04-07-2021 12:16 AM
Dear Team,
We have created IPSEC Tunnel between CISCO ASA and Azure cloud. but some time it is automatically down and traffic not passed. when tunnel down we initiate traffic from ASA and and tunnel up. why this happen.VPN and AnyConnect, IPSec
04-07-2021 12:18 AM
Is there any faction need to enable to avoid Tunnel idle mode
04-07-2021 12:40 AM
I came across issue with a client at Azure when we configured the vpn as policy based on the ASA this vpn was keep dropping into order to fix the issue we created a new vpn with route based never had issues since.
I guess in your case when there is not traffic in between these tunnel the tunnel tear down itself. there are few step you can take in account. keep the contant ping running from your end point (local network to remote network)
or either you can setup eem here is the example https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118087-technote-asa-00.html
04-07-2021 01:16 AM
tunnel is every down every 30 min.
04-07-2021 02:27 AM
Enter the vpn-idle-timeout command in group-policy configuration mode or in username configuration mode in order to configure the user timeout period:
hostname(config)#group-policy DfltGrpPolicy attributes hostname(config-group-policy)#vpn-idle-timeout none
Configure a maximum amount of time for VPN connections with the vpn-session-timeout command in group-policy configuration mode or in username configuration mode:
hostname(config)#group-policy DfltGrpPolicy attributes hostname(config-group-policy)#vpn-session-timeout none
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: