cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
8655
Views
15
Helpful
26
Replies

ASA Site to Site VPN , not showing up

rsj
Level 1
Level 1

Hi There,

I was trouble shooting a L2l vpn and was puuting captures and checking acl ,suddenly the "show crypto ikev1 sa " does not show peer MM_Active and details .

Neither in ASDM under monitor for Site to Site its showing up.

I can see that the Object group and the Site2Site config is there in the ASDM , but what is happening 

1 Accepted Solution

Accepted Solutions

The site-to-site VPN are on demand. by mean saying this. If Alpha want to send a encrypted packet to Beta than Alpha need to initiate the connection from his/her PC. now his/her PC subnet is define on Firewall access-list (Interested traffic with reference to destination traffic). Firewall see the packet coming in and check its rule and find this rule match XYZ ACL with natting applied if there is a public address exits/or natting in place. here now ASA check its crypto config and forward the packet to the destination address as of its peer ip (which could be an other firewall/router on the internet).

 

also ikev1 and ipsec have a timer when these values. as if this was working fine and no change is made. it could be there is no initiator from your side and from remote site.

please do not forget to rate.

View solution in original post

26 Replies 26

Hi,
I assume the VPN tunnel was previously working or is this a new VPN tunnel?
Normally a VPN would only be established if interesting traffic (traffic matched in the crypto ACL) was transmitted. Have you attempted to send some traffic across the VPN tunnel?

it could be a number of reasons unless you share the config with us.

 

check

show crypto ikev1 sa detail

show run crypto map   | make sure you have the peer ip addres |

 

 

try to initiate the traffic from the interested ACL(source ip to remote ip address). this will tigger the VPN and then see if the crypto ikev1 sa show you anything.

 

 

please do not forget to rate.

Ok , sure i will do this , however i am trying to understand why this happened. I am going back in some time.
so why would this happen and just in case i still see no information after doing what you suggested ,what shall i do next.

strange thing is ,under Site to Site VPN tab i can see the config for the same ...but nothing is sh crypto Ikev1 Sa and asdm monitoring VPN.
I was seeing it till 4 hours back !!

The ISAKMP/IKEv1 and IPSec SA (Security Associations) have lifetime timers, these expire after a configured period, if no interesting traffic passes over the tunnel these SAs will not renew. Only when you attempt to send traffic over the VPN tunnel will they automatically establish a VPN tunnel, the lifetime timers start again.

If this VPN was already configured and working and you've not made any changes, potentially all you need to do is generate some traffic.

The site-to-site VPN are on demand. by mean saying this. If Alpha want to send a encrypted packet to Beta than Alpha need to initiate the connection from his/her PC. now his/her PC subnet is define on Firewall access-list (Interested traffic with reference to destination traffic). Firewall see the packet coming in and check its rule and find this rule match XYZ ACL with natting applied if there is a public address exits/or natting in place. here now ASA check its crypto config and forward the packet to the destination address as of its peer ip (which could be an other firewall/router on the internet).

 

also ikev1 and ipsec have a timer when these values. as if this was working fine and no change is made. it could be there is no initiator from your side and from remote site.

please do not forget to rate.

I am thankful for your answers.

i did a ping to the destination, still I don’t see MM active nor do I see any information.

acl is in place ..Asdm has config stored please 1 and 2 .

 

Just don’t know what is happening .. :(

please  share your configuration of the firewall. also would be great if you have other side config too.

 

or run these command and share the output

 

debug crypto conditon peer xxxxx     (This is the remote public ip address of the other side)

logging monitor debug

 

if on ssh connection run this command

ter monitor

Adn to disable it enter

terminal no monitor

 

please do not forget to rate.

were you issue fix?

please do not forget to rate.

The other site has confirmed that their Site was down and the Vpn from there side was not up !!,, Still waiting for next 3 hours to check.This comes from the support staff , the real engineer is still to come !!!

share you vpn config and the remote site config to have a look a them. up till now we have very limited information.

please do not forget to rate.

Are you pinging the destination from the ASA itself? That won't necessarily work, you need to ping from a device inside the network (a switch or pc), which is a network that is defined as source in the crypto map ACL...obviously the destination network must be defined as the destination is the same ACL.

When you provide the configuration, provide information on what IP address you were pinging and what the source ip address was.

got some logs !! tunnel shows up and goes away!!

 

Jan 15 12:59:22 [IKEv1]Group = 24.32.62.12, IP = 24.32.62.12, QM FSM error (P2 struct &0x00002aaad6678350, mess id 0xa5c39bd)!
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE QM Initiator FSM error history (struct &0x00002aaad6678350) <state>, <event>: QM_DONE, EV_ERROR-->QM_WAIT_MSG2, EV_TIMEOUT-->QM_WAIT_MSG2, NullEvent-->QM_SND_MSG1, EV_SND_MSG-->QM_SND_MSG1, EV_START_TMR-->QM_SND_MSG1, EV_RESEND_MSG-->QM_WAIT_MSG2, EV_TIMEOUT-->QM_WAIT_MSG2, NullEvent
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, sending delete/delete with reason message
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing blank hash payload
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing IPSec delete payload
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing qm hash payload
Jan 15 12:59:22 [IKEv1]IP = 24.32.62.12, IKE_DECODE SENDING Message (msgid=1d00d9a3) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 64
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 12:59:22 [IKEv1]Group = 24.32.62.12, IP = 24.32.62.12, Removing peer from correlator table failed, no match!
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
Jan 15 12:59:22 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0x60005623
llJan 15 12:59:23 [IKEv1]IKE Receiver: Packet received on 185.41.216.7:500 from 24.32.62.12:500
Jan 15 12:59:23 [IKEv1]IP = 24.32.62.12, IKE_DECODE RECEIVED Message (msgid=99029f00) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
Jan 15 12:59:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, processing hash payload
Jan 15 12:59:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, processing notify payload
Jan 15 12:59:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, Received keep-alive of type DPD R-U-THERE (seq number 0xe37)
Jan 15 12:59:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xe37)
Jan 15 12:59:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing blank hash payload
Jan 15 12:59:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing qm hash payload
Jan 15 12:59:23 [IKEv1]IP = 24.32.62.12, IKE_DECODE SENDING Message (msgid=e3c84bdc) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80

 

Jan 15 13:42:23 [IKEv1 DEBUG]Pitcher: received a key acquire message, spi 0x0
Jan 15 13:42:23 [IKEv1]Group = 24.32.62.12, IP = 24.32.62.12, IKE Initiator: New Phase 2, Intf Outside, IKE Peer 24.32.62.12 local Proxy Address 192.168.248.0, remote Proxy Address 192.168.11.0, Crypto map (lanlab)
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, Oakley begin quick mode
Jan 15 13:42:23 [IKEv1 DECODE]Group = 24.32.62.12, IP = 24.32.62.12, IKE Initiator starting QM: msg id = 51fcc798
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0x4041f2c9
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0xe5de5a8f
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0x5cb49cb5
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0xe9da1dca
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0xa8f0c4dd
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0x0949ce20
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0x8813e04f
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0x4a358b81
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0xed4c9d87
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE got SPI from key engine: SPI = 0xfb5ed03b
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, oakley constucting quick mode
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing blank hash payload
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing IPSec SA payload
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing IPSec nonce payload
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing pfs ke payload
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing proxy ID
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, Transmitting Proxy Id:
Local subnet: 192.168.248.0 mask 255.255.255.0 Protocol 0 Port 0
Remote subnet: 192.168.11.0 Mask 255.255.255.0 Protocol 0 Port 0
Jan 15 13:42:23 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing qm hash payload
Jan 15 13:42:23 [IKEv1 DECODE]Group = 24.32.62.12, IP = 24.32.62.12, IKE Initiator sending 1st QM pkt: msg id = 51fcc798
Jan 15 13:42:23 [IKEv1]IP = 24.32.62.12, IKE_DECODE SENDING Message (msgid=51fcc798) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + KE (4) + ID (5) + ID (5) + NONE (0) total length : 856
Jan 15 13:42:37 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, Sending keep-alive of type DPD R-U-THERE (seq number 0x7441c89b)
Jan 15 13:42:37 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing blank hash payload
Jan 15 13:42:37 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing qm hash payload
Jan 15 13:42:37 [IKEv1]IP = 24.32.62.12, IKE_DECODE SENDING Message (msgid=71c7d91c) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
Jan 15 13:42:37 [IKEv1]IKE Receiver: Packet received on 185.41.216.7:500 from 24.32.62.12:500
Jan 15 13:42:37 [IKEv1]IP = 24.32.62.12, IKE_DECODE RECEIVED Message (msgid=2a0743b2) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80
Jan 15 13:42:37 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, processing hash payload
Jan 15 13:42:37 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, processing notify payload
Jan 15 13:42:37 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x7441c89b)
Jan 15 13:42:55 [IKEv1]Group = 24.32.62.12, IP = 24.32.62.12, QM FSM error (P2 struct &0x00002aaad680f490, mess id 0x51fcc798)!
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE QM Initiator FSM error history (struct &0x00002aaad680f490) <state>, <event>: QM_DONE, EV_ERROR-->QM_WAIT_MSG2, EV_TIMEOUT-->QM_WAIT_MSG2, NullEvent-->QM_SND_MSG1, EV_SND_MSG-->QM_SND_MSG1, EV_START_TMR-->QM_SND_MSG1, EV_RESEND_MSG-->QM_WAIT_MSG2, EV_TIMEOUT-->QM_WAIT_MSG2, NullEvent
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, sending delete/delete with reason message
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing blank hash payload
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing IPSec delete payload
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, constructing qm hash payload
Jan 15 13:42:55 [IKEv1]IP = 24.32.62.12, IKE_DECODE SENDING Message (msgid=2f7c7e69) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 64
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1 DEBUG]Group = 24.32.62.12, IP = 24.32.62.12, IKE Deleting SA: Remote Proxy 192.168.11.0, Local Proxy 192.168.248.0
Jan 15 13:42:55 [IKEv1]Group = 24.32.62.12, IP = 24.32.62.12, Removing peer from correlator table failed, no match!
Jan 15 13:42:55 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0xfb5ed03b
Jan 15 13:42:55 [IKEv1 DEBUG]Pitcher: received key delete msg, spi 0xfb5ed03b

 

 

Can you upload the config of both side please 

please do not forget to rate.

I dont have access to other side as of now , is there a tool or best way to interpret the logs pasted above !! any thing you would like to guide me to !!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: