02-21-2020 07:54 AM - edited 02-21-2020 10:35 AM
I was checking a site to site VPN and noticed the attached. The ASA is configured as below so I am not sure why I am seeing 28800 Rekey Time Interval for only one of the allowed IPs in the interesting traffic. Can someone please explain? Full disclosure - .37 and .6 are Windows Servers and .20 is an IBMi LPAR. Should not make a difference.
Distant end 172.21.255.0/24
Our end is:
10.123.34.37
10.123.34.20
10.123.34.6
Sa Lifetime is set to 43200 (12hours)
Ike Policy is pre-share-aes-256-sha (DH5 86400) or pre-share-aes-256-md5 (DH2 86400)
IpSec Proposal is ESP-AES-256-SHA (Mode Tunnel, ESP Encrytion AES-256, ESP Autorization SHA)
crypto map outside_map 13 set peer XXX.XX.XXX.XXX
crypto map outside_map 13 set ikev1 transform-set ESP-AES-256-SHA
crypto map outside_map 13 set security-association lifetime seconds 43200
crypto map outside_map 13 set security-association lifetime kilobytes unlimited
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 5
lifetime 86400
crypto ikev1 policy 31
authentication pre-share
encryption aes-256
hash md5
group 2
lifetime 86400
tunnel-group XXX.XXX.XXX.XXX type ipsec-l2l
tunnel-group XXX.XXX.XXX.XXX general-attributes
default-group-policy GroupPolicy_XXX.XXX.XXX.XXX
tunnel-group XXX.XXX.XXX.XXX ipsec-attributes
ikev1 pre-shared-key *****
isakmp keepalive disable
02-22-2020 09:49 AM
are you the initiator or responder. it could be your and remote side access-list does not mirror.
your ikev1 liftetime is 86400. in ikev1 lower life value always win between two peers. i noted your configuration for ipsec is 43200. double check your acl with remote site.
02-22-2020 11:20 AM
Thanks for the response. I was hoping it was some hidden rule that I was unaware of. So I am guessing this will go unanswered because I cannot see the distant end config and right now your theory is the interesting traffic is different.
I was the Initiator at the time. I logged out of the VPN and then ran packet capture for all three interesting traffic IPs from my end to bring them up. I am at 43200 because the distant end is at 43200.
Its not broken it just seems odd that only for the one IP does this happen. The others are showing up as expected. Unfortunately its one of those site to site VPNs with 100 people from different divisions that cant tell left from right and I have to say are really not too helpful on the distant end. So comparing what they have is like pulling your own teeth. It terminates in France and has personnel from India running the config for an American company. So getting a simple answer as far as how are they configured is always convoluted. Kind of like working with AT&T and Verizon sometimes. Takes 3 -4 weeks to get a simple IP change.
02-23-2020 01:04 AM
Which ASA code you running. I shall test this in lab.
02-23-2020 05:42 AM
9.12.(2) in a 5516 in HA
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide