cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1081
Views
0
Helpful
7
Replies

Lan-to-Lan tunnel between three ASA/PIX

Robin Olofsson
Level 1
Level 1

Hi guys,

I need some help to fix a issue i got.

Here is the topology, i hope you can see what is says.

asa.png

I got lan-to-lan VPN from ASA #1 to PIX #3 and ASA #2

Now we need to get access from ASA #2 to PIX #3 network.

How do i fix this in the easiest way.

We dont want a tunneln between ASA #2 and PIX #3. We already done that but the connection was horrible.

ASA #1 and ASA #2 are located in China, and PIX are in Sweden.

the ISP ASA #2 uses has trouble with their line to Sweden.

Thanks in advance!

1 Accepted Solution

Accepted Solutions

That's easy to achieve. You need to configure three things:

1) permit same-security-traffic intra-interface on ASA1

2) Extend the crypto-ACL on all devices:

ASA2 to ASA1:

10.10.30.0 to 10.10.20.0 (already there)

10.10.30.0 to 10.10.10.0

PIX3 to ASA1:

10.10.10.0 to 10.10.20.0  (already there)

10.10.10.0 to 10.10.30.0

ASA1 to ASA2:

10.10.20.0 to 10.10.30.0 (already there)

10.10.10.0 to 10.10.30.0

ASA1 to PIX3:

10.10.20.0 to 10.10.10.0 (already there)

10.10.30.0 to 10.10.10.0

3) Configure NAT-Excemption on ASA1 that this traffic won't be natted as you did for the existing VPN-traffic.

-- 
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni

View solution in original post

7 Replies 7

Markus Thun
Level 1
Level 1

Hi,

i think that you have problems with the routing. Can you post the routing table from all devices?

The tunnel between ASA-ASA-PIX are up? Also u can ping the next neighbor with the internal ip?

It is important that the internal traffic were forwarded over the outside / Wan interface without NAT.

Regards

Markus

That's easy to achieve. You need to configure three things:

1) permit same-security-traffic intra-interface on ASA1

2) Extend the crypto-ACL on all devices:

ASA2 to ASA1:

10.10.30.0 to 10.10.20.0 (already there)

10.10.30.0 to 10.10.10.0

PIX3 to ASA1:

10.10.10.0 to 10.10.20.0  (already there)

10.10.10.0 to 10.10.30.0

ASA1 to ASA2:

10.10.20.0 to 10.10.30.0 (already there)

10.10.10.0 to 10.10.30.0

ASA1 to PIX3:

10.10.20.0 to 10.10.10.0 (already there)

10.10.30.0 to 10.10.10.0

3) Configure NAT-Excemption on ASA1 that this traffic won't be natted as you did for the existing VPN-traffic.

-- 
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni

Hi

Thanks again! But I'm still having touble to get this work. :-(

The site-to-site tunnels are up. I can ping between #1 and #3 and #1 and #2.

Here is a output on the configuration I've added to the devices with the real IP-networks.

Do you know what could be the issue?

ASA #1

same-security-traffic permit intra-interface

access-list vpn_to_pix3 extended permit ip 192.168.1.0 255.255.255.0 192.168.120.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.1.0 255.255.255.0 192.168.124.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.1.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list vpn_to_asa2 extended permit ip 192.168.120.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list vpn_to_asa2 extended permit ip 192.168.124.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list vpn_to_asa2 extended permit ip 192.168.123.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat extended permit ip 192.168.1.0 255.255.255.0 192.168.120.0 255.255.255.0

access-list no_nat extended permit ip 192.168.1.0 255.255.255.0 192.168.124.0 255.255.255.0

access-list no_nat extended permit ip 192.168.1.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list no_nat extended permit ip 192.168.124.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat extended permit ip 192.168.120.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat extended permit ip 192.168.123.0 255.255.255.0 192.168.1.0 255.255.255.0

------------------------------------------------------------------

ASA #2

name 192.168.1.0 sh

name 192.168.120.0 sweden3

name 192.168.124.0 sweden

name 192.168.123.0 sweden2

object-group network swedennet

network-object sweden2 255.255.255.0

network-object sweden 255.255.255.0

network-object sweden3 255.255.255.0

access-list vpn_to_asa1 extended permit ip sh 255.255.255.0 object-group swedennet

access-list no_nat extended permit ip sh 255.255.255.0 object-group swedennet

------------------------------------------------------------------

PIX #3

access-list vpn_to_asa1 permit ip 192.168.123.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list vpn_to_asa1 permit ip 192.168.120.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list vpn_to_asa1 permit ip 192.168.124.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat permit ip 192.168.123.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat permit ip 192.168.120.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat permit ip 192.168.124.0 255.255.255.0 192.168.1.0 255.255.255.0

the config looks good all in all. There are some things that could go wrong:

1) On ASA-1, the new NAT-exemption could be needed on the outside interface depending on your existing NAT-configuration.

2) There are different ways to control which traffic is allowed in the VPN. print sh output of "sh run all sysopt", if there is not something active like "permit-vpn" or "permit ipsec" (that depends on the version), then the VPN-traffic has to be allowed on the public interface.

-- 
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni

Hi and thanks again!

I've checked

sh run all sysopt

and permit-vpn is active.

I can se that the tunnel is active and have connection to PIX3 network when i try to ping. but I still cant access anything.

Here is the show crypto ipsec sa from ASA2

interface: outside

    Crypto map tag: cry-map, seq num: 20, local addr: 116.x.x.x

      access-list vpn_to_ufab_china extended permit ip 192.168.1.0 255.255.255.0 192.168.123.0 255.255.255.0

      local ident (addr/mask/prot/port): (sh/255.255.255.0/0/0)

      remote ident (addr/mask/prot/port): (sweden2/255.255.255.0/0/0)

      current_peer: 222.x.x.x

      #pkts encaps: 24, #pkts encrypt: 24, #pkts digest: 24

      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0

      #pkts compressed: 0, #pkts decompressed: 0

      #pkts not compressed: 24, #pkts comp failed: 0, #pkts decomp failed: 0

      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0

      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0

      #send errors: 0, #recv errors: 0

      local crypto endpt.: 116.x.x.x, remote crypto endpt.: 222.x.x.x

      path mtu 1500, ipsec overhead 58, media mtu 1500

      current outbound spi: 4D3DF09E

      current inbound spi : 0D887D4F

    inbound esp sas:

      spi: 0x0D887D4F (227048783)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={L2L, Tunnel, }

         slot: 0, conn_id: 278528, crypto-map: cry-map

         sa timing: remaining key lifetime (kB/sec): (3915000/28159)

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    outbound esp sas:

      spi: 0x4D3DF09E (1295904926)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={L2L, Tunnel, }

         slot: 0, conn_id: 278528, crypto-map: cry-map

         sa timing: remaining key lifetime (kB/sec): (3914998/28159)

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

Running cfg from ASA1

: Saved

:

ASA Version 7.2(4)

!

!

interface Vlan1

nameif inside

security-level 100

ip address 192.168.155.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address 222.x.x.x 255.255.255.240

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

ftp mode passive

same-security-traffic permit intra-interface

access-list vpn_to_pix3 extended permit ip 192.168.155.0 255.255.255.0 192.168.124.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.155.0 255.255.255.0 192.168.126.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.155.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.155.0 255.255.255.0 192.168.125.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.1.0 255.255.255.0 192.168.120.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.1.0 255.255.255.0 192.168.124.0 255.255.255.0

access-list vpn_to_pix3 extended permit ip 192.168.1.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list no_nat extended permit ip 192.168.155.0 255.255.255.0 192.168.124.0 255.255.255.0

access-list no_nat extended permit ip 192.168.155.0 255.255.255.0 192.168.126.0 255.255.255.0

access-list no_nat extended permit ip 192.168.155.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list no_nat extended permit ip 192.168.155.0 255.255.255.0 10.12.13.0 255.255.255.0

access-list no_nat extended permit ip 192.168.155.0 255.255.255.0 192.168.125.0 255.255.255.0

access-list no_nat extended permit ip 192.168.155.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat extended permit ip 192.168.1.0 255.255.255.0 192.168.120.0 255.255.255.0

access-list no_nat extended permit ip 192.168.1.0 255.255.255.0 192.168.124.0 255.255.255.0

access-list no_nat extended permit ip 192.168.1.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list no_nat extended permit ip 192.168.124.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat extended permit ip 192.168.120.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list no_nat extended permit ip 192.168.123.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list split_acl extended permit ip 192.168.155.0 255.255.255.0 any

access-list outside_access_in extended permit icmp any any

access-list vpn_to_asa2 extended permit ip 192.168.155.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list vpn_to_asa2 extended permit ip 192.168.120.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list vpn_to_asa2 extended permit ip 192.168.124.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list vpn_to_asa2 extended permit ip 192.168.123.0 255.255.255.0 192.168.1.0 255.255.255.0

pager lines 24

logging enable

logging asdm informational

mtu inside 1500

mtu outside 1500

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-524.bin

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list no_nat

nat (inside) 1 0.0.0.0 0.0.0.0

access-group outside_access_in in interface outside

route outside 0.0.0.0 0.0.0.0 default-gateway 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

http server enable

http 192.168.155.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server community pubuanet

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set 3des-set esp-3des esp-md5-hmac

crypto dynamic-map dynmap 10 set transform-set 3des-set

crypto dynamic-map dynmap 10 set reverse-route

crypto map mymap 10 match address vpn_to_pix3

crypto map mymap 10 set peer 194.x.x.x

crypto map mymap 10 set transform-set 3des-set

crypto map mymap 20 match address vpn_to_asa2

crypto map mymap 20 set peer 116.x.x.x

crypto map mymap 20 set transform-set 3des-set

crypto map mymap 100 ipsec-isakmp dynamic dynmap

crypto map mymap interface outside

crypto isakmp identity address

crypto isakmp enable outside

crypto isakmp policy 40

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

crypto isakmp nat-traversal  20

!

group-policy vpn-china internal

group-policy vpn-china attributes

dns-server value 202.96.209.133 202.96.209.5

split-tunnel-policy tunnelspecified

split-tunnel-network-list value split_acl

tunnel-group 194.x.x.x type ipsec-l2l

tunnel-group 194.x.x.x ipsec-attributes

pre-shared-key *

tunnel-group 116.x.x.x type ipsec-l2l

tunnel-group 116.x.x.x ipsec-attributes

pre-shared-key *

!

!            

: end

-----------------------------------------------------------------------------

Running cfg from ASA2

: Saved

:

ASA Version 8.2(5)

!

names

name 192.168.1.0 sh

name 192.168.120.0 sweden3

name 192.168.124.0 sweden

name 192.168.123.0 sweden2

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

interface Vlan1

nameif inside

security-level 100

ip address 192.168.1.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address 116.x.x.x 255.255.255.252

!

interface Vlan5

no nameif

security-level 50

no ip address

!

ftp mode passive

clock timezone HKST 8

dns server-group DefaultDNS

domain-name dfmarine

object-group network swedennet

network-object sweden2 255.255.255.0

network-object sweden 255.255.255.0

network-object sweden3 255.255.255.0

access-list 102 extended permit icmp any any

access-list 102 extended permit tcp any host 116.x.x.x eq 3389

access-list 102 extended permit tcp any host 116.x.x.x eq ftp

access-list 102 extended permit tcp any host 116.x.x.x eq www

access-list vpn_to_asa1 extended permit ip sh 255.255.255.0 192.168.155.0 255.255.255.0

access-list vpn_to_asa1 extended permit ip sh 255.255.255.0 object-group swedennet

access-list no_nat extended permit ip sh 255.255.255.0 object-group swedennet

access-list no_nat extended permit ip sh 255.255.255.0 192.168.155.0 255.255.255.0

pager lines 24

logging enable

logging asdm informational

mtu inside 1500

mtu outside 1500

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list no_nat

nat (inside) 1 0.0.0.0 0.0.0.0

static (inside,outside) tcp interface 3389 192.168.1.252 3389 netmask 255.255.255.255

static (inside,outside) tcp interface ftp 192.168.1.251 ftp netmask 255.255.255.255

static (inside,outside) tcp interface www 192.168.1.251 www netmask 255.255.255.255

access-group 102 in interface outside

route outside 0.0.0.0 0.0.0.0 default-gateway 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication ssh console LOCAL

http server enable

http sh 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server community *****

snmp-server enable traps snmp authentication linkup linkdown coldstart

sysopt connection tcpmss 0

crypto ipsec transform-set trans esp-3des esp-md5-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto map cry-map 20 match address vpn_to_asa1

crypto map cry-map 20 set peer 222.x.x.x

crypto map cry-map 20 set transform-set trans

crypto map cry-map interface outside

crypto isakmp identity address

crypto isakmp enable outside

crypto isakmp policy 10

authentication pre-share

encryption 3des

hash md5

group 2

lifetime 86400

crypto isakmp policy 20

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

ssl encryption des-sha1

webvpn

group-policy DfltGrpPolicy attributes

vpn-tunnel-protocol IPSec

tunnel-group 222.x.x.x type ipsec-l2l

tunnel-group 222.x.x.x ipsec-attributes

pre-shared-key *****

!

!

prompt hostname context

no call-home reporting anonymous

: end  


-----------------------------------------------------------------------------

No further changes on PIX3, and I don't think the problem is located there.

Robin Olofsson
Level 1
Level 1

Hi Guys!

Thanks for your quick replies!

I will look into this tomorrow and get back to you!

Have a nice day

Robin Olofsson
Level 1
Level 1

Update!

Everything has been solved, the problem was that I missed to delete a old crypto map pointing to ASA#2 on the PIX.

After a relaod on the pix everything is up and running. Thanks you for taking you'r time, it helped me alot in my troubleshooting!