cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1198
Views
0
Helpful
1
Replies

Cisco ASA 5505 Ipsec VPN and random connection dropping issues.

Belnetsolutions
Level 1
Level 1

Hello,


We are currently having issues with a ASA 5505 Ipsec VPN. It was configured about 7-8 months ago and has been running very well..up until the last few weeks.  For some reason, the VPN tends to randomly disconnect any user clients connected a lot.  Furthermore, sometimes it actually connects; however does not put us on the local network for some reason and unable to browse file server.  We have tried rebooting the ASA a few times and our ISP Time Warner informed us there are no signs of packet loss but still unable to pinpoint the problem.  Sometimes users close out of VPN client completely, reopen several times and then it works.  However it's never really consistent enough and hasn't been the last few weeks.  No configuration changes have been made to ASA at all.  Furthermore, the Cisco Ipsec VPN client version is: 5.0.70


Directly below is our current running config (modded for public).  Any help or ideas would be greatly appreciated.  Otherwise, if everything looks good...then I will defer back to our ISP Time Warner:

: Saved

:

ASA Version 8.4(2)

!

hostname domainasa

domain-name adomain.local

enable password cTfsR84pqF5Xohw. encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

interface Vlan1

nameif inside

security-level 100

ip address 192.168.2.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address 205.101.1.240 255.255.255.248

!

ftp mode passive

clock timezone EST -5

clock summer-time EDT recurring

dns domain-lookup inside

dns domain-lookup outside

dns server-group DefaultDNS

name-server 192.168.2.60

domain-name adomain.local

same-security-traffic permit intra-interface

object network obj_any

subnet 0.0.0.0 0.0.0.0

object network SBS_2011

host 192.168.2.60

object network NETWORK_OBJ_192.168.2.0_24


subnet 192.168.2.0 255.255.255.0

object network NETWORK_OBJ_192.168.5.192_

27

subnet 192.168.5.192 255.255.255.224

object network Https_Access

host 192.168.2.90

description Spam Hero

object-group network DM_INLINE_NETWORK_1

network-object object SPAM1

network-object object SPAM2

network-object object SPAM3

network-object object SPAM4

network-object object SPAM5

network-object object SPAM6

network-object object SPAM7

network-object object SPAM8

object-group service RDP tcp

description Microsoft RDP

port-object eq 3389

access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_1 object SBS_2011 eq smtp

access-list outside_access_in extended permit tcp any object SBS_2011 eq https

access-list outside_access_in extended permit icmp any interface outside

access-list outside_access_in remark External RDP Access

access-list outside_access_in extended permit tcp any object SBS_2011 object-group RDP

access-list domain_splitTunnelAcl standard permit 192.168.2.0 255.255.255.0

pager lines 24

logging asdm informational

mtu inside 1500

mtu outside 1500

ip local pool test 192.168.10.1-192.168.10.5 mask 255.255.255.0

ip local pool VPN_Users 192.168.5.194-192.168.5.22

0 mask 255.255.255.0

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

nat (inside,outside) source static NETWORK_OBJ_192.168.2.0_24

NETWORK_OBJ_192.168.2.0_24

destination static NETWORK_OBJ_192.168.5.192_

27 NETWORK_OBJ_192.168.5.192_

27 no-proxy-arp route-lookup

!

object network obj_any

nat (inside,outside) dynamic interface

object network SBS_2011

nat (inside,outside) static interface service tcp smtp smtp

object network Https_Access

nat (inside,outside) static interface service tcp https https

!

nat (inside,outside) after-auto source dynamic any interface

access-group outside_access_in in interface outside

route outside 0.0.0.0 0.0.0.0 205.101.1.239 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-reco

rd DfltAccessPolicy

user-identity default-domain LOCAL

http server enable

http 192.168.2.0 255.255.255.0 inside

http 192.168.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart

crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP

crypto map outside_map interface outside

crypto ikev1 enable outside

crypto ikev1 policy 10

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

telnet 192.168.2.0 255.255.255.0 inside

telnet timeout 5

ssh timeout 5

console timeout 0


dhcpd address 192.168.2.160-192.168.2.19

9 inside

dhcpd dns 192.168.2.60 24.29.99.36 interface inside

dhcpd wins 192.168.2.60 24.29.99.36 interface inside

dhcpd domain adomain interface inside

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

group-policy domain internal

group-policy domain attributes

wins-server value 192.168.2.60

dns-server value 192.168.2.60

vpn-tunnel-protocol ikev1

split-tunnel-policy tunnelspecified

split-tunnel-network-list value domain_splitTunnelAcl

default-domain value adomain.local

username ben password zWCAaitV3CB.GA87 encrypted privilege 0

username ben attributes

vpn-group-policy domain

username sdomain password FATqd4I1ZoqyQ/MN encrypted

username sdomain attributes

vpn-group-policy domain

username adomain password V5.hvhZU4S8NwGg/ encrypted

username adomain attributes

vpn-group-policy domain

service-type admin

username jdomain password uODal3Mlensb8d.t encrypted privilege 0

username jdomain attributes

vpn-group-policy domain

service-type admin

tunnel-group domain type remote-access

tunnel-group domain general-attributes

address-pool VPN_Users

default-group-policy domain

tunnel-group domain ipsec-attributes

ikev1 pre-shared-key *****

!

class-map inspection_default

match default-inspection-traffic


!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect rsh

  inspect rtsp

  inspect esmtp

  inspect sqlnet

  inspect skinny 

  inspect sunrpc

  inspect xdmcp

  inspect sip 

  inspect netbios

  inspect tftp

  inspect ip-options

  inspect icmp

!

service-policy global_policy global

prompt hostname context

no call-home reporting anonymous

Cryptochecksum:e2466a5b754

eebcdb0cef

f051bef91d

9

: end

no asdm history enable


Thanks again

1 Reply 1

Julio Carvajal
VIP Alumni
VIP Alumni

Hello Belnet,

What do the logs show from the ASA.

Can you post them ??

Any other question..Sure..Just remember to rate all of the community answers.

Julio

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC