cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1434
Views
0
Helpful
2
Replies

ipsec-tunnel-flow aciton drop

Wallace Lopes
Level 1
Level 1

I closed a vpn tunnel but I do not receive traffic because I only send but I do not have a return, they are two CISCO ASA

Packet-Tracer:

 

 

2 Replies 2

Wallace Lopes
Level 1
Level 1

acp01fwasa01# packet-tracer input outside_internet_link1 icmp 10.61.0.10 0 0 10.51.1.17

Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 10.51.1.17 using egress ifc  Servidores

Phase: 2
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (any,any) source static Rede_Escritorio_Botafogo Rede_Escritorio_Botafogo destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp
Additional Information:
NAT divert to egress interface Servidores
Untranslate 10.51.1.17/0 to 10.51.1.17/0

Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group outside_internet_link1_access_in in interface outside_internet_link1
access-list outside_internet_link1_access_in extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_2 log disable
object-group network DM_INLINE_NETWORK_3
 network-object object Rede_Escritorio_Botafogo
 network-object object Rede_Manchete
 network-object object Rede_Porto_Acu
 network-object object Rede_Toil
 network-object object VPN-Pool
 network-object object Rede_Azure
 network-object object LCS_network_100
 network-object object LCS_network_255
object-group network DM_INLINE_NETWORK_2
 network-object object Rede_Escritorio_Botafogo
 network-object object Rede_Manchete
 network-object object Rede_Porto_Acu
 network-object object Rede_Toil
 network-object object VPN-Pool
 network-object object Rede_Azure
 network-object object LCS_network_100
 network-object object LCS_network_255
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x7f1f36990990, priority=13, domain=permit, deny=false
        hits=1, user_data=0x7f1f30717b00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
        src ip/id=10.61.0.0, mask=255.255.0.0, port=0, tag=any
        dst ip/id=10.51.0.0, mask=255.255.240.0, port=0, tag=any, dscp=0x0
        input_ifc=outside_internet_link1, output_ifc=any

Phase: 4
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (any,any) source static Rede_Escritorio_Botafogo Rede_Escritorio_Botafogo destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp
Additional Information:
Static translate 10.61.0.10/0 to 10.61.0.10/0
 Forward Flow based lookup yields rule:
 in  id=0x7f1f369054c0, priority=6, domain=nat, deny=false
        hits=74, user_data=0x7f1f368fc740, cs_id=0x0, flags=0x0, protocol=0
        src ip/id=10.61.0.0, mask=255.255.0.0, port=0, tag=any
        dst ip/id=10.51.0.0, mask=255.255.240.0, port=0, tag=any, dscp=0x0
        input_ifc=any, output_ifc=any

Phase: 5
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x7f1f35aa6e00, priority=0, domain=nat-per-session, deny=true
        hits=78560, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=any, output_ifc=any

Phase: 6
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x7f1f36521450, priority=0, domain=inspect-ip-options, deny=true
        hits=98516, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=outside_internet_link1, output_ifc=any

Phase: 7
Type: SFR
Subtype:
Result: ALLOW
Config:
class-map sfr
 match access-list sfr_redirect
policy-map global_policy
 class sfr
  sfr fail-open
service-policy global_policy global
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x7f1f3755eb30, priority=71, domain=sfr, deny=false
        hits=13279, user_data=0x7f1f3755dba0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=outside_internet_link1, output_ifc=any

Phase: 8
Type: VPN
Subtype: ipsec-tunnel-flow
Result: DROP
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x7f1f38ec5f10, priority=70, domain=ipsec-tunnel-flow, deny=false
        hits=550, user_data=0x38994, cs_id=0x7f1f3864b7a0, reverse, flags=0x0, protocol=0
        src ip/id=10.61.0.0, mask=255.255.0.0, port=0, tag=any
        dst ip/id=10.51.0.0, mask=255.255.240.0, port=0, tag=any, dscp=0x0
        input_ifc=outside_internet_link1, output_ifc=any

Result:
output-interface: Servidores
output-status: up
output-line-status: up
Action: drop

what is your question two ASA vpn not working?

please do not forget to rate.