05-04-2021 04:29 AM
I have a site to site VPN using IKEv2 between an ASA 5506 (running 9.12.4) and an ASA 5516 (running 9.14.5). Authentication through PSK. (Same key for local/remote and static crypto map entry).
Every 10 minutes or so the VPN goes down, I get some authentication failures and eventuelly it comes up again.
See attahced log.
There you can see that first there are five failed to autheticates, for example:
Use preshared key for id 146.66.235.103, key len 20
IKEv2-PROTO-7: (624): Computed authentication value for peer differs from what peer sent
IKEv2-PROTO-2: (624): Failed to authenticate the IKE SA
Then one successful:
IKEv2-PROTO-4: (721): Verify peer's authentication data
IKEv2-PROTO-4: (721): Use preshared key for id 146.66.235.103, key len 20
IKEv2-PROTO-4: (721): Verification of peer's authenctication data PASSED
then one failed again.
And then the tunnel is up.
I have verified that the PSK är ok, and also if they were not ok the VPN would never get up at all.
Anyone have any idea on what is wrong? Have I interpreted the logs correctly? What could "Computed authentication value" mean more that thr PSK?
05-04-2021 07:28 AM
Hi @erikorrsjo
It sounds like the IKE messages are out of sync.
Is DPD configured on both ASA?
Have you determined why the VPN drops, do you have intermittent internet connection issues?
Can you provide the configuration of both ASA
Can you enable ike/ipsec debug on both ASA when the VPN is up and then provide the output from both once the VPN tunnel has dropped.
05-04-2021 06:49 PM
The Below SPI value are for the working VPN-TUNNEL (from the logs you provided) you see the working one use the PSK and using the FQDN "SEGB-FW001.cactustrail.local". by default PSK the presentation of the identity is the peer ip address. in your case its the FQDN. we dont have your configuration. either you use the FQDN on the other side of the firewall or change the order.
could you show the output of the below command
show crypto isakmp sa detail | b 146.66.235.103
Completed SA init exchange IKEv2-PROTO-7: (721): SM Trace-> SA: I_SPI=18B9A11BD3FCEB0B R_SPI=ED395B048278D0A0 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE IKEv2-PROTO-7: (721): SM Trace-> SA: I_SPI=18B9A11BD3FCEB0B R_SPI=ED395B048278D0A0 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GET_CONFIG_MODE IKEv2-PROTO-7: (721): SM Trace-> SA: I_SPI=18B9A11BD3FCEB0B R_SPI=ED395B048278D0A0 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_EAP IKEv2-PROTO-4: (721): Check for EAP exchange IKEv2-PROTO-7: (721): SM Trace-> SA: I_SPI=18B9A11BD3FCEB0B R_SPI=ED395B048278D0A0 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GEN_AUTH IKEv2-PROTO-4: (721): Generate my authentication data IKEv2-PROTO-4: (721): Use preshared key for id SEGB-FW001.cactusrail.local, key len 20 IKEv2-PROTO-7: (721): SM Trace-> SA: I_SPI=18B9A11BD3FCEB0B R_SPI=ED395B048278D0A0 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_AUTH_TYPE IKEv2-PROTO-4: (721): Get my authentication method IKEv2-PROTO-4: (721): My authentication method is 'PSK' IKEv2-PROTO-7: (721): SM Trace-> SA: I_SPI=18B9A11BD3FCEB0B R_SPI=ED395B048278D0A0 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_OK_AUTH_GEN IKEv2-PROTO-4: (721): Check for EAP exchange IKEv2-PROTO-7: (721): SM Trace-> SA: I_SPI=18B9A11BD3FCEB0B R_SPI=ED395B048278D0A0 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_SEND_AUTH IKEv2-PROTO-4: (721): Generating IKE_AUTH message IKEv2-PROTO-4: (721): Constructing IDi payload: 'SEGB-FW001.cactusrail.local' of type 'FQDN' IKEv2-PROTO-4: (721): ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
05-04-2021 10:38 PM
Result of the command: "show crypto isakmp sa detail | b 146.66.235.103"
271542171 195.22.66.26/500 146.66.235.103/500 READY RESPONDER
Encr: AES-CBC, keysize: 256, Hash: SHA256, DH Grp:14, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 86400/17532 sec
Session-id: 2578
Status Description: Negotiation done
Local spi: 833B219A6FA23117 Remote spi: 7638B47A2A88A2EB
Local id: SEGB-FW001.cactusrail.local
Remote id: 146.66.235.103
Local req mess id: 1 Remote req mess id: 4
Local next mess id: 1 Remote next mess id: 4
Local req queued: 1 Remote req queued: 4
Local window: 1 Remote window: 1
DPD configured for 10 seconds, retry 2
NAT-T is not detected
IKEv2 Fragmentation Configured MTU: 576 bytes, Overhead: 28 bytes, Effective MTU: 548 bytes
Parent SA Extended Status:
Delete in progress: FALSE
Marked for delete: FALSE
Child sa: local selector 195.22.76.128/0 - 195.22.76.255/65535
remote selector 10.30.0.0/0 - 10.30.3.255/65535
ESP spi in/out: 0xb35536e7/0xa63870a8
AH spi in/out: 0x0/0x0
CPI in/out: 0x0/0x0
Encr: AES-CBC, keysize: 256, esp_hmac: SHA256
ah_hmac: None, comp: IPCOMP_NONE, mode tunnel
Child sa: local selector 192.168.171.0/0 - 192.168.171.255/65535
remote selector 10.30.0.0/0 - 10.30.3.255/65535
ESP spi in/out: 0xf606673f/0xe371741e
AH spi in/out: 0x0/0x0
CPI in/out: 0x0/0x0
Encr: AES-CBC, keysize: 256, esp_hmac: SHA256
ah_hmac: None, comp: IPCOMP_NONE, mode tunnel
Child sa: local selector 10.10.51.0/0 - 10.10.51.255/65535
remote selector 10.30.0.0/0 - 10.30.3.255/65535
ESP spi in/out: 0x88c5b172/0x66cf7954
AH spi in/out: 0x0/0x0
CPI in/out: 0x0/0x0
Encr: AES-CBC, keysize: 256, esp_hmac: SHA256
ah_hmac: None, comp: IPCOMP_NONE, mode tunnel
Child sa: local selector 10.10.70.0/0 - 10.10.70.255/65535
remote selector 10.30.0.0/0 - 10.30.3.255/65535
ESP spi in/out: 0x36133b48/0xf2bbed5a
AH spi in/out: 0x0/0x0
CPI in/out: 0x0/0x0
Encr: AES-CBC, keysize: 256, esp_hmac: SHA256
ah_hmac: None, comp: IPCOMP_NONE, mode tunnel
Also, I set up ping through the tunnel from a host and that seemed to have made it better (5 hours uptime now).
I don't know why it would pick the hostname of the firewall including domain suffix. The VPN is set up using IP-adress.
I can't really publish the entire fw config on a public internet forum. But this is the config of the parts related to the tunnel config:
FW site 1:
crypto map VPN_UTILITIES_MAP 150 match address internet_cryptomap_5
crypto map VPN_UTILITIES_MAP 150 set pfs
crypto map VPN_UTILITIES_MAP 150 set peer 146.66.235.103
crypto map VPN_UTILITIES_MAP 150 set ikev2 ipsec-proposal aes256-sha256
crypto map VPN_UTILITIES_MAP 150 set ikev2 pre-shared-key *****
tunnel-group 146.66.235.103 type ipsec-l2l
tunnel-group 146.66.235.103 general-attributes
default-group-policy gp-vpn-jk-gbg
tunnel-group 146.66.235.103 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
FW site 2:
crypto map outside_map 1 match address outside_cryptomap_3
crypto map outside_map 1 set pfs group14
crypto map outside_map 1 set peer 195.22.66.26
crypto map outside_map 1 set ikev2 ipsec-proposal AES-SHA-256
crypto map outside_map 1 set ikev2 pre-shared-key *****
tunnel-group 195.22.66.26 type ipsec-l2l
tunnel-group 195.22.66.26 general-attributes
default-group-policy GroupPolicy_195.22.66.26
tunnel-group 195.22.66.26 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
05-05-2021 12:16 AM
yep this is what i was excepting.
"show crypto isakmp sa detail | b 146.66.235.103" 271542171 195.22.66.26/500 146.66.235.103/500 READY RESPONDER Encr: AES-CBC, keysize: 256, Hash: SHA256, DH Grp:14, Auth sign: PSK, Auth verify: PSK Life/Active Time: 86400/17532 sec Session-id: 2578 Status Description: Negotiation done Local spi: 833B219A6FA23117 Remote spi: 7638B47A2A88A2EB Local id: SEGB-FW001.cactusrail.local Remote id: 146.66.235.103
could you double check if you have this command enable on your ASA.
crypto isakmp identity hostname
if so could you change this to
crypto isakmp identity auto
05-05-2021 12:04 PM
Yes you were right
crypto isakmp identity hostname
was set, I changed it as you said. Awaiting if this will change the behaviour.
Btw, you know if this is possible to set in ASDM anywhere? I don't ever remeber changing this before.
05-05-2021 01:53 PM
05-05-2021 01:46 PM - edited 05-05-2021 01:59 PM
It helped somewhat setting identity to auto. It did change peer from FQDN to IP-address, and I did not receive any pre-shared key authentication failures anymore. The tunnel still goes down every 10-15 minutes, however, the down-time is much shorter now so it seems it might not affect the communication enough to cause big issues. That still remains to be seen though.
Also whenever the tunnel goes down, I still get the following syslog messages:
5 | May 05 2021 | 22:41:11 | 750007 | Local:146.66.235.103:500 Remote:195.22.66.26:500 Username:195.22.66.26 IKEv2 SA DOWN. Reason: peer lost |
and
4 | May 05 2021 | 22:55:04 | 750014 | Local:195.22.66.26:500 Remote:146.66.235.103:500 Username:146.66.235.103 IKEv2 Session Aborted. Reason: Initial contact received for Local ID: 195.22.66.26, Remote ID: 146.66.235.103 from remote peer: 146.66.235.103:500 to 195.22.66.26:500 |
This occures much less frequent if I have a ping running through the tunnel. I have other tunnels from the same ASA:s that runs much more stable.
So something is still a bit fishy.
Logs are attached
05-05-2021 02:42 PM
could you share the firewall vpn configuration of these two vpns
05-05-2021 10:36 PM
Here you go:
FW1 (146....)
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES-SHA-256
protocol esp encryption aes-256
protocol esp integrity sha-256
crypto ipsec security-association pmtu-aging infinite
crypto map outside_map 1 match address outside_cryptomap_3
crypto map outside_map 1 set pfs group14
crypto map outside_map 1 set peer 195.22.66.26
crypto map outside_map 1 set ikev2 ipsec-proposal AES-SHA-256
crypto map outside_map 1 set ikev2 pre-shared-key *****
crypto map outside_map 2 match address outside_cryptomap_1
crypto map outside_map 2 set pfs group5
crypto map outside_map 2 set peer 89.160.107.20
crypto map outside_map 2 set ikev1 transform-set ESP-DES-MD5 ESP-DES-SHA ESP-3DES-SHA ESP-3DES-MD5
crypto map outside_map 2 set ikev2 ipsec-proposal AES256 AES-SHA-256
crypto map outside_map 2 set ikev2 pre-shared-key *****
crypto map outside_map 3 match address outside_cryptomap_4
crypto map outside_map 3 set pfs
crypto map outside_map 3 set peer 83.233.155.226
crypto map outside_map 3 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES AES-SHA-256
crypto map outside_map interface outside
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0
enrollment self
fqdn none
subject-name CN=146.66.235.103,CN=ciscoasajkp
crl configure
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_1
enrollment self
fqdn none
subject-name CN=146.66.235.103,CN=ciscoasajkp
crl configure
crypto ca trustpool policy
crypto ikev2 policy 2
encryption aes-256
integrity sha256
group 14
prf sha256
lifetime seconds 86400
crypto ikev2 policy 3
encryption aes-256
integrity sha256
group 5
prf sha256
lifetime seconds 86400
crypto ikev2 policy 4
encryption aes-256
integrity sha256
group 19
prf sha256
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable outside
crypto ikev1 enable outside
crypto ikev1 policy 5
authentication pre-share
encryption aes-256
hash sha
group 5
lifetime 86400
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 100
authentication pre-share
encryption des
hash sha
group 5
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
....
group-policy DfltGrpPolicy attributes
vpn-idle-timeout none
group-policy GroupPolicy_89.160.107.18 internal
group-policy GroupPolicy_89.160.107.18 attributes
vpn-tunnel-protocol ikev1 ikev2
group-policy GroupPolicy_195.22.66.26 internal
group-policy GroupPolicy_195.22.66.26 attributes
vpn-filter value filter-jkp-gb
vpn-tunnel-protocol ikev2
group-policy GroupPolicy_83.233.155.226 internal
group-policy GroupPolicy_83.233.155.226 attributes
vpn-tunnel-protocol ikev2
dynamic-access-policy-record DfltAccessPolicy
username admin password ***** pbkdf2 privilege 15
username erik password ***** pbkdf2 privilege 15
tunnel-group 195.22.66.26 type ipsec-l2l
tunnel-group 195.22.66.26 general-attributes
default-group-policy GroupPolicy_195.22.66.26
tunnel-group 195.22.66.26 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
tunnel-group 89.160.107.18 type ipsec-l2l
tunnel-group 89.160.107.18 general-attributes
default-group-policy GroupPolicy_89.160.107.18
tunnel-group 89.160.107.18 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
tunnel-group 83.233.155.226 type ipsec-l2l
tunnel-group 83.233.155.226 general-attributes
default-group-policy GroupPolicy_83.233.155.226
tunnel-group 83.233.155.226 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
tunnel-group 89.160.107.20 type ipsec-l2l
tunnel-group 89.160.107.20 general-attributes
default-group-policy GroupPolicy_89.160.107.18
tunnel-group 89.160.107.20 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
FW2: (195...)
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev2 ipsec-proposal aes256-sha1
protocol esp encryption aes-256
protocol esp integrity sha-1
crypto ipsec ikev2 ipsec-proposal aes256-sha256
protocol esp encryption aes-256
protocol esp integrity sha-256
crypto ipsec ikev2 ipsec-proposal aes256-md5
protocol esp encryption aes-256
protocol esp integrity md5
crypto ipsec security-association replay window-size 1024
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map internet_dyn_map 2 set pfs
crypto dynamic-map internet_dyn_map 2 set ikev1 transform-set ESP-3DES-SHA
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 1 match address internet_cryptomap_65535.1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 1 set pfs
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 1 set ikev1 transform-set ESP-AES-256-MD5 ESP-AES-256-SHA
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 2 match address internet_cryptomap_65535.2_1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 2 set pfs
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 2 set ikev1 transform-set ESP-AES-256-MD5
crypto map *** [various other crypto maps for other VPN:s)
crypto map VPN_UTILITIES_MAP 150 match address internet_cryptomap_5
crypto map VPN_UTILITIES_MAP 150 set pfs
crypto map VPN_UTILITIES_MAP 150 set peer 146.66.235.103
crypto map VPN_UTILITIES_MAP 150 set ikev2 ipsec-proposal aes256-sha256
crypto map VPN_UTILITIES_MAP 150 set ikev2 pre-shared-key *****
crypto map VPN_UTILITIES_MAP 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map VPN_UTILITIES_MAP interface cu-vpn
....
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 2
prf sha
lifetime seconds 3600
crypto ikev2 policy 2
encryption aes-256
integrity sha256
group 14
prf sha256
lifetime seconds 86400
crypto ikev2 policy 3
encryption aes-256
integrity md5
group 14
prf md5
lifetime seconds 86400
crypto ikev2 policy 4
encryption aes-256
integrity sha256
group 19
prf sha256
lifetime seconds 86400
crypto ikev2 enable cu-vpn
crypto ikev2 enable internet
crypto ikev2 enable cr-vpn
crypto ikev1 enable cu-vpn
crypto ikev1 enable internet
crypto ikev1 enable cr-vpn
crypto ikev1 policy 1
authentication pre-share
encryption aes-192
hash sha
group 5
lifetime 86400
crypto ikev1 policy 2
authentication pre-share
encryption aes-256
hash md5
group 5
lifetime 86400
crypto ikev1 policy 15
authentication pre-share
encryption aes-256
hash sha
group 5
lifetime 86400
crypto ikev1 policy 20
authentication pre-share
encryption aes-256
hash sha
group 5
lifetime 3600
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication pre-share
encryption aes-256
hash md5
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 95
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 3600
crypto ikev1 policy 103
authentication pre-share
encryption 3des
hash sha
group 5
lifetime 86400
crypto ikev1 policy 104
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 106
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto ikev1 policy 107
authentication pre-share
encryption aes-256
hash md5
group 5
lifetime 14400
crypto ikev1 policy 108
authentication pre-share
encryption aes
hash md5
group 2
lifetime 28800
crypto ikev1 policy 109
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 28800
crypto ikev1 policy 110
authentication pre-share
encryption 3des
hash md5
group 5
lifetime 28800
....
group-policy DfltGrpPolicy attributes
vpn-idle-timeout none
vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
....
group-policy gp-vpn-jk-gbg internal
group-policy gp-vpn-jk-gbg attributes
vpn-filter value jkp-gbg
vpn-tunnel-protocol ikev2
....
tunnel-group 146.66.235.103 type ipsec-l2l
tunnel-group 146.66.235.103 general-attributes
default-group-policy gp-vpn-jk-gbg
tunnel-group 146.66.235.103 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
05-05-2021 11:34 PM
could you make sure the pfs values are configured both side accordingly as group14.
also could you please share the access-list internet_cryptomap_5 and outside_cryptomap_3
show access-list internet_cryptomap_5
show access-list outside_cryptomap_3
also could you please show the nat statement of these above vpns.
once you make the pfs group14 on both end see how the tunnel behaves.
FW195 ! crypto map VPN_UTILITIES_MAP 150 match address internet_cryptomap_5 crypto map VPN_UTILITIES_MAP 150 set pfs crypto map VPN_UTILITIES_MAP 150 set peer 146.66.235.103 crypto map VPN_UTILITIES_MAP 150 set ikev2 ipsec-proposal aes256-sha256 crypto map VPN_UTILITIES_MAP 150 set ikev2 pre-shared-key ***** ! tunnel-group 146.66.235.103 type ipsec-l2l tunnel-group 146.66.235.103 general-attributes default-group-policy gp-vpn-jk-gbg tunnel-group 146.66.235.103 ipsec-attributes ikev1 pre-shared-key ***** ikev2 remote-authentication pre-shared-key ***** ikev2 local-authentication pre-shared-key ***** ================================================ FW-146 ! crypto map outside_map 1 match address outside_cryptomap_3 crypto map outside_map 1 set pfs group14 crypto map outside_map 1 set peer 195.22.66.26 crypto map outside_map 1 set ikev2 ipsec-proposal AES-SHA-256 crypto map outside_map 1 set ikev2 pre-shared-key ***** ! tunnel-group 195.22.66.26 type ipsec-l2l tunnel-group 195.22.66.26 general-attributes default-group-policy GroupPolicy_195.22.66.26 tunnel-group 195.22.66.26 ipsec-attributes ikev1 pre-shared-key ***** ikev2 remote-authentication pre-shared-key ***** ikev2 local-authentication pre-shared-key *****
05-06-2021 05:43 AM
05-06-2021 05:54 AM - edited 05-06-2021 06:40 AM
You are running ASA 9.14, groups 2 and 5 were recently depreciated, 14 is the default. Worthwhile confirming, but it would never have worked if mismatched.
In your logs I noted the initial_contact notification, which is used if a host crashes, restarts or if manually reset for some reason - in which case the IKEv2 SAs are cleared. I previously asked - "Have you determined why the VPN drops, do you have intermittent internet connection issues?" If other VPNs do not drop on the main ASA, check for communication issues on the other end.
05-06-2021 06:48 AM
05-06-2021 07:03 AM
@erikorrsjo IKEv2 isn't more sensitive and I've implemented VPNs succesfully using it.
Log a call with TAC to help you troubleshoot further or use IKEv1 and test to determine whether you have the same issues.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide