08-09-2020 01:53 AM - edited 08-09-2020 02:00 AM
Configured an L2L VPN, but the ping fail.
Can you see what's the problem??
Please check the files
08-09-2020 01:59 AM
08-09-2020 02:02 AM
08-09-2020 02:07 AM - edited 08-09-2020 02:17 AM
So you are testing from HQ?
You should always test connectivity of a VPN, by connecting to a device on the inside of the ASA, rather than test "to" the ASA. However you can configure the command "management-access INSIDE" (assuming the interface name is INSIDE) to permit icmp and ssh, http management via the inside interface over a VPN tunnel.
So can you ping a device on the inside of the ASA? The switch 172.29.2.13?
08-09-2020 02:17 AM - edited 08-09-2020 02:18 AM
SangHai-OF-ASA# sh int ip b
GigabitEthernet1/1 58.246.2.50 YES CONFIG up up
GigabitEthernet1/2 172.29.2.1 YES CONFIG up up
SangHai-OF-ASA# ping 172.29.2.13
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.29.2.13, timeout is 2 seconds:
!!!!!
08-09-2020 02:26 AM - edited 08-09-2020 02:29 AM
Ok, so that confirms the tunnel is up and working for traffic "through" the ASA.
As previously mentioned you would need the "management-access <interface>" command configured to be able to ping the ASA itself over the VPN tunnel.
08-09-2020 03:07 AM
08-09-2020 03:27 AM
08-09-2020 04:56 AM
08-09-2020 05:16 AM
@JustTakeTheFirstStep wrote:
SW(172.29.2.13) - BR ASA ------------------ HQ ASA - PC172.16.0.0
plz help me
You previously confirmed you could ping the switch 172.29.2.13, so it's working
08-09-2020 05:29 AM
08-09-2020 05:42 AM
In your output text files you are running ping/traceroute from the ASA.
VPN-ASA-HQ# ping 172.29.2.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.29.2.1, timeout is 2 seconds:
?????
VPN-ASA-HQ# traceroute 172.29.2.1
Type escape sequence to abort.
Tracing the route to 172.29.2.1
1 172.30.1.2 1 msec 1 msec 1 msec
2 * *
...so the source will not be from an IP address defined in the crypto ACL - therefore traffic will not be encrypted.
In you last message you said "SW(172.29.2.13) - BR ASA ------------------ HQ ASA - PC172.16.0.0" which is not testing from the ASA (as per your logs). The information you are providing is confusing, not helpful and doesn't help me help you.
Test a VPN by sending traffic "through" the VPN, to a device behind the peer ASA.
08-09-2020 06:17 AM - edited 08-09-2020 06:22 AM
Do you have routing /default route configured on the switches behind the ASAs? If yes, do the routes point to, the ASA or somewhere else?
If you are testing ping over VPN from the ASA, as Rob has mentioned you need the command management-access <interface> (where interface is the name of the source interface) and make sure the IP or subnet of that interface is allowed over the VPN in the crypto ACL. Then when pinging from the ASA specify the source interface...for example ping inside 172.29.2.13
You are missing "inspect ICMP" command in the policy map on the Sanghai ASA and it doesn't look like you have a policy map configured on the HQ ASA. I suggest adding inspect ICMP to Sanghai and copy paste the Sanghai policy map to the HQ ASA. and then test. (see red text below)
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
!
service-policy global_policy global
08-18-2020 12:58 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide