07-06-2018 06:26 AM - edited 03-12-2019 05:26 AM
Hello,
I need your help.
We want to setup Azure S2S VPN tunnel with local Cisco Adaptive Security Appliance Software Version 9.8(2) which is hosted on on Firepower Extensible Operating System Version 2.2(2.52) Hardware: FPR-2110. On Azure connection status VPN still in Connecting state and 0B Data in - 0B Data Out.
Azure S2S setting link : https://docs.microsoft.com/fr-fr/azure/vpn-gateway/vpn-gateway-howto-site-to-site-resource-manager-portal#gatewaysubnet
Cisco ASA VPN setting link : https://docs.microsoft.com/fr-fr/azure/vpn-gateway/vpn-gateway-3rdparty-device-config-cisco-asa#simple-debugging-commands
ASA VPN troubleshooting command:
FIREPOWER2110# debug crypto ikev2 protocol
FIREPOWER2110#
FIREPOWER2110#
FIREPOWER2110# no IKEv2-PROTO-1: (600): Failed to find a matching policy
IKEv2-PROTO-1: (600): Received Policies:
IKEv2-PROTO-1: (600): Failed to find a matching policy
IKEv2-PROTO-1: (600): Expected Policies:
IKEv2-PROTO-1: (600): Failed to find a matching policy
IKEv2-PROTO-1: (600):
IKEv2-PROTO-1: (600): Initial exchange failed
IKEv2-PROTO-1: (600): Initial exchange failed
IKEv2-PROTO-1: (921): Failed to find a matching policy
IKEv2-PROTO-1: (921): Received Policies:
IKEv2-PROTO-1: (921): Failed to find a matching policy
IKEv2-PROTO-1: (921): Expected Policies:
IKEv2-PROTO-1: (921): Failed to find a matching policy
IKEv2-PROTO-1: (921):
IKEv2-PROTO-1: (921): Initial exchange failed
IKEv2-PROTO-1: (921): Initial exchange failed
FIREPOWER2110# debug crypto ikev2 timers
FIREPOWER2110#
FIREPOWER2110#
FIREPOWER2110# IKEv2-TIMER: Setting an IKEv2 timer of type DPD Timer for 10 seconds with 0% jitter
IKEv2-TIMER: Created an IKEv2 timer of type Parent SA rekey
IKEv2-TIMER: Created an IKEv2 timer of type Parent SA Lifetime
IKEv2-TIMER: Created an IKEv2 timer of type Wait for Auth Msg Timer
IKEv2-TIMER: Created an IKEv2 timer of type External service timeout
IKEv2-TIMER: Setting an IKEv2 timer of type External service timeout for 25 seconds with 0% jitter
IKEv2-TIMER: Destroying an IKEv2 timer of type External service timeout
IKEv2-TIMER: Created an IKEv2 timer of type Retransmission timer
IKEv2-TIMER: Created an IKEv2 timer of type Delete Neg Ctx timer
IKEv2-TIMER: Destroying an IKEv2 timer of type Retransmission timer
IKEv2-TIMER: Destroying an IKEv2 timer of type Delete Neg Ctx timer
IKEv2-TIMER: Destroying an IKEv2 timer of type Wait for Auth Msg Timer
IKEv2-TIMER: Destroying an IKEv2 timer of type Parent SA rekey
IKEv2-TIMER: Destroying an IKEv2 timer of type Parent SA Lifetime
IKEv2-TIMER: Setting an IKEv2 timer of type DPD Timer for 10 seconds with 0% jitter
IKEv2-TIMER: Setting an IKEv2 timer of type DPD Timer for 10 seconds with 0% jitter
IKEv2-TIMER: Setting an IKEv2 timer of type DPD Timer for 10 seconds with 0% jitter
IKEv2-TIMER: Setting an IKEv2 timer of type DPD Timer for 10 seconds with 0% jitter
IKEv2-TIMER: Setting an IKEv2 timer of type DPD Timer for 10 seconds with 0% jitter
IKEv2-TIMER: Setting an IKEv2 timer of type DPD Timer for 10 seconds with 0% jitter
FIREPOWER2110# show crypto ikev2 stats
Global IKEv2 Statistics
Active Tunnels: 0
Previous Tunnels: 0
In Octets: 6741260
In Packets: 10873
In Drop Packets: 0
In Drop Fragments: 0
In Notifys: 21746
In P2 Exchange: 0
In P2 Exchange Invalids: 0
In P2 Exchange Rejects: 0
In IPSEC Delete: 0
In IKE Delete: 0
Out Octets: 391428
Out Packets: 10873
Out Drop Packets: 0
Out Drop Fragments: 0
Out Notifys: 10873
Out P2 Exchange: 0
Out P2 Exchange Invalids: 0
Out P2 Exchange Rejects: 0
Out IPSEC Delete: 0
Out IKE Delete: 0
SAs Locally Initiated: 0
SAs Locally Initiated Failed: 0
SAs Remotely Initiated: 0
SAs Remotely Initiated Failed: 10873
07-06-2018 06:40 AM
double check Ikev2 parameters at both ends: PSK, hash, DH group and lifetime, they need to match. i am not seeing phase 1 established in your case. so check and double check
07-10-2018 04:27 AM
Hi @Dennis Mink,
We have not any possibility to check PSk, hash, DH group and lifetime on Azure side.
07-10-2018 05:09 AM - edited 07-10-2018 05:11 AM
What is the good or best ASA S2S VPN configuration that you suggest to me.
A methode which run in another situation or case. Any link or file will be appreciate.
07-10-2018 11:48 AM
Have you tried following this config guide:
That document has both ASA and Azure side configurations to be made.
08-27-2018 12:38 PM
08-28-2018 07:36 AM
Paste the full output for
"packet-tracer input Inside icmp Local_machine 8 0 Azure_VM detailed"
Also change your second packet tracer command to the below (ASA 9.9 and above):
"packet-tracer input Outside icmp Azure_VM 8 0 Local_machine detailed decrypted"
08-28-2018 10:49 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide