07-19-2024 10:33 AM
ASA 5525x with 9.x code
working with an IPsec tunnel a Fortinet is on the other side of the ipsec tunnel.
My server on 10.220.2.16 enters the asa INSIDE interface bound down the ipsec tunnel to 10.12.32.4
In the asa logs my 10.220.2.16 >10.12.32.4 getting FLAG RST on interface INSIDE followed by a SYN ACK.
We don't have any asymmetrical routing no dup routes pushing traffic in core switch to different endpoints. our crypto-maps have the correct interesting traffic defined along with the proper NATS.
We use static routes on the core to force our tunnel traffic to the ASA. No dup routes or more specific routes pointing subnet elsewhere.
The packet tracer gives 100% flow from start to finish.
Suggestions?
Solved! Go to Solution.
07-24-2024 07:11 AM
solution was needed static routes on the asa pointing to the 2nd ISP interface that ran this tunnel. traffic was getting routed out of 1st isp since it was preferred route on the asa.
07-19-2024 11:07 AM
""logging permit-hostdown""
this I think because you use tcp syslog server
when the syslog not reachable the asa reject add new tcp conn
add command above and check
MHM
07-19-2024 12:40 PM
thanks! we have a troubleshooting window on monday.
07-19-2024 12:53 PM
just had a chance to check, we the logging permit-hostdown in our asa.
07-20-2024 04:44 AM
do you use Syslog with TCP or UDP ?
MHM
07-19-2024 12:46 PM
Run packet capture with "trace detail" option:
this will give you more detail on what is going..
is it happening each time ? does pings work ?
07-20-2024 02:12 AM - edited 07-20-2024 02:15 AM
I have seen this issue in the past vpn-tunnel with AWS. In our case remote server and local server had some connectivity issue. The workaround work for us we have to implement TCP state bypass. Try enabling TCP state bypass for the specific traffic. This can help if the issue is related to TCP state tracking
access-list bypass_tcp_state extended permit ip host 10.220.2.16 host 10.12.32.4
class-map bypass_tcp_class
match access-list bypass_tcp_state
policy-map bypass_tcp_policy
class bypass_tcp_class
set connection advanced-options tcp-state-bypass
service-policy bypass_tcp_policy global
Also ensure that the Fortinet device configuration matches the ASA configuration in terms of IPsec settings, NAT exemptions, and access lists. Mismatched configurations can cause issues.
07-24-2024 07:11 AM
solution was needed static routes on the asa pointing to the 2nd ISP interface that ran this tunnel. traffic was getting routed out of 1st isp since it was preferred route on the asa.
07-24-2024 07:17 AM
Thanks alot for update us
Have a nice summer
MHM
07-24-2024 07:18 AM
wow good catch. was not excepted to be that issue. thanks for the update.
07-24-2024 07:28 AM
good catch.. usually the capture with trace detail should show you the path and give you some idea of why it is dropping a packet..
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide