10-06-2015 12:01 AM
I have a Cisco ASA5506 that we are presently using to firewall/route 2 separate networks with 2 separate ISP "devices". This is in a remote location so the 2 ISPs are essentially 2 different 4G cards with different public static IPs and we have 2 different internal networks, each routing to a "dedicated" 4G card using PBR.
We have successfully configured a S2S VPN tunnel on the "default route" subnet/public IP, but we are having some difficulty terminating a VPN tunnel on the second ISP interface.
Essentially our physical network layout is as follows:
ISP Card 1 ISP Card 2
(24.x.x.x) (75.x.x.x)
| (int g1/1, outside) | (int g1/7, outside2)
----------------------------------------
Firewall
----------------------------------------
| {int g1/2) | {int g1/8)
Internal Network 1 Internal Network 2
(192.168.1.1/24 inside) (192.168.2.1/24 inside2)
we have the default route set to the next hop of ISP1 (route outside 0.0.0.0 0.0.0.0 24.x.x.1) and we are using policy based routing on int g1/8 (inside2) to set the next hop and interface to outside2 and the next hop for that interface.
access-list al_inside2_to_outside2 permit ip 192.168.2.0 255.255.255.0 any
route-map inside2-to-outside2 permit 10
match ip address al_inside2_to_outside2
set interface outside2
set ip next-hop 75.x.x.1
I have also added a PBR route-map on the g1/7 (outside2) interface that essentially routes all interface traffic back out to the outside2 next hop as well... (added this after the log output you will see below, same outputs without this route-map)
access-list al_outside2_back_outside2 permit ip host 75.x.x.x any
route-map outside2_back_outside2 permit 10
match ip address al_outside2_back_outside2
set interface outside2
set ip next-hop 75.x.x.1
Normal internet browsing all works as expected and what is my ip from a computer on the inside2 interface shows the outside2 public interface ip address (PAT is enabled on the interface).
To configure the VPN, we configured nat exemption with nat (inside2,outside2) for the interesting traffic and created the proper interesting traffic acl. A second crypto map was created and applied to the outside2 interface. However, we get no connectivity and packet-tracer is showing a drop almost right away and I don't understand what little nuisance I may be overlooking. The logs also output a message of:
Routing failed to locate next hop for UDP from identity:75.x.x.x500 to outside2:173.x.x.x/500
But that doesn't seem to jive with what packet-tracer complains about where it seems to find a correct route:
packet-tracer input inside2 icmp 192.168.2.50 8 0 <ip on other side of tunnel>
provides output of (IPs obviously changed to match example IPs I have used throughout the question):
Any ideas on what I may be missing here?
Also, if I do a packet trace on to try to track the public IP routing between the endpoints (essentially what the logs are complaining it cannot find), I get the following:
*** Then mysteriously drops it ****
Solved! Go to Solution.
10-06-2015 07:53 PM
1. since you have the route-lookup keyword in your nat exemption statement:
10-06-2015 12:04 AM
Also, I tried adding:
access-list allow_all permit ip any any
access-group allow_all global
To the config to try to eliminate a potential implicit access rule from denying the traffic somewhere and still no go.
10-06-2015 07:53 PM
1. since you have the route-lookup keyword in your nat exemption statement:
10-07-2015 08:47 AM
That would be an oversight.
I want them both active, however, I can handle that. I think it was just the route-lookup oversight was the problem, however I will report back and inquire further if it isn't corrected from that.
Greatly appreciate the assistance in pointing that out.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide