cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
600
Views
0
Helpful
1
Replies

EZVPN Connection Down causes Black Hole while BGP to MPLS is established and updating

haydavis
Level 1
Level 1

I have a router connected to MPLS network for Primary access and EZVPN for back.  MPLS and BGP look stable and routing table is stable. Telnet/Ping access thorugh MPLS to router is good but can not reach anything on the LAN side of the router. Not even next hope. But from the router everyting on LAN side is reachable.  User on the LAN site are unable to get past the MPLS/VPN router.

Logs show repeted Connection down messages.

May 10 21:38:23: %CRYPTO-6-EZVPN_CONNECTION_DOWN: (Client)  User=  Group=guccirro-h-g1  Server_public_addr=

 

Services were restored as soon as  crytpo ipsec client ezvpn crypto_back inside was removed from the Local LAN interface.

Any idea why this would black hole traffic?

!
version 15.2
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime
service timestamps log datetime localtime
service password-encryption
!
hostname <removed>pip-yc188-3264451
!
boot-start-marker
boot system flash0:c2900-universalk9-mz.SPA.152-4.M4.bin
boot system flash0:c2900-universalk9-mz.SPA.152-4.M6a.bin
boot-end-marker
!
!
<enable secret >
!
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authorization commands 15 default group tacacs+ if-authenticated
aaa accounting commands 15 default
 action-type stop-only
 group tacacs+
!
!
!
!
!
!
aaa session-id common
!
ip cef
!
!
!
!


!
!
!
!
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
!
license udi pid CISCO2921/K9 sn FTX1838AN6G
!
!
<username >
!
redundancy
!
!
!
!
!
no ip ftp passive
ip ftp source-interface Loopback0
<ip ftp username >
<ip ftppassword >
!
class-map match-any af43
 match access-group name af43
class-map match-any af42
 match access-group name af42
class-map match-any af41
 match access-group name af41
class-map match-any ef
 match access-group name ef
class-map match-any af21
 match access-group name af21
class-map match-any af12
 match access-group name af12
class-map match-any af31
 match access-group name af31
class-map match-any af13
 match access-group name af13
class-map match-any af32
 match access-group name af32
class-map match-any af23
 match access-group name af23
class-map match-any af33
 match access-group name af33
class-map match-any af22
 match access-group name af22
class-map match-any af11
 match access-group name af11
class-map match-any be
 match access-group name be
class-map match-any drop
 match access-group name drop
class-map match-any besteffort
 match ip dscp default
class-map match-any realtime
 match ip dscp cs5  ef
class-map match-any priority
 match ip dscp cs4  af41  af42  af43
class-map match-any cs1
 match access-group name cs1
class-map match-any cs2
 match access-group name cs2
class-map match-any cs3
 match access-group name cs3
class-map match-any cs4
 match access-group name cs4
class-map match-any cs5
 match access-group name cs5
class-map match-any cs6
 match access-group name cs6
class-map match-any cs7
 match access-group name cs7
class-map match-any catch-marked
 match ip dscp ef
 match ip dscp cs5
 match ip dscp cs4
 match ip dscp af41
 match ip dscp af42
 match ip dscp af43
 match ip dscp cs3
 match ip dscp af31
 match ip dscp af32
 match ip dscp af33
 match ip dscp cs6
 match ip dscp cs7
 match ip dscp cs2
 match ip dscp af21
 match ip dscp af22
 match ip dscp af23
 match ip dscp cs1
 match ip dscp af11
 match ip dscp af12
 match ip dscp af13
class-map match-any missioncritical
 match ip dscp cs3  af31  af32  af33  cs6  cs7
class-map match-any transactional
 match ip dscp cs2  af21  af22  af23
class-map match-any general
 match ip dscp af11  af12  af13
class-map match-any scavenger
 match ip dscp cs1
!
policy-map etm-<removed>
 class realtime
  priority 160
  police 160000 conform-action transmit  exceed-action drop
 class priority
  bandwidth remaining percent 40
  random-detect dscp-based
 class missioncritical
  bandwidth remaining percent 39
  random-detect dscp-based
 class transactional
  bandwidth remaining percent 16
  random-detect dscp-based
 class general
  bandwidth remaining percent 1
  random-detect dscp-based
 class class-default
  bandwidth remaining percent 4
  random-detect dscp-based
policy-map shape-etm-<removed>
 class class-default
  shape average 3400000
   service-policy etm-<removed>
policy-map mark
 class catch-marked
 class ef
  set ip dscp ef
 class cs5
  set ip dscp cs5
 class cs4
  set ip dscp cs4
 class af41
  set ip dscp af41
 class af42
  set ip dscp af42
 class af43
  set ip dscp af43
 class cs3
  set ip dscp cs3
 class af31
  set ip dscp af31
 class af32
  set ip dscp af32
 class af33
  set ip dscp af33
 class cs6
  set ip dscp cs6
 class cs7
  set ip dscp cs7
 class cs2
  set ip dscp cs2
 class af21
  set ip dscp af21
 class af22
  set ip dscp af22
 class af23
  set ip dscp af23
 class cs1
  set ip dscp cs1
 class af11
  set ip dscp af11
 class af12
  set ip dscp af12
 class af13
  set ip dscp af13
 class drop
  drop
 class be
  set ip dscp default
!
!
crypto isakmp keepalive 90 periodic
crypto isakmp nat keepalive 10
!
!
!
!
!
!
crypto ipsec client ezvpn crypto_back
 connect auto
 group <removed>rro-h-g1 key <removed>
 mode network-extension
 peer <removed>
 acl multi-subnet
 flow restrict
 virtual-interface 1
< username >
 xauth userid mode local
!
!
!
!
!
!
interface Loopback0
 description LOOPBACK ADDRESS FOR MANAGEMENT AND NTP
 ip address 172.27.23.31 255.255.255.255
!
interface Loopback1
 description Access Through SGRR Only
 ip address 10.252.28.109 255.255.255.255
!
interface Embedded-Service-Engine0/0
 no ip address
 shutdown
!
interface GigabitEthernet0/0
 description EDBK681M0001    
 bandwidth 4000
 no ip address
 duplex full
 speed 100
 service-policy output shape-etm-<removed>
!
interface GigabitEthernet0/0.42
 bandwidth 4000
 encapsulation dot1Q 42
 ip address <removed> 255.255.255.252
!
interface GigabitEthernet0/1
 description DSL_Circuit
 ip address <removed> 255.255.255.248
 ip access-group firewall in
 no ip unreachables
 ip flow ingress
 ip flow egress
 duplex full
 speed 100
 crypto ipsec client ezvpn crypto_back
!
interface GigabitEthernet0/2
 description Customer LAN
 ip address 172.27.23.149 255.255.255.254 secondary
 ip address 10.54.135.249 255.255.255.248
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip tcp adjust-mss 1360
 duplex full
 speed 100
 crypto ipsec client ezvpn crypto_back inside
 service-policy input mark
!
interface Virtual-Template1 type tunnel
 ip unnumbered GigabitEthernet0/2
 ip mtu 1400
 tunnel mode ipsec ipv4
!
!
router bgp 493
 bgp log-neighbor-changes
 aggregate-address 10.54.135.0 255.255.255.0 summary-only
 redistribute connected route-map CONNECTED-TO-BGP
 redistribute static route-map STATIC-TO-BGP
 neighbor <removed> remote-as 65000
 neighbor <removed> description Verizon Business MPLS Circuit NYC9E02  TenGigE0/0/0/2.37
 neighbor <removed> soft-reconfiguration inbound
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 4.2.2.1 255.255.255.255 <removed>
ip route 8.8.8.8 255.255.255.255 <removed>
ip route 10.52.135.0 255.255.255.0 GigabitEthernet0/2 10.54.135.250 tag 999
ip route 10.54.135.0 255.255.255.0 GigabitEthernet0/2 10.54.135.250 tag 999
ip route <removed> 255.255.255.255 <removed>
ip tacacs source-interface Loopback0
!
ip access-list extended af12
 remark Web-Cache
 permit tcp any eq 8080 any
ip access-list extended af21
 remark FTP
 permit tcp any eq ftp any
 permit tcp any any eq ftp
 permit tcp any eq ftp-data any
 permit tcp any any eq ftp-data
 remark Live Meeting file transfer
 permit tcp any range 6891 6900 any
 permit tcp any any range 6891 6901
ip access-list extended af22
 remark MAIL
 permit tcp any eq smtp any
 permit tcp any any eq smtp
 remark Notes RPC
 permit tcp any eq 1352 any
 permit tcp any any eq 1352
ip access-list extended af31
 permit tcp any eq www any
 permit tcp any any eq www
 permit tcp any eq domain any
 permit tcp any any eq domain
 permit udp any eq domain any
 permit udp any any eq domain
 remark SIP
 permit tcp any eq 5060 any
 permit tcp any any eq 5060
 permit udp any eq 5060 any
 permit udp any any eq 5060
 permit tcp any eq telnet any
 permit tcp any any eq telnet
 remark OCS SIP
 permit tcp any eq 5063 any
 permit tcp any any eq 5063
 remark Live Meeting SIP
 permit tcp any range 5060 5061 any
 permit tcp any any range 5060 5061
ip access-list extended af32
 remark Kerberos
 permit tcp any eq 88 any
 permit tcp any any eq 88
 remark LDAP
 permit tcp any eq 389 any
 permit tcp any any eq 389
 remark Windows SMP
 permit tcp any eq 445 any
 permit tcp any any eq 445
 remark Citrix
 permit tcp any eq 1494 any
 permit tcp any any eq 1494
 remark SQL
 permit tcp any eq 1433 any
 permit tcp any any eq 1433
 remark Remote Desktop
 permit tcp any eq 3389 any
 permit tcp any any eq 3389
ip access-list extended af33
 remark Kerberos
 permit udp any eq 88 any
 permit udp any any eq 88
 remark LDAP
 permit udp any eq 389 any
 permit udp any any eq 389
 remark Citrix
 permit udp any eq 1604 any
 permit udp any any eq 1604
ip access-list extended af41
 remark OCS
 permit tcp any eq 8057 any
 permit tcp any any eq 8057
 permit tcp any range 7100 7103 any
 permit tcp any any range 7100 7103
 permit tcp any range 5350 5353 any
 permit tcp any any range 5350 5353
ip access-list extended af42
 remark Live Meeting
 permit tcp any eq 1503 any
 permit tcp any any eq 1503
ip access-list extended ef
 remark Voice
 permit ip 10.55.28.128 0.0.0.31 any
ip access-list extended firewall
 deny   ip 0.0.0.0 0.255.255.255 any
 deny   ip 10.0.0.0 0.255.255.255 any
 deny   ip 100.64.0.0 0.63.255.255 any
 deny   ip 127.0.0.0 0.255.255.255 any
 deny   ip 172.16.0.0 0.15.255.255 any
 deny   ip 192.0.0.0 0.0.0.255 any
 deny   ip 192.0.2.0 0.0.0.255 any
 deny   ip 192.168.0.0 0.0.255.255 any
 deny   ip 198.18.0.0 0.1.255.255 any
 deny   ip 198.51.100.0 0.0.0.255 any
 deny   ip 224.0.0.0 31.255.255.255 any
 permit esp any any
 permit udp any eq non500-isakmp any
 permit udp any eq isakmp any
 permit icmp any any echo-reply
ip access-list extended multi-subnet
 permit ip 10.52.135.0 0.0.0.255 any
 permit ip 10.54.135.0 0.0.0.255 any
 permit ip host 172.27.23.31 any
 permit ip host 172.27.23.148 any
 permit ip host 10.252.28.109 any
!
ip sla responder
access-list 54 remark customer SNMP access
access-list 54 permit 10.5.24.0 0.0.1.255
access-list 54 permit 10.5.34.0 0.0.0.255
access-list 54 permit 10.3.0.0 0.0.3.255
access-list 54 remark <removed> SNMP access
access-list 66 deny   any
!
route-map CONNECTED-TO-BGP deny 10
 match interface GigabitEthernet0/1 Loopback1
!
route-map CONNECTED-TO-BGP permit 20
!
route-map STATIC-TO-BGP permit 10
 match tag 999
!
!
snmp-server view BLOCK iso included
snmp-server view BLOCK ipAddrEntry.*.*.*.*.* excluded
snmp-server view BLOCK ipAddrEntry.*.<removed> included
snmp-server view BLOCK ipAddrEntry.*.172.27.*.* included
snmp-server view BLOCK ipNetToMediaEntry.*.*.*.*.*.* excluded
snmp-server view BLOCK ipNetToMediaEntry.*.*.<removed> included
snmp-server view BLOCK ipNetToMediaEntry.*.*.172.27.*.* included
snmp-server view BLOCK atEntry.*.*.*.*.*.*.* excluded
snmp-server view BLOCK atEntry.*.*.*.<removed> included
snmp-server view BLOCK atEntry.*.*.*.172.27.*.* included
snmp-server view rtt-view sysUpTime included
snmp-server view rtt-view ciscoPingMIB included
snmp-server view rtt-view ciscoRttMonMIB included
<snmp-server community >
<snmp-server community >
<snmp-server community >
<snmp-server community >
<snmp-server community >
snmp-server ifindex persist
snmp-server trap-source Loopback0
snmp-server location <removed> -   160 N GULPH RD, KING OF PRUSSIA
snmp-server contact Verizon Business 800-256-9284
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity-sensor threshold
snmp-server enable traps config
snmp-server enable traps frame-relay multilink bundle-mismatch
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
<snmp-server host >
<snmp-server host >
tacacs-server timeout 20
tacacs-server directed-request
<tacacs-server key >
!
!
!
control-plane
!
!
privilege exec level 1 traceroute
privilege exec level 1 ping
privilege exec level 1 show ip accounting
privilege exec level 1 show ip interface brief
privilege exec level 1 show ip interface
privilege exec level 1 show ip
privilege exec level 1 show running-config
privilege exec level 1 show configuration
privilege exec level 1 show
privilege exec level 1 clear ip accounting
privilege exec level 1 clear ip
privilege exec level 1 clear
banner login ^CCCC

^C
!
line con 0
 exec-timeout 5 0
<password >
line aux 0
 exec-timeout 30 0
<password >
line 2
 no activation-character
 no exec
 transport preferred none
 transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh
 stopbits 1
line vty 0 4
 exec-timeout 30 0
<password >
 transport input telnet
!
scheduler allocate 20000 1000
ntp update-calendar
!
end

1 Reply 1

patrikmilat
Level 1
Level 1

Seems you are hitting a bug similar to CSCux09048.

Workaround:remove flow restrict under crypto map