10-17-2019 03:20 PM
I have a site-to-site VPN tunnel between two sites both running Cisco ASA on 9.8(4)10 code. The tunnel has about 5 prefixes on A side and 3 from Z side. I can see phase 1 and 2 are established with no error. However, it appears I can only pass traffic in a single SA at a time, despite all the other SAs showing up. I've checked and rechecked config on both sides and the ACLs match. I also checked NAT-T and NAT exempts and they're configured properly. I also checked for any possible IP overlaps and there are none.
Here's a summary of the symptoms:
Has anyone run into a similar issue or know how to fix it? Thanks!
10-21-2019 08:16 AM
Good job getting detailed symptoms. From what you have mentioned, it definitely looks like there might be drops in the path. IF we assume that local ASA sends encrypted traffic outbound successfully, then one of the differences between each of the SA's would be the SPI value. If there is an ISP device that keeps session status based on SPI, it might be dropping when it sees traffic with the same source/destination containg new SPI's.
I would also apply a capture on the outside interface of both ASA's to make sure that you see outbound encrypted traffic on the local ASA. This will also help you see any differences in traffic from different SA's.
10-21-2019 12:30 PM - edited 10-21-2019 01:38 PM
Thanks for the response. For the subnet that is not working, I captured ESP traffic at both ends and cross check the SPIs in the result. The local side is definitely sending out the encrypted traffic but the SPI value is missing at the remote receiving side. I will reach out to the ISP.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide