Ipsec site to site vpn
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-28-2023 05:50 PM
- I have configured one site to site vpn.
Both phase 1 and Phase 2 seems to be up but I am unable to ping peer ip.
What may be the issue?
Is there any chance other side may be blocking esp packet over protocol 50 ?
PS DEBUG IS not allowed as per guidelines
- Labels:
-
Physical Security
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-28-2023 07:45 PM
Hi
show crytop ipsec sa
Does this command shows hit count on packets being encrpted and or decrypted?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 01:10 AM
Hi Flavio,
On my side encrypted packets I can see.
There is no decrypt packets.
I have no control on another side.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 01:55 AM
This problem can be related tto traffic mismatch You need to make sure your ACL and the other side ALC is matching the same thing.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 07:55 PM
Hi Flavio ,
if ACL having issue then Phase2 will not be up as due to mismatch of proxy id or interesting traffic .
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 02:05 AM
one side encrypt and there is no decrypt check if the IPSec traffic hit NAT overload, you need to exclude the traffic from NATing
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 07:54 PM
NAT for Public ips ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2023 01:04 AM
HI ,
can we give any proofs to them to clarify that i have no issue from my side without sharing any full config ?
also what about ESP packet if other side firewall is blocking ESP packet on protocol number 50 ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2023 01:12 AM
You config NATing overload to interface connect to ISP?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 03:03 AM
No decryt packets means issue is on the remote as as encap which means your router/fw is passing the traffic from crypto engine and sending it to remote side where as no decrypt your router/fw is not receiving the traffic from remote end.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 07:52 PM
Hi Salim ,
is there a chance that may be other sided some filtering is applied which is blocking the ICMP traffic .
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-29-2023 11:31 PM
If ICMP is block (lets assume) you can send different traffic to test like ssh/443/telnet etc. do you manage the remote side too? why dont you reach out remote side and ask them to check their end configuration.
I beleive you running Ikev2?
could you show your configuration and if possible remote side configuration too.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2023 12:34 AM - edited 05-30-2023 01:03 AM
Hi @Sheraz.Salim ,
i am using ikev1 . i dont have any control on remote side .
i got a call from engineer from remote side , he is denying any issue on either side .
can we give any proofs to them to clarify that i have no issue from my side without sharing any full config ?
also what about ESP packet if other side firewall is blocking ESP packet on protocol number 50 ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-30-2023 01:20 AM
what is the output of the "show crypto isakmp sa detail", "show crypto ipsec sa peer x.x.x.x". ask the other end to show you the output of these command.
as its ikev1 more likely your acl and remote acl are matching otherwise you never have ikev1 up with phase 1 and phase2.
it could be the remote-side have configured vpn-tunnel properly but might the remote side missing the route interally. as far as it goes you can encap which mean you are sending the traffic but no decap the issue on the remote end. Some time its difficult third party/remote side never take the responsilbilty as in your case.
you need to convicne the third party the issue is at his end.
can we give any proofs to them to clarify that i have no issue from my side without sharing any full config ?
you can show the output of "show crypto isakmp details" and show crypto ipsec sa peer x.x.x.x" that the tunnel is up and running you are sending the traffic but the remote side not respoinding you have proof of no-decap.
also what about ESP packet if other side firewall is blocking ESP packet on protocol number 50
unless there is a device sitting in middle between firewall and Internet but its very unlikely.
