cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1737
Views
5
Helpful
3
Replies

Cisco ASA VPN phase 2 down

Jay Joshi
Level 1
Level 1

Hello,

I have a site to site VPN in working condition however when one of the two network object was removed on each ends, the VPN is non-functional. The subnet was removed on both ends and currently I am seeing phase 1 up but phase 2 is down.

When I type show crypto ipsec sa peer , I do not find any ipsec sa formation. Phase 1 is still up.


Please see logs below :


"IPSEC(crypto_map_check)-3: Looking for crypto map matching 5-tuple: Prot=1, saddr=172.16.XX.XX, sport=5376, daddr=10.176.255.254, dport=5376

IPSEC(crypto_map_check)-3: Checking crypto map mymap 127: matched.

Jan 19 10:20:37 [IKEv1 DEBUG]Pitcher: received a key acquire message, spi 0x0

IPSEC(crypto_map_check)-3: Looking for crypto map matching 5-tuple: Prot=1, saddr=172.16.28.162, sport=5376, daddr=10.176.255.254, dport=5376

IPSEC(crypto_map_check)-3: Checking crypto map mymap 127: matched.

 [IKEv1]IP = 8.39.XX.XX, IKE Initiator: New Phase 1, Intf inside, IKE Peer 8.39.XX.XX local Proxy Address 172.16.28.0, remote Proxy Address 10.176.0.0, Crypto map (mymap)

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing ISAKMP SA payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing NAT-Traversal VID ver 02 payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing NAT-Traversal VID ver 03 payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing NAT-Traversal VID ver RFC payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing Fragmentation VID + extended capabilities payload

 [IKEv1]IP = 8.39.XX.XX, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 552

 [IKEv1]IKE Receiver: Packet received on 10.230.1.123:500 from 8.39.XX.XX:500

 [IKEv1]IP = 8.39.XX.XX, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108

 [IKEv1 DEBUG]IP = 8.39.XX.XX, processing SA payload
 [IKEv1 DEBUG]IP = 8.39.XX.XX, Oakley proposal is acceptable
 [IKEv1 DEBUG]IP = 8.39.XX.XX, processing VID payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, Received NAT-Traversal RFC VID

[IKEv1 DEBUG]IP = 8.39.XX.XX, constructing ke payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing nonce payload
 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing Cisco Unity VID payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing xauth V6 VID payload
 [IKEv1 DEBUG]IP = 8.39.XX.XX, Send IOS VID

 [IKEv1 DEBUG]IP = 8.39.XX.XX, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)

[IKEv1 DEBUG]IP = 8.39.XX.XX, constructing VID payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, Send Altiga/Cisco VPN3000/Cisco ASA GW VID

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing NAT-Discovery payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, computing NAT Discovery hash

 [IKEv1 DEBUG]IP = 8.39.XX.XX, constructing NAT-Discovery payload

 [IKEv1 DEBUG]IP = 8.39.XX.XX, computing NAT Discovery hash

[IKEv1]IP = 8.39.XX.XX, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 304

[IKEv1]IKE Receiver: Packet received on 10.230.1.123:500 from 8.39.XX.XX:500

 [IKEv1]IP = 8.39.XX.XX, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (20) + NAT-D (20) + NONE (0) total length : 304

 [IKEv1 DEBUG]IP = 8.39.XX.XX, processing ke payload"

3 Replies 3

MANI .P
Level 1
Level 1

Hi ,

i think this will be up till the lifetime as you mentioned on Phase 1. 

thanks,

Mani.P

Hello Mani,

Thanks for your reply.
Phase 1 of VPN is constant. I do not see any impact of lifetime. Phase 2 never came up once the ACL/Network object was changed on either ends.

Regards,

Jay Joshi

This VPN is configured between a router and a firewall (ASAv). The reason why phase two did not come up because ASAv was not able to initiate the VPN because of NAT rule configured on ASAv - this created a mismatch of IP addresses.

When the VPN was initiated from router, VPN came up. As a permanent solution to this, match identity address 0.0.0.0 had to be added on router.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: