08-25-2009 08:16 AM
Hi Guys
I ahve a ASA firewall Connected to Cisco 2821 Router.
On the Router I have ADSL and Lease Line connected.
All my traffic destined for port web ftp etc is going from ADSL and smtp pop3 telnet etc is going from lease Line.
My issues as follow:
I am unable to telnet to ASA outside Interface although its configuered.
Unable to connect my Remote VPN Client , there are no packets in debug crypto isakmp , I know I ahve a nat device i.e. my router before my asa , I have to no nat port 4500 and esp over there but how , its confusing.
I am ataching configuration.
Regards
Solved! Go to Solution.
08-25-2009 12:51 PM
It's look like a config issue. Might need debug output of "debug crypto isa 127".
You might need remove command "authorization-server-group LOCAL".
NAT-traversal is enabled by default on ASA version 8.x. Therefore, you don't need worry NAT device in the middle.
08-25-2009 10:35 AM
Is aa.aa.aa.2 a public IP? If yes, will the packet to aa.aa.aa.2 come in from ADSL?
Make sure the packet to aa.aa.aa.2 will reach ASA. You can enable logging buffer or setup capture on outside interface. Then try telnet to ASA and check log or capture to see if telnet packet reach ASA.
08-25-2009 10:38 AM
Yes its a Public IP. and Packet should come from LL not from ADSL (That what I think).
I captured , but telnet is not reaching till ASA.
08-25-2009 10:45 AM
If you do the capture on ASA like following,
access-list cap permit tcp any host aa.aa.aa.2 eq telnet
access-list cap permit tcp host aa.aa.aa.2 eq telnet any
capture cap access-list cap interface outside
- telent to ASA outside interface from somewhere else.
- then on ASA, show capture cap
Do you see the packet in and out?
08-25-2009 10:58 AM
This is the Packet Capture
5 packets captured
1: 22:51:11.754981 217.164.167.147.61152 > aa.aa.aa.2.23: S 2487757828:24
87757828(0) win 65535
K>
2: 22:51:14.838671 217.164.167.147.61152 > aa.aa.aa.2.23: S 2487757828:24
87757828(0) win 65535
K>
3: 22:51:20.878464 217.164.167.147.61152 > aa.aa.aa.2.23: S 2487757828:24
87757828(0) win 65535
K>
4: 22:51:32.997156 217.164.167.147.61152 > aa.aa.aa.2.23: S 2487757828:24
87757828(0) win 65535
K>
5: 22:51:57.058270 217.164.167.147.61152 > aa.aa.aa.2.23: S 2487757828:24
87757828(0) win 65535
K>
5 packets shown
08-25-2009 11:15 AM
Did you capture the packet by using the ACL in my previous post? If yes, you should be able to capture the packet in both directions. From output, it looks like ASA did not response to telnet request. Can you enable logging buffered and then try telnet again and check "show logging" to see if there is log info for this.
08-25-2009 11:29 AM
Yes I capture the packet as you told me and this is the output for show logging
%ASA-4-402117: IPSEC: Received a non-IPSec packet (protocol= TCP) from 217.164.167.147 to aa.aa.aa.2.
%ASA-7-710005: TCP request discarded from 217.164.167.147/61771 to outside:aa.aa.aa.2/23
%ASA-4-402117: IPSEC: Received a non-IPSec packet (protocol= TCP) from 217.164.167.147 to aa.aa.aa.2.
%ASA-7-710005: TCP request discarded from 217.164.167.147/61823 to outside:aa.aa.aa.2/23
%ASA-4-402117: IPSEC: Received a non-IPSec packet (protocol= TCP) from 217.164.167.147 to aa.aa.aa.2.
%ASA-7-710005: TCP request discarded from 217.164.167.147/61823 to outside:aa.aa.aa.2/23
08-25-2009 11:36 AM
Ok, you can not telnet to an outside interface directly. It must go through VPN tunnel. but you should be able to SSH to outside interface directly.
08-25-2009 11:38 AM
It is specified in "telnet: command reference.
http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/t_72.html#wp1379682
08-25-2009 11:38 AM
Ok, but why it should go through VPN Tunnel.
Secondly , I am unable to get VPN up even
08-25-2009 11:43 AM
1. That's by design. Telnet to outside is not safe since the packet is in plain text.
2. Looks like you missed "crypto isakmp enable outside".
08-25-2009 11:52 AM
Thanks ... you are right .... I enable it and getting this error
(config)# Aug 25 23:47:42 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Removing peer from peer table failed, no match!
Aug 25 23:47:42 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Error: Unable to remove PeerTblEntry
Aug 25 23:47:47 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Removing peer from peer table failed, no match!
Aug 25 23:47:47 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Error: Unable to remove PeerTblEntry
Aug 25 23:47:52 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Removing peer from peer table failed, no match!
Aug 25 23:47:52 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Error: Unable to remove PeerTblEntry
Aug 25 23:47:57 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Removing peer from peer table failed, no match!
Aug 25 23:47:57 [IKEv1]: Group = AdminGrp, IP = 217.164.167.147, Error: Unable to remove PeerTblEntry
By the way tell me one thing I have a nat device above the ASA , why i dont need to bypass the port 4500 on it
08-25-2009 12:51 PM
It's look like a config issue. Might need debug output of "debug crypto isa 127".
You might need remove command "authorization-server-group LOCAL".
NAT-traversal is enabled by default on ASA version 8.x. Therefore, you don't need worry NAT device in the middle.
08-26-2009 07:48 AM
Thanks
I change the group 5 to 2 and it start working.
08-26-2009 07:59 AM
Great! I am glad you found the mistaken in config. Good job.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide