04-01-2016 04:11 PM
Hi, I encountered a situation that may totally change my understanding of how IPsec works ..., I need you guys help to clear my doubts. Refer to the following topology:
HostA(70.36.241.106) -----My VPN GW ----- Internet ----- Customer VPN GW (ASA) ---- Customer Internal network --- HostB(66.95.19.46)
Host A in my side needs to talk to host B in customer side securely over Internet, so we set up an IPsec tunnel between my VPN GW and Customer's VPN gateway with mirroring ACL (permit ip host 70.36.241.106 host 66.95.19.46), we reverse inject the /32 routes to our internal network, everything is fine, IPsec P1/P2 came up, we can ping each other, everything, IPsec security association in my side clearly shows that only traffic between the two /32 hosts is being encrypted.
But when I traceroute from my side HostA to customer side Host B, I see RFC1918 hops behind customer VPN GW in traceroute output, I am baffled, I can understand that customer will use RFC1918 addresses in their internal network, but how could those TTL expiration ICMP packets get passed beyond their side ASA? the traffic obviously does not match the crypto ACL, I expect to see *s until the last hop in my traceroute output.
Please help...
04-02-2016 01:46 PM
can you show the output of the trace route
04-03-2016 12:30 AM
hostA#sudo traceroute -In 66.95.19.46
traceroute to 66.94.19.46 (66.95.19.46), 30 hops max, 60 byte packets
1 169.254.44.186 76.586 ms 76.579 ms 76.578 ms
2 70.36.241.102 82.674 ms 82.674 ms 82.780 ms <please ignore the first two hops>
3 172.24.10.33 103.143 ms 103.255 ms 103.727 ms
4 10.184.96.42 104.748 ms 105.272 ms 106.007 ms
5 10.177.6.193 107.386 ms 107.529 ms 108.696 ms
6 172.24.0.178 108.795 ms 98.856 ms 100.991 ms
7 10.174.66.4 100.868 ms 100.308 ms 100.302 ms
8 10.174.66.11 100.596 ms 98.917 ms 98.966 ms
9 66.95.19.46 99.004 ms 98.888 ms 98.939 ms
04-03-2016 01:29 AM
ok what are the IP addresses of the VPN gateways?
04-03-2016 08:25 AM
my side is 70.36.241.102, customer side is 97.65.105.5, not sure how this is related, ipsec is operating at tunnel mode.
04-03-2016 03:26 PM
so at the remote end is 172.24.10.33 the first address it hits on the customer network?
04-03-2016 07:13 PM
Yes, it appears to be the case,any wild guess why ASA is behaving this way? I am sorry, I really don't get the questions you've been asking and which direction you are alluding to.
04-03-2016 07:39 PM
well it looks as if the customers ASA has not been setup correctly, you should be seeing the * * * from those addresses
do you have the relevant ASA configuration
04-03-2016 07:43 PM
Yes, I checked the snippet of ASA, and as I mentioned in my original post, the crypto ACL is /32 host to host, otherwise phase II won't come up, right?
04-03-2016 09:59 PM
On the ASA can you do a
"show crypto ipsec sa peer 70.36.241.102"
see what SAs are active
04-03-2016 11:31 PM
ASA5555-1# sh ipsec sa peer 70.36.241.102
peer address: 70.36.241.102
Crypto map tag: CoreNET_VPN, seq num: 930, local addr: 97.65.105.5
access-list Crypto_ACL extended permit ip host 66.95.19.46 host 70.36.241.106
local ident (addr/mask/prot/port): (66.95.19.46/255.255.255.255/0/0)
remote ident (addr/mask/prot/port): (70.36.241.106/255.255.255.255/0/0)
current_peer: 70.36.241.102
04-04-2016 12:08 AM
can you show me the full output from that command
04-04-2016 08:07 AM
There is nothing suspicious there, just counters ... Thank you for your time.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide