03-20-2009 05:54 AM - edited 02-21-2020 04:11 PM
I've had a VPN concentrator that's been working for several years and now, without any known changes, VPN clients establish a tunnel but can't pass traffic. A 'show crypto ipsec sa' shows #recv errors.
What does the receive error indicate? Where do I need to look to resolve the errors?
03-20-2009 07:15 AM
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml
Good link to start.
If the tunnels can establish but can't pass traffic my guess would be the crypto ACL. I ran into the same problem a month back when implementing vpn.
03-20-2009 10:43 AM
Thanks for the suggestions but this is for VPN Clients which don't have ACLs. I have many site-to-site connections with ACLs that are working fine. What I'm really looking for is what is causing the recv errors, or in other words, what is happening, or missing, that would cause the recv error to increment.
09-10-2012 11:50 PM
Usually #recv errors is increasing when we fail one of the tests performed when decapsulating the ESP payload.
It can come from:
Maybe interesting to show both configs and versions?
09-13-2012 01:21 AM
ASA end configs:
version-- Cisco ASA Software Version 7.2(2)
ASA configuration
------------------------------------------------------------------------------------------------------------
crypto isakmp policy 10
authentication pre-share
encryption des
hash md5
group 1
lifetime 86400
crypto isakmp policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto isakmp policy 40
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
access-list VPN_LIV extended permit ip 10.6.100.128 255.255.255.248 host 10.7.1.5
access-list VPN_LIV extended permit ip 10.6.100.128 255.255.255.248 host 10.7.1.7
crypto ipsec transform-set LIV esp-3des esp-sha-hmac
crypto map transam 55 match address VPN_LIV
crypto map transam 55 set peer x.x.x.x
crypto map transam 55 set transform-set LIV
crypto map transam 55 set security-association lifetime seconds 3600
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
pre-shared-key *
*********************************************************************************************************************
Cisco Router end configs
(IOS 12.4(24)T5)
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
crypto ipsec transform-set VPN esp-3des esp-sha-hmac
crypto map map 100 ipsec-isakmp
description ****PROD VPN ****
set peer x.x.x.x
set transform-set VPN
match address VPN
reverse-route
Extended IP access list VPN
10 permit ip host 10.7.1.5 10.6.100.128 0.0.0.7 (48509 matches)
30 permit ip host 10.7.1.7 10.6.100.128 0.0.0.7 (9015 matches)
Show crypto ipsec from cisco router:-
local ident (addr/mask/prot/port): (10.7.1.5/255.255.255.255/0/0)
remote ident (addr/mask/prot/port): (10.6.100.128/255.255.255.248/0/0)
current_peerx x.x.x.x port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 271545, #pkts encrypt: 271545, #pkts digest: 271545
#pkts decaps: 166753, #pkts decrypt: 166753, #pkts verify: 166753
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 6848
local crypto endpt.: x.x.x.x, remote crypto endpt.: x.x.x.x
path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0
current outbound spi: 0x0(0)
PFS (Y/N): N, DH group: none
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
protected vrf: (none)
local ident (addr/mask/prot/port): (10.7.1.7/255.255.255.255/0/0)
remote ident (addr/mask/prot/port): (10.6.100.128/255.255.255.248/0/0)
current_peer x.x.x.x port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 38406, #pkts encrypt: 38406, #pkts digest: 38406
#pkts decaps: 27997, #pkts decrypt: 27997, #pkts verify: 27997
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 6568
local crypto endpt.: x.x.x.x, remote crypto endpt.: x.x.x.x
path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0
current outbound spi: 0x0(0)
PFS (Y/N): N, DH group: none
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
09-06-2012 05:18 AM
I am wondering if someone had faced recv errors problem ? We are running into this issue between a cisco router and an ASA fw.
09-06-2012 07:50 AM
Hi Akhtar,
Are the VPN clients using NAT-T?
Is the transform-set in tunnel mode?
Thanks.
Portu.
09-10-2012 02:42 PM
Hi Portu,
Yes they have been using NAT-T and tunnel mode. Any thing related to that ?
Regards,
Akhtar
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide