AM
06-17-2021 11:24 AM - edited 06-17-2021 11:41 AM
You'll need to have the command "management-access inside" configured, to access the inside interface over a VPN for mgmt purposes, such as snmp, ssh etc.
You cannot select a source interface for a ping on the ASA, it will always use the egress interface (probably your outside interface).
06-17-2021 12:39 PM
This command is already there and i can ping the ASA inside interface from snmp server (over the ipsec). But snmp is failing on it.
These are snmp related commands I added. Do I am missing anything ?
ASA(config)# sh run | i snmp
snmp-server host inside 10.110.111.48 poll community ***** version 2c
no snmp-server location
no snmp-server contact
inspect snmp
06-17-2021 12:47 PM
Ok, refer to this post and see the reply about appending the "route-lookup" command to your NAT exemption rule.
06-17-2021 12:56 PM
It is already there.
06-17-2021 01:02 PM
Ok, run through this ASA SNMP troublshooting guide, run the different tests and provide the output of the packet-tracer and packet capture. Also provide the output of "show snmp-server statistics".
06-17-2021 01:08 PM
output for sh snmp-server statistics
Groff-ASA(config)# sh snmp-server statistics
0 SNMP packets input
0 Bad SNMP version errors
0 Unknown community name
0 Illegal operation for community name supplied
0 Encoding errors
0 Number of requested variables
0 Number of altered variables
0 Get-request PDUs
0 Get-next PDUs
0 Get-bulk PDUs
0 Set-request PDUs (Not supported)
0 SNMP packets output
0 Too big errors (Maximum packet size 1500)
0 No such name errors
0 Bad values errors
0 General errors
0 Response PDUs
0 Trap PDUs
I will post the Packet captures shortly
06-17-2021 01:27 PM
ASA(config)# sh capture
capture snmpv2 type raw-data interface inside [Capturing - 0 bytes]
match udp host 10.255.255.18 eq snmp host 10.110.111.48
I dont see any traffic so far.
I can poll 10.255.255.17 which is switch directly connected with ASA inside interface.
06-29-2021 08:41 AM
@Rob Ingram Worked with TAC and its bug in 9.14 firmware. It is fixed in 9.15.
Thanks for your help. Config was correct.
12-10-2021 05:50 PM
Any workaround available? I'm on a ASA5555 and the latest software currently available is 9.14(3)15
03-17-2022 09:43 AM
Firmware needs to be upgraded.
07-20-2022 10:19 AM
Did TAC happen to share the Bug ID with you?
07-20-2022 10:39 AM
12-07-2022 08:43 AM - edited 12-07-2022 08:43 AM
Besides the bugID mentioned by @Rob Ingram, this is a change of behavior introduced in ASA 9.14(2) and affects any ASA release at that version or higher. Basically you need to add the outside address of the remote ASA in the crypto map (at both ends) and then poll the remote ASA using the outside address (traffic is still protected in the IPsec VPN). Make sure you have allowed the remote NMS as an SNMP host via the outside interface.
Reference:
06-04-2023 02:40 AM
I've been having trouble getting this working as well and have just stumbled across this supposed new feature.
It seems a step backwards to me as when you set the management interface to inside, SNMP traffic did go through the VPN already, without having to add all this extra config, firewall rules and sometimes an extra route.
Maybe I've understood this all wrong but I'm sure it was done for a reason.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide