05-08-2015 10:30 AM - edited 02-21-2020 08:13 PM
Is there any easy way to determine the cause of an ipsec l2l VPN tunnel dropping on an asa 5510? I have logging enabled but, the buffer gets filled up so fast, I can't find anything when it's 24 hours later. I'm working on getting a syslog server/aggregator setup but... until it's complete I need a temporary measure. Suggestions?
Solved! Go to Solution.
05-08-2015 10:57 AM
Hi Jessica.
For the buffered limit you can try :
Increase the buffer size to the max.
limit the logs to the vpn class:
Logging class vpn buffered debugging.
On the other hand you can try the debugs :
Debug crypto condition peer peer_address
debug cry isa 128
debug cry ipsec 128
If you lose the ssh session the debugs will be disabled. Finally for the vpn tunnels usually it goes down due to :
Idle timeout
dead peer detection
delete from other end.
HTH.
05-08-2015 10:57 AM
Hi Jessica.
For the buffered limit you can try :
Increase the buffer size to the max.
limit the logs to the vpn class:
Logging class vpn buffered debugging.
On the other hand you can try the debugs :
Debug crypto condition peer peer_address
debug cry isa 128
debug cry ipsec 128
If you lose the ssh session the debugs will be disabled. Finally for the vpn tunnels usually it goes down due to :
Idle timeout
dead peer detection
delete from other end.
HTH.
05-08-2015 02:05 PM
I can't use the debugs because the drop is intermittently occurring anywhere from 1-5 days apart...
03-07-2019 09:20 AM
@Mohammad Alhyari - Do you have any response to this ticket reply?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide