01-30-2019 10:24 AM - edited 02-21-2020 09:33 PM
I closed a vpn tunnel but I do not receive traffic because I only send but I do not have a return, they are two CISCO ASA
Packet-Tracer:
01-30-2019 10:25 AM
acp01fwasa01# packet-tracer input outside_internet_link1 icmp 10.61.0.10 0 0 10.51.1.17
Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 10.51.1.17 using egress ifc Servidores
Phase: 2
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (any,any) source static Rede_Escritorio_Botafogo Rede_Escritorio_Botafogo destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp
Additional Information:
NAT divert to egress interface Servidores
Untranslate 10.51.1.17/0 to 10.51.1.17/0
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group outside_internet_link1_access_in in interface outside_internet_link1
access-list outside_internet_link1_access_in extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_2 log disable
object-group network DM_INLINE_NETWORK_3
network-object object Rede_Escritorio_Botafogo
network-object object Rede_Manchete
network-object object Rede_Porto_Acu
network-object object Rede_Toil
network-object object VPN-Pool
network-object object Rede_Azure
network-object object LCS_network_100
network-object object LCS_network_255
object-group network DM_INLINE_NETWORK_2
network-object object Rede_Escritorio_Botafogo
network-object object Rede_Manchete
network-object object Rede_Porto_Acu
network-object object Rede_Toil
network-object object VPN-Pool
network-object object Rede_Azure
network-object object LCS_network_100
network-object object LCS_network_255
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7f1f36990990, priority=13, domain=permit, deny=false
hits=1, user_data=0x7f1f30717b00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=10.61.0.0, mask=255.255.0.0, port=0, tag=any
dst ip/id=10.51.0.0, mask=255.255.240.0, port=0, tag=any, dscp=0x0
input_ifc=outside_internet_link1, output_ifc=any
Phase: 4
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (any,any) source static Rede_Escritorio_Botafogo Rede_Escritorio_Botafogo destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp
Additional Information:
Static translate 10.61.0.10/0 to 10.61.0.10/0
Forward Flow based lookup yields rule:
in id=0x7f1f369054c0, priority=6, domain=nat, deny=false
hits=74, user_data=0x7f1f368fc740, cs_id=0x0, flags=0x0, protocol=0
src ip/id=10.61.0.0, mask=255.255.0.0, port=0, tag=any
dst ip/id=10.51.0.0, mask=255.255.240.0, port=0, tag=any, dscp=0x0
input_ifc=any, output_ifc=any
Phase: 5
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7f1f35aa6e00, priority=0, domain=nat-per-session, deny=true
hits=78560, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=any, output_ifc=any
Phase: 6
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7f1f36521450, priority=0, domain=inspect-ip-options, deny=true
hits=98516, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=outside_internet_link1, output_ifc=any
Phase: 7
Type: SFR
Subtype:
Result: ALLOW
Config:
class-map sfr
match access-list sfr_redirect
policy-map global_policy
class sfr
sfr fail-open
service-policy global_policy global
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7f1f3755eb30, priority=71, domain=sfr, deny=false
hits=13279, user_data=0x7f1f3755dba0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=outside_internet_link1, output_ifc=any
Phase: 8
Type: VPN
Subtype: ipsec-tunnel-flow
Result: DROP
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7f1f38ec5f10, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=550, user_data=0x38994, cs_id=0x7f1f3864b7a0, reverse, flags=0x0, protocol=0
src ip/id=10.61.0.0, mask=255.255.0.0, port=0, tag=any
dst ip/id=10.51.0.0, mask=255.255.240.0, port=0, tag=any, dscp=0x0
input_ifc=outside_internet_link1, output_ifc=any
Result:
output-interface: Servidores
output-status: up
output-line-status: up
Action: drop
01-30-2019 11:38 AM
what is your question two ASA vpn not working?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide