11-11-2010 06:04 AM
Hi,
I can not get the traffic to flow between my VPN clients and one of my remote site-to-site vpns, I have done step by step in this link:
my firewall is saying the packet is dropped by statefull inspection.
But that should be "same-security-traffic......" command there should fix this
%ASA-6-302020: Built inbound ICMP connection for faddr 10.45.231.163/1 gaddr 10.48.100.2/0 laddr 10.48.100.2/0 (nworks)
%ASA-6-302020: Built outbound ICMP connection for faddr 10.48.100.2/0 gaddr 10.45.231.163/1 laddr 10.45.231.163/1
%ASA-6-302021: Teardown ICMP connection for faddr 10.45.231.163/1 gaddr 10.48.100.2/0 laddr 10.48.100.2/0 (nworks)
%ASA-6-302021: Teardown ICMP connection for faddr 10.48.100.2/0 gaddr 10.45.231.163/1 laddr 10.45.231.163/1
Is there anything you could think of that I'm missing?
Best regards,
Erik
Solved! Go to Solution.
11-11-2010 05:09 PM
Erik,
Please check it out because no decaps means the ASA is not receiving anything back from the other side through the tunnel.
If you send traffic and you see the encrypts increment... but nothing back... 99% sure the problem is on the other end.
Federico.
11-11-2010 06:08 AM
Hi,
You want to send the traffic from a VPN client through the site-to-site correct?
The same-security-traffic.. should take care of the u-turn...
You also need to check that NAT (or no-NAT) is configured correctly.
Which OS version is the ASA running?
Are you positive that the Site-to-Site LAN is included in the split-tunneling for the VPN clients and that the VPN range is include in the Site-to-Site interesting traffic?
Federico.
11-11-2010 06:27 AM
Here is everything I have configured, so fare for this.
The Client vpn tunnel is working fine to the internal network
The site-to-site is working fine to all internal networks on 10.45.0.0 /16
It is only 10.45.231.0/24 there is not working.
crypto tunnel to site-to-site tunnel
access-list outside_2_cryptomap extended permit ip 10.45.0.0 255.255.0.0 10.48.100.0 255.255.252.0
No nat
nat (inside) 0 access-list inside_nat0_outbound
access-list inside_nat0_outbound extended permit ip 10.45.0.0 255.255.0.0 10.48.100.0 255.255.252.0
access-list inside_nat0_outbound extended permit ip any 10.45.231.0 255.255.255.0
VPN poop for VPN clients:
ip local pool VPN 10.45.231.1-10.45.231.128 mask 255.255.255.0
group-policy home internal
group-policy home attributes
wins-server value 10.45.254.4 10.45.254.71
dns-server value 10.45.254.4 10.45.254.71
dhcp-network-scope 10.45.231.0
vpn-tunnel-protocol IPSec svc
split-tunnel-policy tunnelspecified
split-tunnel-network-list value clients-polen
split-tunneling:
access-list clients-polen standard permit10.45.0.0 255.255.0.0
access-list clients-polen standard permit 10.48.100.0 255.255.252.0
Best regards,
Erik Jacobsen
11-11-2010 06:29 AM
Sorry forgot to add this to the tred.
This is also configured.
same-security-traffic permit intra-interface
Erik
11-11-2010 06:39 AM
Can you include:
sh run nat
To make sure there's no NAT being done on the outside interface.
Also, please check the ''sh asp drop'' when trying to access the 10.48.100.x from the VPN clients to see if the ASA reports any encryption problems.
What should happen is the following:
The VPN clients (10.45.231.0/25) traffic should be received by the ASA and redirected back-out the same interface via the Site-to-Site.
The configuration seems fine.
Check the following and also do this:
packet-tracer input outside icmp 8 0 10.45.231.1 10.48.100.1 det
This will let the ASA report if any process is conflicting with this connection.
Federico.
11-11-2010 06:56 AM
ASAfirewall# sh run nat
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 10.45.0.0 255.255.0.0
ASAfirewall# sh asp drop
Frame drop:
Flow is denied by configured rule (acl-drop) 63
NAT-T keepalive message (natt-keepalive) 12
TCP RST/FIN out of order (tcp-rstfin-ooo) 3
FP L2 rule drop (l2_acl) 1
Last clearing: 15:50:17 GMT+1 Nov 11 2010 by enable_15
Flow drop:
NAT failed (nat-failed) 34
Last clearing: 15:50:17 GMT+1 Nov 11 2010 by enable_15
ASAfirewall#
ASAfirewall# packet-tracer input outside icmp 10.45.231.160 8 0 10.48.100.2 det
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0xd7b88b58, priority=1, domain=permit, deny=false
hits=155445, user_data=0x0, cs_id=0x0, l3_type=0x8
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0100.0000.0000
Phase: 2
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 3
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 outside
Phase: 4
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0xd7de0560, priority=11, domain=permit, deny=true
hits=7, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
ASAfirewall#
11-11-2010 07:21 AM
Here is the version: System image file is "disk0:/asa822-k8.bin"
Erik
11-11-2010 08:00 AM
It seems the flow is being denied by the ACL.
Please post:
sh run access-group
This means there must be an ACL applied to the outside interface that is denying the traffic.
Do this also:
sh run all sysopt
Check that:
sysopt connection permit-ipsec or sysopt connection permit-vpn
is showing in the configuration.
Federico.
11-11-2010 01:41 PM
ASAfirewall# sh run all sysopt
no sysopt connection timewait
sysopt connection tcpmss 1380
sysopt connection tcpmss minimum 0
sysopt connection permit-vpn
sysopt connection reclassify-vpn
no sysopt connection preserve-vpn-flows
no sysopt nodnsalias inbound
no sysopt nodnsalias outbound
no sysopt radius ignore-secret
no sysopt noproxyarp outside
no sysopt noproxyarp inside
no sysopt noproxyarp Guest-lan
no sysopt noproxyarp WEB-dmz
no sysopt noproxyarp Radiator
no sysopt noproxyarp management
And yes there is a access-list on the outside, but I can not see what that have to do with anything, since VPN tunnels bypass the interface access-lists
ASAfirewall# sh run access-group
access-group ipsec in interface outside
There is a few static nat to internal servers, there have to be open for from the outside.
Erik
11-11-2010 01:48 PM
Perhaps the packet-tracer result is not accurate because the ASA sees this traffic coming from the outside and it thinks it will be denied by the ACL (when truly is coming via an IPsec tunnel).
Anyway...
Can you check if there's an IPsec SA being built for traffic between the VPN client and the remote Site-to-Site LAN?
When you connect the VPN client and try to access the remote LAN, check the ''sh cry ips sa'' and check if for the VPN tunnel there's an IPsec SA for getting to the remote site.
This will show us if the ASA is encrypting this traffic.
Federico.
11-11-2010 02:03 PM
now there is not that many on, the it actually look like there is a problem at the remote site-to-site
Because when I look at second there is opening the connection to the remote site-to-site, there is no decaps packet.
My ip address is "10.45.231.162" vpn client
Remote site-to-site is 10.48.100.2
Crypto map tag: SYSTEM_DEFAULT_CRYPTO_MAP, seq num: 65535, local addr: 80.167.237.203
local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
remote ident (addr/mask/prot/port): (10.45.231.162/255.255.255.255/0/0)
current_peer: 87.59.133.103, username: nworks
dynamic allocated peer ip: 10.45.231.162
#pkts encaps: 363, #pkts encrypt: 377, #pkts digest: 377
#pkts decaps: 381, #pkts decrypt: 381, #pkts verify: 381
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 377, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
local crypto endpt.: 80.167.237.203/4500, remote crypto endpt.: 87.59.133.103/59789
path mtu 1500, ipsec overhead 82, media mtu 1500
current outbound spi: 48D63AF3
current inbound spi : 7B41C78A
inbound esp sas:
spi: 0x7B41C78A (2067908490)
transform: esp-aes esp-sha-hmac no compression
in use settings ={RA, Tunnel, NAT-T-Encaps, }
slot: 0, conn_id: 102400, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP
sa timing: remaining key lifetime (sec): 28735
IV size: 16 bytes
replay detection support: Y
Anti replay bitmap:
0xFFFFFFFF 0xFFFFFFFF
outbound esp sas:
spi: 0x48D63AF3 (1221999347)
transform: esp-aes esp-sha-hmac no compression
in use settings ={RA, Tunnel, NAT-T-Encaps, }
slot: 0, conn_id: 102400, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP
sa timing: remaining key lifetime (sec): 28699
IV size: 16 bytes
replay detection support: Y
Anti replay bitmap:
0x00000000 0x00000001
Crypto map tag: outside_map, seq num: 2, local addr: 80.167.237.203
access-list outside_2_cryptomap extended permit ip 10.45.0.0 255.255.0.0 10.48.100.0 255.255.252.0
local ident (addr/mask/prot/port): (Ista-net/255.255.0.0/0/0)
remote ident (addr/mask/prot/port): (10.48.100.0/255.255.252.0/0/0)
current_peer: 91.213.156.24
#pkts encaps: 6, #pkts encrypt: 6, #pkts digest: 6
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 6, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
local crypto endpt.: 80.167.237.203, remote crypto endpt.: 91.213.156.24
path mtu 1500, ipsec overhead 74, media mtu 1500
current outbound spi: 49839E35
current inbound spi : 28373C87
inbound esp sas:
spi: 0x28373C87 (674708615)
transform: esp-aes-256 esp-sha-hmac no compression
in use settings ={L2L, Tunnel, PFS Group 5, }
slot: 0, conn_id: 8192, crypto-map: outside_map
sa timing: remaining key lifetime (kB/sec): (3915000/28408)
IV size: 16 bytes
replay detection support: Y
Anti replay bitmap:
0x00000000 0x00000001
outbound esp sas:
spi: 0x49839E35 (1233362485)
transform: esp-aes-256 esp-sha-hmac no compression
in use settings ={L2L, Tunnel, PFS Group 5, }
slot: 0, conn_id: 8192, crypto-map: outside_map
sa timing: remaining key lifetime (kB/sec): (3914999/28408)
IV size: 16 bytes
replay detection support: Y
Anti replay bitmap:
0x00000000 0x00000001
11-11-2010 02:15 PM
there is only one problem, I don't control the other end of the site-to-site VPN tunnel, so I have just written to them and get them to confirm that the tunnel is setup correctly.
I'm just pretty sure that we already have tested some other nets on 10.45.x.x.
But just to be sure. Because it does not really make sense.
Erik
11-11-2010 05:09 PM
Erik,
Please check it out because no decaps means the ASA is not receiving anything back from the other side through the tunnel.
If you send traffic and you see the encrypts increment... but nothing back... 99% sure the problem is on the other end.
Federico.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide