cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
15413
Views
0
Helpful
16
Replies

Site to Site VPN connected but no traffic passing

Adam Coombs
Level 1
Level 1

Ok, I need some help please with a problem with a Site to Site VPN. 

Ok, well we have a ASA5520 using asa825-k8.bin that connects to another company site to site vpn tunnel it is working fine no issue, until the other company is changing the connection from there current firewall to a new firewall with a new IOS and different public IP address. 

The problem when we try to get the new tunnel up with the new public ip address with the new PSK, but we are using the same internal ip address and Group Policy no traffic will pass not pinging or traceroute from here side. 

The other company makes a few routing changes on there side but nothing works.  

What commands could i used to find out the issue is either on my side or the another company side? 

16 Replies 16

Roger Base
Level 1
Level 1

Paste your config to this page.

Well this firewall has multi site to site vpn tunnels

What are the commands i can run to show just this tunnel? 

Thank you for the help in advance.

Hi Highlander,

 

First try to ping the destination peer ip address (new address) from your ASA. If so then connectivity is fine for the same..... then check on the crypto-acl / no-nat policies, which would have not changed, since you just changed the peer-ip.....

 

check the isakmp/ikev1/2/tunnel-group configurations has the peer-ip configured with new address......

make sure old ip address on device for isakmp/ikev1/2/tunnel-group is removed and cleared.....

initiate the intresting traffic and check phase 1 comes-up..... if that is okay... then go and check on phase 2 check...... clear the isakmp and ipsec peers @ both the ends and try once.... it should work.....

Regards

Karthik

Well, from my ASA device i can ping the new public ip address no problem. They can ping our public ip address that has not change.

when the tunnel comes up i cant ping any though that tunnel 

1   IKE Peer: pubic ip address 
    Type    : L2L             Role    : responder
    Rekey   : no              State   : MM_ACTIVE
 

how do you check phase 1 and phase 2 

how do you clear isakmp 
 

thank you for the help in adavnce 

Hi,

 

To check phase 1 - sh crypto isakmp sa

to check phase 2 - sh crypto ipsec sa

 

As i see your phase 1 is up and your end is responder, since the traffic is initiated from other end.....
no issues.....

we need to check on the phase 2...... can you paste your crypto acl used for this phase 2.....

 

Outputs required:

sh crypto isakmp sa

sh crypto ipsec sa peer <peer ip>

sh runn tunnel-group <pper ip address>

sh runn crypto ikev1 and sh runn crypto ikev2

sh runn crypto ipsec

sh runn crypto map | in <name of crypto map>

sh runn access-list <name of crypto acl>

sh runn nat

 

your lan subnet info, remote lan info.....

 

Regards

Karthik

Ok, I have a maintenace window to try this wednesday night 

I pasted that from my notes when we get it connected the first time. We always seem to be the responder.

I will get all these commands run on my side and have the other guy run them on there side.

Thank you very much for the list of commands to run!!

Thank you advance for your help 

 

Show run will help us to help you. 

Well I wish I could do a show run on this firewall that config text would be a couple of pages longer. 

That is why i was asking for specific commands to used to help me sorry I am new at this but this project was put on me to figure this out. I dont know very much about site to site setup that is why i used the ADSM wizard 

Adam Coombs
Level 1
Level 1

Ok, here a updated on the problem i am having 

1.1.1.1 is the other company network 

2.2.2.2 is my network 

 

I used ASDM i go to 
Configuration > Site-to-Site VPN > Advanced > Crypto Maps
we used the same tunnel that is working and change the Peer Setting 
Remove the old IP address and add the new IP address 
when i check the connection profiles the old connection disappear
so i went back to crypto maps peer setting i added the old ip address back in there 
connection profile came back 

did not work, i could not get phase 1 to work at all 
this is the error message i see 
Group = 1.1.1.1, IP = 1.1.1.1, Can't find a valid tunnel group, aborting...!
Aug 13 2014 16:32:40: %ASA-7-715065: Group = 1.1.1.1, IP = 1.1.1.1, IKE MM Initiator FSM error history (struct &0x725cd4e8)  <state>, <event>:  MM_DONE, EV_ERROR-->MM_BLD_MSG5, EV_GROUP_LOOKUP-->MM_BLD_MSG5, EV_TEST_CERT-->MM_BLD_MSG5, EV_SECRET_KEY_OK-->MM_BLD_MSG5, NullEvent-->MM_BLD_MSG5, EV_GEN_SECRET_KEY-->MM_WAIT_MSG4, EV_PROCESS_MSG-->MM_WAIT_MSG4, EV_RCV_MSG
Aug 13 2014 16:32:40: %ASA-7-713906: Group = 1.1.1.1, IP = 1.1.1.1, IKE SA MM:6696bf2a terminating:  flags 0x0100c022, refcnt 0, tuncnt 0
Aug 13 2014 16:32:40: %ASA-7-713906: Group = 1.1.1.1, IP = 1.1.1.1, sending delete/delete with reason message
Aug 13 2014 16:32:40: %ASA-4-713903: IP = 1.1.1.1, Header invalid, missing SA payload! (next payload = 4)

I restore the old tunnel back to pervouis config and add a new tunnel config 
I did not remove the old tunnel as well 

In ASDM i created a new tunnel with the new ip address same local and remote groups and same group policy same filter instant the phase 1 is complete
phase 2 is working but not working i can recieve data but i cant send out any data 

Crypto map tag: outside_map, seq num: 4, local addr: 2.2.2.2

      access-list outside_4_cryptomap extended permit ip 10.48.0.0 255.255.252.0 10.20.0.0 255.255.0.0
      local ident (addr/mask/prot/port): (10.48.0.0/255.255.252.0/0/0)
      remote ident (addr/mask/prot/port): (10.20.0.0/255.255.0.0/0/0)
      current_peer: 1.1.1.1

      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
      #pkts decaps: 46, #pkts decrypt: 46, #pkts verify: 46
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
      #send errors: 0, #recv errors: 0

      local crypto endpt.: 2.2.2.2, remote crypto endpt.: 1.1.1.1

      path mtu 1500, ipsec overhead 74, media mtu 1500
      current outbound spi: 0CA9CEC6
      current inbound spi : 83DEBAD1

    inbound esp sas:
      spi: 0x83DEBAD1 (2212412113)
         transform: esp-aes esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, PFS Group 2, }
         slot: 0, conn_id: 7069696, crypto-map: outside_map
         sa timing: remaining key lifetime (kB/sec): (4373996/28693)
         IV size: 16 bytes
         replay detection support: Y
         Anti replay bitmap:
          0x00007FFF 0xFFFFFFFF
    outbound esp sas:
      spi: 0x0CA9CEC6 (212455110)
         transform: esp-aes esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, PFS Group 2, }
         slot: 0, conn_id: 7069696, crypto-map: outside_map
         sa timing: remaining key lifetime (kB/sec): (4374000/28693)
         IV size: 16 bytes
         replay detection support: Y
         Anti replay bitmap:
          0x00000000 0x00000001

crypto map outside_map 4 match address outside_4_cryptomap
crypto map outside_map 4 set pfs
crypto map outside_map 4 set peer 1.1.1.1
crypto map outside_map 4 set transform-set ESP-AES-128-SHA

 

Hi ,

 

Can you check your no-nat configuration is in place for this tunnel? or get me the webex session or someway of remote session we can be able to solve the issue....

Regards

Karthik

well I dont know about the no nat rule 

only nat rule i know about is the exempt for the remote and local networks that are in the site to site tunnel

nat exempt outbound traffic from inside (default) 

 

nonat or nat exempt is same terms only.....

 

Regards

Karthik

Ok, cool well then it is a nat exempt rule for the remote and local network on that tunnel 

do you packet tracer on the firewall will tell him if it is acl or nat problem when the tunnel is not working correctly 

I did a packet tracer on the working old tunnel but did not think about doing it on the new tunnel at that time.

 

yeah you can do packet tracer and check vpn... also you are generating intresting traffic here, when you do that...

 

Regards

Karthik

Review Cisco Networking for a $25 gift card