08-06-2008 04:45 AM - edited 02-21-2020 03:52 PM
Hi,
I'm trying to build en Easy VPN connection between two ASA5505's. Initial configuration was simple and the tunnel is up. The problem is that I can't get any packets trough. A packet-trace in ASDM on the remote site reports IPSec spoof detected.
Any ideas?
08-06-2008 05:03 AM
Can you post your configs for a review - remove sensitive information.
HTH>
08-06-2008 05:53 AM
08-06-2008 06:18 AM
That config look sport on - if there is an issue it might be with the server end, below is a config example - check yours against it for anything that jumps out:-
HTH>
08-06-2008 07:12 AM
Hi,
I had already read that article. There are some differences between the config in the example and the serverside runningconfig. Unfortunately I cannot find the exact problem. I will post the serverside runningconfig tomorrow and would appriciate it if you would take a peek at it.
Tanks in advance...
08-06-2008 07:16 AM
sure no problem.
08-07-2008 02:23 AM
08-07-2008 06:24 AM
try to issue the following comman
no crypto dynamic-map outside_dyn_map 20 set nat-t-disable
08-07-2008 06:47 AM
Thanks for your reply.
I changed the serverside config, but still can't ping to a machine behind the client ASA.
08-07-2008 06:51 AM
have u added RRI
reverse route injuction?
08-07-2008 07:15 AM
On the serverside I have added:
crypto dynamic-map outside_dyn_map 20 set reverse-route
Still no go...
10-02-2008 06:43 AM
I'm trying to do the same thing you are: Establishing a VPN using the ASA5505 when it is behind a NAT. Did you have to open/forward any ports from the NAT device to the ASA5505 to get the VPN connection working?
10-02-2008 06:50 AM
if u case like
internet---nat device--ASA--internal
and the vpn on the ASA
u need first static nat or portforward from the nat device to the ASA
u need the folling ports opned and nated staticly
esp
udp 500
and mybe udp 4500
to get the tunnel established
if helpful Rate
10-02-2008 09:43 PM
Setup is like:
Lan1 --- ASA1 --- internet --- NAT_device --- ASA2 -- LAN2
Tunnel will be initiated from ASA2 to ASA1, shouldn't the nat device handle all natting dynamicaly?
10-03-2008 09:13 AM
Hi,
Can you enable NAT-T globally on both end ASAs and then check .
"isakmp nat-traversal 20 "
http://www.cisco.com/en/US/docs/security/asa/asa70/configuration/guide/ike.html#wp1052899
When NAT-T is enabled , the ESP packets,(which actually vcarries data payload) which gets blocked by PAT/NAT, gets encapsulated in UDP 4500 packets and since it now has ports it can easily pass through PAT.
HTH
Saju
Pls rate helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide