06-15-2011 10:02 PM - edited 03-11-2019 01:45 PM
I have a L2L VPN between two ASA5510. The tunnel is up and passing traffic between 14 network pairs but two. I have checked that the interesting traffic is in the no nat ACL, in the crypto map ACL and in the interfaces permitted ACL in both sites. I have checked that crypto mal ACLs match in both sides. When I run "show crypto ipsec sa X.X.X.X" I get the following for the both ACL lines corresponding to the network pairs:
:: Site 1::
Pair 1 (10.10.1.0 ---> 10.10.3.0):
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 587, #pkts decrypt: 587, #pkts verify: 587
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
Pair 2 (10.10.19.0 ---> 10.10.3.0):
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 2199, #pkts decrypt: 2199, #pkts verify: 2199
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
::Site 2::
Pair 1 (10.10.3.0 --> 10.10.1.0)
#pkts encaps: 709, #pkts encrypt: 709, #pkts digest: 709
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 709, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
Pair 2 (10.10.3.0 --> 10.10.19.0)
#pkts encaps: 2667, #pkts encrypt: 2667, #pkts digest: 2667
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 2667, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
I have read a similar case resolved with a reset of the equipment in the site where the packets were not being encapsulated. But I don't think a reset should be the solution.
06-15-2011 10:43 PM
Make sure routing is properly configured, that traffic from one subnet to another needs to go through ASA to be encrypted
06-16-2011 07:59 AM
It is. The server in Site 2 are connected direct to the ASA with a switch. The gateways of these servers is the ASA.
06-16-2011 08:32 AM
Post the ouput of comands:
debug crypto isakmp 7
debug crypto ipsec 7
After applying the commands, try to generate interesting traffic to force the peers to stabilish a vpn.
[]s
06-16-2011 03:11 PM
I ping from site 2 to site 1, and those are the results from the ASDM debugging tool for the networks with problem:
Site 1:
6 | Jun 16 2011 | 14:50:00 | 302020 | 10.10.3.2 | 512 | 10.10.19.38 | 0 | Built inbound ICMP connection for faddr 10.10.3.2/512 gaddr 10.10.19.38/0 laddr 10.10.19.38/0 |
6 | Jun 16 2011 | 13:23:18 | 302021 | 10.10.3.2 | 512 | 10.10.19.38 | 0 | Teardown ICMP connection for faddr 10.10.3.2/512 gaddr 10.10.19.38/0 laddr 10.10.19.38/0 |
Site 2:
6 | Jun 16 2011 | 15:46:50 | 302020 | 10.10.3.2 | 512 | 10.10.19.38 | 0 | Built outbound ICMP connection for faddr 10.10.19.38/0 gaddr 10.10.3.2/512 laddr 10.10.3.2/512 |
6 | Jun 16 2011 | 15:46:47 | 302021 | 10.10.19.38 | 0 | 10.10.3.2 | 512 | Teardown ICMP connection for faddr 10.10.19.38/0 gaddr 10.10.3.2/512 laddr 10.10.3.2/512 |
06-17-2011 08:00 AM
Do you have a nat, or exempt nat?
Are the two networks 10.10.1.0 and 10.10.190 in cryto map in site 1?
Did you check the routes from both sites?
06-17-2011 09:56 AM
I have exempt nat. Yes, they are, 10.10.1.0 & 10.10.19.0 are in the crypto map. If they weren't, they wouldn't appear in the "show crypto ipsec sa X.X.X.X" output. I don't have routes since network gateways are configured in the ASAs.
06-17-2011 09:39 AM
Most like the issue is on 10.10.1.0 side of the firewall. As its not encrypting the packets. Plz check nat exempt and mask in crypto map. Btw , which version are u running.
Sent from Cisco Technical Support iPhone App
06-17-2011 10:59 AM
I thing so too or an IOS bug. asa822-k8 in both.
06-17-2011 12:36 PM
If you are running 8.22, then you are hitting buy CSCtd36473.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide