01-16-2012 11:48 PM - edited 03-11-2019 03:15 PM
Hello,
Core-HQ--------------------ASA-------------ISP---------Branch- Router
192.168.0.0 172.16.0.0
I have a query regarding the interesting traffic of VPN.
Our ASA is on static public IP and the branch router is on dynamic ADSL , when i specify the interesting traffic on ASA i.e
access-list abc extended permit ip 192.168.0.0 255.255.0.0 any ----------- it works the tunnel is up when Branch router initiates a ping to 192.168.0.0 network in HQ but when i change the access-list to
access-list abc extended permit ip 192.168.0.0 255.255.0.0 172.16.0.0 255.255.0.0 ---------it does'nt works,
Please find the Capture output.
Tx
Solved! Go to Solution.
01-16-2012 11:54 PM
This is normal. See the below URL
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml
Sent from Cisco Technical Support iPad App
01-17-2012 04:06 AM
Hi Jack,
You should post both end configuration. Also after changing these ACL you should do some crypto debug on router to collect the logs.
Thanks
Ajay
01-17-2012 11:45 AM
Hi Jack,
Please check your interface access-lists (even though I doubt this could be an issue because the traffic went through the first time), try to inspect icmp, run the captures on the inside interface to see if the traffic gets back, check if sysopt connection permit-VPN is running.
Sent from Cisco Technical Support iPhone App
01-17-2012 02:05 PM
Post your router config as well.
01-16-2012 11:54 PM
This is normal. See the below URL
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml
Sent from Cisco Technical Support iPad App
01-17-2012 12:08 AM
Hello,
I have the above document, This means interesting traffic should be permited from HQ to anywhere????
so in this situation what can be done.
01-17-2012 12:57 AM
Hi Jack,
When you change the interesting traffic ACL on the ASA you should do the same on the remote Router.
e.g ASA
access-list abc extended permit ip 192.168.0.0 255.255.0.0 172.16.0.0 255.255.0.0
Remote Router
access-list abc extended permit ip 172.16.0.0 255.255.0.0 192.168.0.0 255.255.0.0
Rememeber to put this line on your NO-NAT ACL.
This should work.
Are you using crypto maps or VTI on the router?
01-17-2012 03:52 AM
Hello Elias
I have done the above b4 but it does'nt work
01-17-2012 04:00 AM
Hi Jack,
After changinig your interesting traffic ACLs, did you clear the crypto SAs and IPSEC SAs and allowed the tunnel to re-establish with the new settings?
If so, what is the debug saying?
e.g. debug crypto isakmp 10
Check the bebug carefully and see why the tunnel fails to establish.
01-17-2012 04:06 AM
Hi Jack,
You should post both end configuration. Also after changing these ACL you should do some crypto debug on router to collect the logs.
Thanks
Ajay
01-17-2012 11:32 AM
Hello
Now even though the ping is stopped, the phase I and phase II are complete but still the traffic does'nt pass.
Thanks
01-17-2012 11:45 AM
Hi Jack,
Please check your interface access-lists (even though I doubt this could be an issue because the traffic went through the first time), try to inspect icmp, run the captures on the inside interface to see if the traffic gets back, check if sysopt connection permit-VPN is running.
Sent from Cisco Technical Support iPhone App
01-17-2012 12:35 PM
Hello,
(even though I doubt this could be an issue because the traffic went through the first time), By watching which line u say this??? Can u highlight the line in my logs please.
Not related to the vpn problem above in general i m asking what these below logs says:
*Jan 18 14:24:34.351: ISAKMP: DPD received KMI message.
*Jan 18 14:24:34.351: ISAKMP: IPSec requested DPD; SA state 0x0 or SA is null. Reinitiating phase 1.
*Jan 18 14:24:34.351: ISAKMP: Locking peer struct 0x47092658, refcount 1 for DPD/create new SA
*Jan 18 14:24:34.351: ISAKMP: local port 500, remote port 500
*Jan 18 14:24:34.351: insert sa successfully sa = 4751DE0C
*Jan 18 14:24:34.351: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
*Jan 18 14:24:34.351: ISAKMP:(0):found peer pre-shared key matching 192.168.20.1
*Jan 18 14:24:34.351: ISAKMP:(0): Unknown DOI 0
*Jan 18 14:24:34.351: ISAKMP:(0): constructed NAT-T vendor-07 ID
*Jan 18 14:24:34.351: ISAKMP:(0): constructed NAT-T vendor-03 ID
*Jan 18 14:24:34.351: ISAKMP:(0): constructed NAT-T vendor-02 ID
*Jan 18 14:24:34.351: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
*Jan 18 14:24:34.351: ISAKMP:(0):Old State = IKE_READY New State = IKE_I_MM1
*Jan 18 14:24:34.351: ISAKMP:(0): sending packet to 192.168.20.1 my_port 500 peer_port 500 (I) MM_NO_STATE
*Jan 18 14:24:34.355: ISAKMP (0:0): received packet from 192.168.20.1 dport 500 sport 500 Global (I) MM_NO_STATE
*Jan 18 14:24:34.355: ISAKMP:(0):Notify has no hash. Rejected.
*Jan 18 14:24:34.355: ISAKMP (0:0): Unknown Input IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY: state = IKE_I_MM1
*Jan 18 14:24:34.355: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Jan 18 14:24:34.355: ISAKMP:(0):Old State = IKE_I_MM1 New State = IKE_I_MM1
*Jan 18 14:24:34.355: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Informational mode failed with peer at 192.168.20.1....
Success rate is 0 percent (0/5)
Thanks
01-17-2012 01:51 PM
Now i changed the access-list according to the mirror of router still it doesnt work it gives me the below error.in the debug of ASA
Session is being torn down. Reason: crypto map policy not found
01-17-2012 02:05 PM
Post your router config as well.
01-17-2012 02:10 PM
I have mirrored the traffic and it worked. fine
Thanks all who contribute to give suggestions, i wll rate to all of your'll.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide