08-24-2012 02:50 PM
Hello,
We have an HQ site with a 2811 (w/ADVSECURITYK9-M) acting as the firewall. We currently have 1 ASA5505 that has an established ipsec l2l VPN.
I'm trying to connect a 2nd ASA, but I've noticed I can only add 1 cryptomap to the outside interface.
A show ver shows 1 Virtual Private Network Module... Surely that doesn't mean only 1 VPN?
Do I use one crypto map, and add a second 'set peer' & 'match address' inside the crypto map itself?
Thanks,
Jason
Solved! Go to Solution.
08-24-2012 02:53 PM
Yes you add another poicy to your crypto configuration.
Thanks
Tarik Admani
*Please rate helpful posts*
08-24-2012 03:05 PM
No you would add this:
crypto map SDM_CMAP_1 2 ipsec-isakmp
set peer 108.x.x.x
Need to add transform set
match address 105
Tarik Admani
*Please rate helpful posts*
08-24-2012 03:20 PM
Here is a guide for reference:
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008009463b.shtml
Thanks,
Tarik Admani
*Please rate helpful posts*
08-24-2012 03:23 PM
That is correct your end config should look like this:
crypto map SDM_CMAP_1 1 ipsec-isakmp
..
..
..
crypto map SDM_CMAP_1 2 ipsec-isakmp
..
..
..
Hope that helps!
Tarik Admani
*Please rate helpful posts*
08-24-2012 02:53 PM
Yes you add another poicy to your crypto configuration.
Thanks
Tarik Admani
*Please rate helpful posts*
08-24-2012 03:04 PM
Just to make sure... I would just add the bolded lines below to the current crypto map? (ip's have been censored)
crypto map SDM_CMAP_1 1 ipsec-isakmp
set peer 99.x.x.x
set transform-set ESP-AES-128-SHA
match address 103
set peer 108.x.x.x
match address 105
Thanks,
Jason
08-24-2012 03:05 PM
No you would add this:
crypto map SDM_CMAP_1 2 ipsec-isakmp
set peer 108.x.x.x
Need to add transform set
match address 105
Tarik Admani
*Please rate helpful posts*
08-24-2012 03:20 PM
Here is a guide for reference:
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008009463b.shtml
Thanks,
Tarik Admani
*Please rate helpful posts*
08-24-2012 03:20 PM
WOW YOU ARE FAST!!!
I think I see now... and it looks like I was close.
From trying to configure earlier, I currently have
crypto map SDM_CMAP_1 1 ipsec-isakmp
... and
crypto map SDM_CMAP_2 2 ipsec-isakmp
I so need to change (add/remove) the 2nd crypmap to
crypto map SDM_CMAP_1 2 ipsec-isakmp
08-24-2012 03:23 PM
That is correct your end config should look like this:
crypto map SDM_CMAP_1 1 ipsec-isakmp
..
..
..
crypto map SDM_CMAP_1 2 ipsec-isakmp
..
..
..
Hope that helps!
Tarik Admani
*Please rate helpful posts*
08-24-2012 09:25 PM
Ok, I'm getting closer, but still failing. I was close enough that a VOIP phone registered with the phone system at some point, but not sure why it wont stay connected.
The original, VPN1 is still connected though.
I've varified the preshared keys on both ends match.
Here's an error from the debug of the second ASA, VPN2
Aug 24 10:49:45 [IKEv1]: Group = 64.X.X.X, IP = 64.X.X.X, QM FSM error (P2 struct &0x42436b0, mess id 0x374e49ed)!
Aug 24 10:49:45 [IKEv1]: Group = 64.X.X.X, IP = 64.X.X.X, Removing peer from correlator table failed, no match!
Aug 24 10:49:45 [IKEv1]: Group = 64.X.X.X, IP = 64.X.X.X, QM FSM error (P2 struct &0x42436b0, mess id 0x374e49ed)!
Aug 24 10:49:45 [IKEv1]: Group = 64.X.X.X, IP = 64.X.X.X, Removing peer from correlator table failed, no match!
As far as the ASA configs, everything is the exactly the same, except;
NEW ASA VPN2 -both asa have object groups 1&2, containing other ip's of the HQ site. these ip's listed here are of VPN1's local lan.
I imagine I will need to add VPN2's local ip to VPN1's config for objectgroup 1&2, but I don't think that is the reason this wont connect to HQ
object-group network DM_INLINE_NETWORK_1
network-object 192.168.26.0 255.255.255.0
object-group network DM_INLINE_NETWORK_2
network-object 192.168.26.0 255.255.255.0
object-group network DM_INLINE_NETWORK_3
network-object 192.168.27.0 255.255.255.0
network-object 192.168.1.0 255.255.255.0
Working ASA VPN1 - not sure exactly how the bolded line works
no crypto isakmp nat-traversal
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
HQ 2811 -----------------------------------------------------------------------
Hope I included enough of the router config. Again, VPN1 is working.
crypto isakmp key VPN1PW address 99.x.x.x
crypto isakmp key VPN2PW address 108.x.x.x
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec df-bit clear
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Tunnel to 99.x.x.x VPN1
set peer 99.x.x.x
set transform-set ESP-AES-128-SHA
match address 103
crypto map SDM_CMAP_1 2 ipsec-isakmp
description Tunnel to 108.x.x.x VPN2
set peer 108.x.x.x
set transform-set ESP-AES-128-SHA
match address 105
!
****** This next section I dont recall typing in, but it refers to access group 105, but 105 was newly created for the new VPN2. I didn't not find a corresponding command for access-group 103, which 105 is a copy of 103, except each one includes the others local lan too.
class-map type inspect match-all sdm-nat-user-protocol--2-1
match access-group 105
match protocol user-protocol--2
interface FastEthernet0/1
description T1 to Internet$FW_OUTSIDE$
ip address 64.x.x.x 255.255.255.248
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
crypto map SDM_CMAP_1
08-24-2012 09:48 PM
Here is some reference material to your errors:
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml#solution18
Thanks,
Tarik Admani
*Please rate helpful posts*
08-26-2012 03:13 PM
I've tried going through that troubleshooting doc, but I still can't figure this out.
When turning on debug for the 2811, I'm not seeing any thing.
RT#show debug
Cryptographic Subsystem:
Crypto ISAKMP debugging is on
Crypto ISAKMP Error debugging is on
Crypto IPSEC debugging is on
Crypto IPSEC Error debugging is on
show crypto session
Crypto session current status
Interface: FastEthernet0/1
Session status: UP-ACTIVE
Peer: 108.x.x.x port 500
IKE SA: local 64.x.x.x/500 remote 108.x.x.x/500 Active
IPSEC FLOW: permit ip 192.168.26.0/255.255.255.0 192.168.27.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 10.130.15.0/255.255.255.0 192.168.27.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 10.131.16.0/255.255.255.0 192.168.27.0/255.255.255.0
Active SAs: 2, origin: crypto map
IPSEC FLOW: permit ip 172.20.15.0/255.255.255.0 192.168.27.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 172.21.16.0/255.255.255.0 192.168.27.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 10.21.0.0/255.255.255.0 192.168.27.0/255.255.255.0
Active SAs: 2, origin: crypto map
IPSEC FLOW: permit ip 10.30.18.0/255.255.255.0 192.168.27.0/255.255.255.0
Active SAs: 2, origin: crypto map
Interface: FastEthernet0/1
Session status: UP-ACTIVE
Peer: 99.x.x.x port 500
IKE SA: local 64.x.x.x/500 remote 99.x.x.x/500 Active
IPSEC FLOW: permit ip 192.168.27.0/255.255.255.0 192.168.26.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 10.130.15.0/255.255.255.0 192.168.26.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 10.131.16.0/255.255.255.0 192.168.26.0/255.255.255.0
Active SAs: 2, origin: crypto map
IPSEC FLOW: permit ip 172.20.15.0/255.255.255.0 192.168.26.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 172.21.16.0/255.255.255.0 192.168.26.0/255.255.255.0
Active SAs: 0, origin: crypto map
IPSEC FLOW: permit ip 10.21.0.0/255.255.255.0 192.168.26.0/255.255.255.0
Active SAs: 2, origin: crypto map
IPSEC FLOW: permit ip 10.30.18.0/255.255.255.0 192.168.26.0/255.255.255.0
Active SAs: 2, origin: crypto map
From the show crypto, to me, it looks like it's working, but 192.168.27.x isn't accessible..
08-26-2012 08:35 PM
Jason,
These ASAs arent behind the same firewall are they?
thanks,
Tarik Admani
*Please rate helpful posts*
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide