07-22-2025 06:56 PM - edited 08-01-2025 04:43 AM
Good evening,
I previously had an IKEv2 Remote Access VPN tunnel working properly on an ASA 5515-X but apparently made some changes that have broken this functionality, so I appreciate any assistance that can be offered in restoring functionality. I have seen failures in both Android and Windows-based devices (the entirety of connection platforms) connecting via Secure Client. Nothing to me is apparently different comparing running-config with saved/archived configurations that were working. The main trustpoint was updated, however I restored the prior working trustpoint and experienced the same issues.
Authentication appears to succeed (visible in sessiondb), the tunnel is built, and then is terminated after just over a minute with the client device never able to pass traffic. All other functionality appears unaffected. I've attached both a log of a connection attempt from ASDM by an Android device and the running configuration of the ASA. Please let me know if you need any other information and I'll do my best to provide it promptly.
Thanks for your time reading this and your assistance working through whatever I have broken!
Edit: Corrected attached CSV encoding per discussions on Page 2.
07-23-2025 04:36 AM
Show ikev2 sa detail
Share this please
MHM
07-23-2025 10:18 AM
Thanks for checking in on this! Here's status with an Android client in limbo (post username authentication):
#sh crypto ikev2 sa detail
IKEv2 SAs:
Session-id:20, Status:UP-ACTIVE, IKE count:1, CHILD count:1
Tunnel-id Local Remote Status Role
255117379 <outside IP>/4500 <remote host>/3863 READY RESPONDER
Encr: AES-GCM, keysize: 256, Hash: N/A, DH Grp:21, Auth sign: RSA, Auth verify: EAP
Life/Active Time: 86400/46 sec
Session-id: 20
Status Description: Negotiation done
Local spi: 3DADFDE3FB7ABFAF Remote spi: 0BFCB880111BF54A
Local id: cn=*.contoso.net (matches primary trustpoint cn)
Remote id: *$AnyConnectClient$*
Local req mess id: 1 Remote req mess id: 6
Local next mess id: 1 Remote next mess id: 6
Local req queued: 1 Remote req queued: 6
Local window: 1 Remote window: 1
DPD configured for 30 seconds, retry 2
NAT-T is detected outside
Assigned host addr: 10.10.0.20
IKEv2 Fragmentation Configured MTU: 576 bytes, Overhead: 28 bytes, Effective MTU: 548 bytes
Child sa: local selector 0.0.0.0/0 - 255.255.255.255/65535
remote selector 10.10.0.20/0 - 10.10.0.20/65535
ESP spi in/out: 0xf3c3ac7d/0x221a3ad5
AH spi in/out: 0x0/0x0
CPI in/out: 0x0/0x0
Encr: AES-GCM, keysize: 256, esp_hmac: N/A
ah_hmac: None, comp: IPCOMP_NONE, mode tunnel
Parent SA Extended Status:
Delete in progress: FALSE
Marked for delete: FALSE
07-23-2025 10:41 AM
<remote host>/3863 <<- issue in your remote Peer' it not use static NAT for port 4500
That why IPsec failed
MHM
07-23-2025 11:03 AM
I wouldn't think that an issue since this is a Remote Access not Site-to-Site; the Android client connects to 4500 on the ASA which is configured for static NAT. I, too, am quite suspect of NAT configuration (though I don't believe that's changed) since I'm passing no traffic after the tunnel establishment.
07-23-2025 11:23 AM
If one of peer behind NAT
Ipsec start use 4500 port' here your asa use 4500 port but remote peer not use that' so traffic is drop.
MHM
07-23-2025 04:20 PM
Thanks much for all your help so far.
I've reviewed the last few years of working configurations and they all match the current running config, including NAT and route rules (as seen in the attached running-config). Is there anything else that might be contributing to this? I wouldn't expect the same version of software and same config to start having problems unprompted.
07-24-2025 02:47 AM
You can have a remote peer behind a dynamic PAT/NAT, the remote port does not need to be 4500.
@lridium what changes where made?
From the ASA enable IKEv2 debugs
debug crypto ikev2 protocol 127
debug crypto ikev2 platform 127
From client side, run DART to collect troubleshooting data, check the output and find the corresponding errors. https://www.cisco.com/c/en/us/support/docs/security/secure-client/221919-collect-dart-bundle-for-secure-client.html
07-24-2025 05:51 AM
Thanks for saving my sanity confirming the remote port, I couldn't find it anywhere to be certain!
Regarding changes, I updated the trustpoint (routine certificate renewal), tested, all worked fine. I went back to delete the old trustpoint and I don't believe I changed anything else in the VPN config (it's possible I did as part of an audit, but that's what I'm unclear on). Minus the trustpoint changes the running configuration is identical (line-by-line review). I've gone back and restored the old trustpoint and rolled back to much older Secure Client versions (just to rule both out) and seen the same behavior. Current testing is with all the latest and greatest (certs and Secure Client).
Regarding further data you suggested, absolutely will do but I'll probably be a day or two before I get that fleshed out and packaged up. I took an initial look at both (the debug and a DART log) a few days ago before I posted but I will rerun and report back from there. Thank you for the response!
07-24-2025 05:56 AM - edited 07-24-2025 05:58 AM
Tunnel-id Local Remote Status Role
255117379 <outside IP>/4500 <remote host>/3863 READY RESPONDER
Encr: AES-GCM, keysize: 256, Hash: N/A, DH Grp:21, Auth sign: RSA, Auth verify: EAP
The authc is success abd hence ikev2 phase1 is ok
Show crypto ipsec sa<<- Ping and check if yoh see any drop
Do packet capture in outside specific upd port 4500 abd see if traffic come from client' if it come and asa drop it then as I mentioned before it issue of remote peer udp port (not 4500)
MHM
07-24-2025 05:58 AM
I'll pull the IPSEC SA for you as soon as I get back local to the network. After the status you quoted above, ping checks failed when I last tested.
07-24-2025 06:06 AM
Yes ping failed but where it failed in asa or remote peer
Capture traffic and do show crypto ipsec sa
You will know excatly where ping is drop or failed
Goodluck
MHM
07-24-2025 06:08 AM
Ping failed from ASA to remote peer's assigned VPN dhcp pool address. Will report back.
07-24-2025 03:14 PM
I check RAVPN can accpet any udp port not only 4500.
MHM
07-24-2025 01:45 PM - edited 07-24-2025 01:52 PM
For @MHM Cisco World and @Rob Ingram , attached are the ipsec and ikev2 sa and the ikev2 debug logs. Suggested ping test shows in "pkts encaps", "encrypt", "digest" and "not compressed" incrementing with no other changes to statistics. I'm still working on putting together a DART to dig into. Thanks for your continued feedback and suggestions.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide