03-02-2020 01:23 PM
I'm an accidental administrator of an ASA 5555. The biggest five-alarm fires I get are "The tunnel is down! The vendor can't connect!" Then I have to prove the issue is not on our side of the tunnel. I never feel like I approach this the same way, and I never feel like I approach it efficiently.
Will you share your troubleshooting steps (CLI/GUI) for immediately determining the issue is not on your side of the tunnel? I'm trying to put together a solid playbook I can refer to when faced with tunnel issues.
Thank you very much for your time,
-Alan
Solved! Go to Solution.
03-02-2020 01:34 PM
Hi,
When you are troubleshooting you should:-
- Check the IKE SA "show crypto isakmp sa" or "show crypto ikev1 sa" or "show crypto ikev2" - determine if established
- Check the IPSec SA "show crypto ipsec sa" - determine if IPSec SA is established, determine if encaps|decaps are increasing.
- Turn on debugs "debug crypto ikev1" or "debug crypto ikev2" -observe the output
- Generate interesting traffic as defined in the ACL referenced in the crypto map, see if the tunnel comes up
- Run packet-tracer e.g "packet-tracer input inside tcp 192.168.100.3 3000 10.10.0.2 80"
- Check NAT exemption rules are in place and traffic is not unintentially natted
- Take a packet capture on outside interface and confirm inbound udp/500, esp or udp/4500 is received from peer
The following links are useful for troubleshooting ASA VPN.
HTH
03-02-2020 01:34 PM
Hi,
When you are troubleshooting you should:-
- Check the IKE SA "show crypto isakmp sa" or "show crypto ikev1 sa" or "show crypto ikev2" - determine if established
- Check the IPSec SA "show crypto ipsec sa" - determine if IPSec SA is established, determine if encaps|decaps are increasing.
- Turn on debugs "debug crypto ikev1" or "debug crypto ikev2" -observe the output
- Generate interesting traffic as defined in the ACL referenced in the crypto map, see if the tunnel comes up
- Run packet-tracer e.g "packet-tracer input inside tcp 192.168.100.3 3000 10.10.0.2 80"
- Check NAT exemption rules are in place and traffic is not unintentially natted
- Take a packet capture on outside interface and confirm inbound udp/500, esp or udp/4500 is received from peer
The following links are useful for troubleshooting ASA VPN.
HTH
03-03-2020 06:07 AM
Thank you! I greatly appreciate you taking the time to share this information.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide