cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4151
Views
0
Helpful
7
Replies

Site-to-site VPN setup on ASA 5505s

securisnetworks
Level 1
Level 1

Hello,

I've been struggling to get a site-to-site VPN going as I am new to Cisco firewalls (but not firewalls in general).  Before going too deep in the config, can someone confirm whether it's possible to restore a backup config from one ASA to another ASA and simply modify some settings?  Or is a backup config unique to a device and that might mess up my site-to-site VPN config?

thanks in advance!

7 Replies 7

Nicolas Fournier
Cisco Employee
Cisco Employee

Hi David,

As long as both ASA are the same model, it should work.

This is confirmed in the configuration guide:

You can restore components, images, and configurations using backups made from the same ASA type. You must start with a basic configuration that allows ASDM access.

http://www.cisco.com/en/US/partner/docs/security/asa/asa84/asdm64/configuration_guide/admin_swconfig.html#wp1301321

Just keep in mind that you might loose ASDM access after the restore as it will change the IP address assigned to the Firewall interfaces to the ones of the backed up device.

Hope this help.

Regards,

Nicolas

Thanks very much for validating that for me.  I have appended the exact Phase 1 error message I am getting below, as well as the two device configs.

The setup is quite simple, which is two ASA 5505's with the two outside interfaces connected to a switch.  I have tried with the ASDM VPN wizard, manually with the ASDM and even with the Cisco Security Manager VPN wizard and have the same errors.  I left all the defaults at this point to simply troublueshooting.

Is there anything obviously missing from the device configs??

thanks!

David

____

Error Msg

_______________

Phase 1 failure: Mismatched attribute types for class Group Description: Rcv'd: Group 5 Cfg'd: Group 2

%ASA-5-713257: Phase var1 failure: Mismatched attribute types for

class var2: Rcv'd: var3 Cfg'd: var4

An adaptive security appliance has acted as the responder in a LAN-to-LAN connection. It indicates that the adaptive security appliance crypto configuration

does not match the configuration of the initiator. The message specifies during which phase the mismatch occurred, and which attributes both the responder

and the initiator had that were different.

• var1—The phase during which the mismatch occurred

• var2—The class to which the attributes that do not match belong

• var3—The attribute received from the initiator

• var4—The attribute configured

_______

Configs

_______

Result of the command: "show run"

: Saved

:

ASA Version 8.4(1)

!

hostname TCDERFW01

enable password * encrypted

passwd * encrypted

names

!

interface Vlan1

description LAN

nameif inside

security-level 100

ip address 10.1.1.1 255.255.255.0

!

interface Vlan2

description WAN

nameif outside

security-level 0

ip address 69.x.x.179 255.255.255.248

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

boot system disk0:/asa841-k8.bin

no ftp mode passive

clock timezone EST -5

clock summer-time EDT recurring

object network obj_any

subnet 0.0.0.0 0.0.0.0

description D Server    

object network D-LAN

subnet 10.1.1.0 255.255.255.0

description D-LAN-Network   

object network OpenDNS1

host 208.67.222.222

description Open DNS Server 1   

object network OpenDNS2

host 208.67.220.220

description Open DNS Server 2   

object network M_LAN

subnet 10.0.0.0 255.255.255.0

description M Network   

object network A_69.x.x.177

object-group service Web_Browsing tcp

description Internet Browsing Protocols

port-object eq ftp

port-object eq www

port-object eq https

object-group network OpenDNS_Servers

network-object object OpenDNS1

network-object object OpenDNS2

access-list inside_access_in extended permit udp object D-LAN object-group OpenDNS_Servers eq domain

access-list inside_access_in extended permit tcp object D-LAN any object-group Web_Browsing

access-list outside_cryptomap extended permit ip object D-LAN object M_LAN

pager lines 24

logging enable

logging timestamp

logging asdm informational

logging flash-bufferwrap

mtu inside 1500

mtu outside 1500

ip verify reverse-path interface inside

ip verify reverse-path interface outside

icmp unreachable rate-limit 1 burst-size 1

icmp permit any echo inside

icmp deny any outside

asdm image disk0:/asdm-641.bin

asdm history enable

arp timeout 14400

!

object network M_LAN

nat (any,outside) dynamic interface

!

nat (inside,outside) after-auto source dynamic any interface

access-group inside_access_in in interface inside

route outside 0.0.0.0 0.0.0.0 69.x.x.177 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication enable console LOCAL

aaa authentication http console LOCAL

aaa authentication ssh console LOCAL

aaa authorization command LOCAL

aaa local authentication attempts max-fail 15

http server enable

http server idle-timeout 30

http 10.0.0.0 255.255.255.0 inside

http 10.1.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart

auth-prompt prompt Identify and authenticate.

auth-prompt accept Go ahead.

auth-prompt reject Sorry, no.

crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac

crypto ipsec ikev2 ipsec-proposal DES

protocol esp encryption des

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal AES192

protocol esp encryption aes-192

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal AES256

protocol esp encryption aes-256

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal AES

protocol esp encryption aes

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal 3DES

protocol esp encryption 3des

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal CSM_IP_1

protocol esp encryption 3des

protocol esp integrity sha-1

crypto map outside_map 1 match address outside_cryptomap

crypto map outside_map 1 set peer 69.x.x.181

crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA

ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

crypto map outside_map 1 set ikev2 ipsec-proposal AES 3DES CSM_IP_1 AES256 AES192 DES

crypto map outside_map interface outside

crypto ca trustpoint ASDM_TrustPoint0

enrollment self

subject-name CN=TCMTLFW01

crl configure

crypto ca trustpoint ASDM_TrustPoint1

enrollment self

subject-name CN=TCDERFW01

crl configure

crypto ca server

shutdown

cdp-url http://TCMTLFW01/+CSCOCA+/asa_ca.crl

issuer-name CN=TCMTLFW01

smtp from-address admin@TCMTLFW01.null

crypto ca certificate chain ASDM_TrustPoint1

certificate e2f7dc4d

    308201d3 3082013c a0030201 020204e2 f7dc4d30 0d06092a 864886f7 0d010105

    0500302e 31123010 06035504 03130954 43444552 46573031 31183016 06092a86

    4886f70d 01090216 09544344 45524657 3031301e 170d3131 30353235 31323537

    32365a17 0d323130 35323231 32353732 365a302e 31123010 06035504 03130954

    43444552 46573031 31183016 06092a86 4886f70d 01090216 09544344 45524657

    30313081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100b8

    8050bf7a 43ee4d78 3658ecce da611625 0e0e1798 29addd50 0229a206 2fc414fd

    4a4e72bb 8caa19a2 6d593ac5 99378ec0 3e00406c 6972f5e2 1ebf39ac f6b5580b

    150e0878 1c9ea6b9 5d302a86 cd1dc3c2 e5f862c4 fc11c2f1 dc62ece8 163d4b9d

    c4c444af 33e4c0a6 11f16903 0d34eaea 92976d46 c0306fb8 183c5775 4ecfad02

    03010001 300d0609 2a864886 f70d0101 05050003 81810081 ce558ff3 c1359282

    dbdaabf1 3d596687 d206e104 122be9d0 1b3e886f 1f9d3227 11bb9e8b b62a868b

    b141b062 523676c1 616e7870 99d96471 8a8534f2 1fd87c94 79d4e5be 1a3e9fa5

    d71a0e86 568df98c 1337d3bc 633720ed 68a57c21 9e411291 58ccd8ca c045c450

    d6c36934 c8e62d3a 9d192821 e1234c42 9df43022 fa94d3

  quit

crypto ikev2 policy 20

encryption aes

integrity sha

group 5

prf sha

lifetime seconds 86400

crypto ikev2 enable outside

crypto ikev1 enable outside

crypto ikev1 policy 5

authentication pre-share

encryption 3des

hash sha

group 5

lifetime 86400

crypto ikev1 policy 10

authentication crack

encryption aes-256

hash sha

group 2

lifetime 86400

crypto ikev1 policy 20

authentication rsa-sig

encryption aes-256

hash sha

group 2

lifetime 86400

crypto ikev1 policy 30

authentication pre-share

encryption aes-256

hash sha

group 2

lifetime 86400

crypto ikev1 policy 40

authentication crack

encryption aes-192

hash sha

group 2

lifetime 86400

crypto ikev1 policy 50

authentication rsa-sig

encryption aes-192

hash sha

group 2

lifetime 86400

crypto ikev1 policy 60

authentication pre-share

encryption aes-192

hash sha

group 2

lifetime 86400

crypto ikev1 policy 70

authentication crack

encryption aes

hash sha

group 2

lifetime 86400

crypto ikev1 policy 80

authentication rsa-sig

encryption aes

hash sha

group 2

lifetime 86400

crypto ikev1 policy 90

authentication pre-share

encryption aes

hash sha

group 2

lifetime 86400

crypto ikev1 policy 100

authentication crack

encryption 3des

hash sha

group 2

lifetime 86400

crypto ikev1 policy 110

authentication rsa-sig

encryption 3des

hash sha

group 2

lifetime 86400

crypto ikev1 policy 120

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

telnet timeout 5

ssh scopy enable

ssh 10.0.0.0 255.255.255.0 inside

ssh 10.1.1.0 255.255.255.0 inside

ssh timeout 15

ssh version 2

console timeout 0

dhcpd auto_config outside

!

dhcpd address 10.1.1.100-10.1.1.110 inside

dhcpd dns 208.67.222.222 208.67.220.220 interface inside

!

threat-detection basic-threat

threat-detection scanning-threat shun duration 60

threat-detection statistics host

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

ntp server 192.5.41.41 source outside prefer

ntp server 192.5.41.40 source outside

ssl encryption aes128-sha1 aes256-sha1 3des-sha1

webvpn

group-policy DfltGrpPolicy attributes

vpn-idle-timeout none

vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec

group-policy GroupPolicy_69.x.x181 internal

group-policy GroupPolicy_69.x.x.181 attributes

vpn-tunnel-protocol ikev1 ikev2

username xx password * encrypted privilege 15

username yy password * encrypted privilege 15

username zz password * encrypted privilege 15

tunnel-group DefaultL2LGroup ipsec-attributes

ikev1 pre-shared-key *****

ikev2 remote-authentication pre-shared-key "*****"

ikev2 local-authentication pre-shared-key "*****"

tunnel-group 69.x.x.181 type ipsec-l2l

tunnel-group 69.x.x.181 general-attributes

default-group-policy GroupPolicy_69.x.x.181

tunnel-group 69.x.x.181 ipsec-attributes

ikev1 pre-shared-key *****

ikev2 remote-authentication pre-shared-key *****

ikev2 local-authentication pre-shared-key *****

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect rsh

  inspect rtsp

  inspect esmtp

  inspect sqlnet

  inspect skinny 

  inspect sunrpc

  inspect xdmcp

  inspect sip 

  inspect netbios

  inspect tftp

  inspect ip-options

!

service-policy global_policy global

prompt hostname context

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

Cryptochecksum:7850d462ce9bb061d424988b0f2e9420

: end

Result of the command: "show run"

: Saved

:

ASA Version 8.4(1)

!

hostname TCMTLFW01

enable password * encrypted

passwd * encrypted

names

!

interface Vlan1

description LAN

nameif inside

security-level 100

ip address 10.0.0.1 255.255.255.0

!

interface Vlan2

description WAN

nameif outside

security-level 0

ip address 69.x.x.181 255.255.255.248

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

boot system disk0:/asa841-k8.bin

no ftp mode passive

clock timezone EST -5

clock summer-time EDT recurring

object network obj_any

subnet 0.0.0.0 0.0.0.0

object network TCDERPUM01

host 10.1.1.10

description D Server   

object network D-LAN

subnet 10.1.1.0 255.255.255.0

description D-LAN-Network  

object network OpenDNS1

host 208.67.222.222

description Open DNS Server 1  

object network OpenDNS2

host 208.67.220.220

description Open DNS Server 2  

object network M_LAN

subnet 10.0.0.0 255.255.255.0

description M Network  

object-group service Web_Browsing tcp

description Internet Browsing Protocols

port-object eq ftp

port-object eq www

port-object eq https

object-group network OpenDNS_Servers

network-object object OpenDNS1

network-object object OpenDNS2

access-list inside_access_in extended permit udp object M_LAN object-group OpenDNS_Servers eq domain

access-list inside_access_in extended permit tcp object M_LAN any object-group Web_Browsing

access-list outside_cryptomap extended permit ip object M_LAN object D-LAN

pager lines 24

logging enable

logging timestamp

logging asdm informational

logging flash-bufferwrap

mtu inside 1500

mtu outside 1500

ip verify reverse-path interface inside

ip verify reverse-path interface outside

icmp unreachable rate-limit 1 burst-size 1

icmp permit any echo inside

icmp deny any outside

asdm image disk0:/asdm-641.bin

asdm history enable

arp timeout 14400

!

object network M_LAN

nat (any,outside) dynamic interface

access-group inside_access_in in interface inside

route outside 0.0.0.0 0.0.0.0 69.165.219.177 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication enable console LOCAL

aaa authentication http console LOCAL

aaa authentication ssh console LOCAL

aaa authorization command LOCAL

aaa local authentication attempts max-fail 15

http server enable

http server idle-timeout 30

http 10.0.0.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

auth-prompt prompt Identify and authenticate.

auth-prompt accept Go ahead.

auth-prompt reject Sorry, no.

crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac

crypto ipsec ikev2 ipsec-proposal AES

protocol esp encryption aes

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal 3DES

protocol esp encryption 3des

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal CSM_IP_1

protocol esp encryption 3des

protocol esp integrity sha-1

crypto ipsec ikev2 ipsec-proposal AES256

protocol esp encryption aes-256

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal AES192

protocol esp encryption aes-192

protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal DES

protocol esp encryption des

protocol esp integrity sha-1 md5

crypto map outside_map 1 match address outside_cryptomap

crypto map outside_map 1 set peer 69.x.x.179

crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA

ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

crypto map outside_map 1 set ikev2 ipsec-proposal AES 3DES CSM_IP_1 AES256 AES192 DES

crypto map outside_map interface outside

crypto ca trustpoint ASDM_TrustPoint0

enrollment self

fqdn none

subject-name CN=TCMTLFW01

crl configure

crypto ca server

shutdown

smtp from-address admin@TCMTLFW01.null

crypto ca certificate chain ASDM_TrustPoint0

certificate b743d94d

    308201d3 3082013c a0030201 020204b7 43d94d30 0d06092a 864886f7 0d010105

    0500302e 31123010 06035504 03130954 434d544c 46573031 31183016 06092a86

    4886f70d 01090216 0954434d 544c4657 3031301e 170d3131 30353233 30313434

    31395a17 0d323130 35323030 31343431 395a302e 31123010 06035504 03130954

    434d544c 46573031 31183016 06092a86 4886f70d 01090216 0954434d 544c4657

    30313081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100b5

    4c78227c 27e240d3 b2b0baf8 fc9e5238 318d88e7 0594fa10 f63f411e 54dbd000

    ee6c46c1 8498dcc2 75ea346b f81b325c 8ea05d63 7fa3773d 7baf82fa 41e8f031

    1a66338a 5b0203fa dc17056d 0e36b973 cdf1cd1f e9f05c99 a31164a2 8b5bb32c

    f77d09a8 5b2c476f b6a509b9 d2d9ec4c 1eecf6cb 61c587cd 13e52980 444dd502

    03010001 300d0609 2a864886 f70d0101 05050003 8181005e 8aac5aea c102a9e7

    3e5c54d6 1d1723d7 b1c6b402 6b6f3ab0 1fc28e62 6a1580bf fc2d9a55 6bc74cb1

    c9ed450f b66cb5ec 4ca640c4 d04d0616 6c0dce10 738490dd e5746ae0 044553a0

    75d9bfcd d8189605 96951545 ae37a99a 9aaa91a3 d5e513a7 254dc89b a67fdd16

    bc56ac16 781cde9a 98aff4ee 805fc710 c085bd1e 5404b0

  quit

crypto ikev2 policy 10

encryption aes-192

integrity sha

group 5

prf sha

lifetime seconds 86400

crypto ikev2 policy 20

encryption aes

integrity sha

group 5

prf sha

lifetime seconds 86400

crypto ikev2 enable outside

crypto ikev1 enable outside

crypto ikev1 policy 5

authentication pre-share

encryption 3des

hash sha

group 5

lifetime 86400

crypto ikev1 policy 10

authentication crack

encryption aes-256

hash sha

group 2

lifetime 86400

crypto ikev1 policy 20

authentication rsa-sig

encryption aes-256

hash sha

group 2

lifetime 86400

crypto ikev1 policy 30

authentication pre-share

encryption aes-256

hash sha

group 2

lifetime 86400

crypto ikev1 policy 40

authentication crack

encryption aes-192

hash sha

group 2

lifetime 86400

crypto ikev1 policy 50

authentication rsa-sig

encryption aes-192

hash sha

group 2

lifetime 86400

crypto ikev1 policy 60

authentication pre-share

encryption aes-192

hash sha

group 2

lifetime 86400

crypto ikev1 policy 70

authentication crack

encryption aes

hash sha

group 2

lifetime 86400

crypto ikev1 policy 80

authentication rsa-sig

encryption aes

hash sha

group 2

lifetime 86400

crypto ikev1 policy 90

authentication pre-share

encryption aes

hash sha

group 2

lifetime 86400

crypto ikev1 policy 100

authentication crack

encryption 3des

hash sha

group 2

lifetime 86400

crypto ikev1 policy 110

authentication rsa-sig

encryption 3des

hash sha

group 2

lifetime 86400

crypto ikev1 policy 115

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

telnet timeout 5

ssh scopy enable

ssh 10.0.0.0 255.255.255.0 inside

ssh timeout 15

ssh version 2

console timeout 0

dhcpd auto_config outside

!

dhcpd address 10.0.0.100-10.0.0.110 inside

dhcpd dns 208.67.222.222 208.67.220.220 interface inside

!

threat-detection basic-threat

threat-detection scanning-threat shun duration 60

threat-detection statistics host

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

ntp server 192.5.41.41 source outside prefer

ntp server 192.5.41.40 source outside

ssl encryption aes128-sha1 aes256-sha1 3des-sha1

webvpn

group-policy DfltGrpPolicy attributes

vpn-idle-timeout none

vpn-tunnel-protocol ikev1 ikev2

group-policy GroupPolicy_69.x.x.179 internal

group-policy GroupPolicy_69.x.x.179 attributes

vpn-tunnel-protocol ikev1 ikev2

username xx password * encrypted privilege 15

tunnel-group DefaultL2LGroup ipsec-attributes

ikev1 pre-shared-key *****

ikev2 remote-authentication pre-shared-key *****

ikev2 local-authentication pre-shared-key *****

tunnel-group 69.x.x.179 type ipsec-l2l

tunnel-group 69.x.x.179 general-attributes

default-group-policy GroupPolicy_69.x.x.179

tunnel-group 69.x.x.179 ipsec-attributes

ikev1 pre-shared-key *****

ikev2 remote-authentication pre-shared-key *****

ikev2 local-authentication pre-shared-key *****

!

!

prompt hostname context

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

Cryptochecksum:5f72a5d4e186627cbe61c07ec8166d13

: end

Hi David,

Config looks good.

I'm not sure that the error message that you pasted is the real cause of the issue since we can have it at proposal comparison time even for a working scenario.

Could you maybe enable "debug cry isa 80" on both sides and try to initiate the tunnel and get us the output?

We should see the reason of the issue there.

Regards,

Nicolas

Thanks Nicolas.

You were correct that the Phase 1 error was for something else...an old device was still trying to initiate IPSEC tunnels with the IP address that ends in .179 that I had assigned to one of the ASA outside interfaces.   There is no other activity when I run that debug command, on either ASA. 

When you say "bring up the tunnel", are you referring to simply initiating traffic to the other end of the VPN and the tunnel will dynamically be setup?  Or do I need to no something else to bring up the tunnel??

thanks,

David

Hi David,

That is correct, when I'm talking about bringing up the tunnel, it just means pass traffic that should go through it.

In our case, a continuous ping from 10.1.1.X to 10.0.0.X should do it.

For the debugs, it is weird you don't get any output when you enable them.

Are you connected via ssh/telnet to the firewall? If so, can you add the "term mon" command and see if you start having something?

Regards,

Nicolas

Hi Nicolas,

Based on your feedback that it was weird to have no debug info on the screen, and the fact that the config looked good and I've tried just about everything else, I reset both devices to Default and redid the VPN config and it worked on the first try.  I guess there was some glitch that was causing me issues.

Thanks for your feedback and help!

David

Hi David,

Glad to hear everything is fine now

Regards,

Nicolas