cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2506
Views
0
Helpful
14
Replies

The VPN tunnel is not up

kevinshkong11
Level 1
Level 1

Hi ALL,

I have setup the site-to-site VPN between HQ and branch, but the tunnel is not up.

Appreciate if you can help.

ASA# sh crypto isakmp sa

There are no IKEv1 SAs

There are no IKEv2 SAs


hostname ASA
enable password 0e53SZdxezxawxDG encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
names
name 192.168.14.0 Guest_Wifi description Guest Wifi
name 172.28.4.0 Office_Wifi description Office Wifi
name 172.16.4.0 Wifi_Mgmt description Wifi Mgmt
name 172.16.1.0 HQ_Mgmt description HQ_Mgmt
name 10.12.1.0 Office_LAN description Office LAN             

!
interface GigabitEthernet1/1
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/1.100
 description TM Unifi
 vlan 100
 nameif outside
 security-level 0
 ip address 175.140.195.166 255.255.255.0
!
interface GigabitEthernet1/1.101
 vlan 101
 nameif inside
 security-level 100
 ip address 192.168.101.2 255.255.255.252
!
interface GigabitEthernet1/2
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/3
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/4
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/6
 shutdown
 no nameif
 no security-level
 no ip address
!          
interface GigabitEthernet1/7
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/8
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management1/1
 management-only
 no nameif
 no security-level
 no ip address
!
boot system disk0:/asa961-lfbff-k8.SPA
ftp mode passive
clock timezone MYT 8
object network obj_any
 subnet 0.0.0.0 0.0.0.0
object network NETWORK_OBJ_10.3.96.0_24
   
 subnet 10.3.96.0 255.255.255.0
object network Facing_FW
 range 192.168.101.1 192.168.101.2
 description Facing FW Segment
object-group network Branch_Segment
 description VPN Segment
 network-object Office_LAN 255.255.255.0
 network-object Wifi_Mgmt 255.255.255.0
 network-object Office_Wifi 255.255.255.0
 network-object object Facing_FW
object-group network HQ_Segment
 description HQ VPN Segment
 network-object 10.1.1.0 255.255.255.0
 network-object 10.3.66.0 255.255.255.0
object-group protocol DM_INLINE_PROTOCOL_1
 protocol-object ip
 protocol-object icmp
access-list inside_access_in extended permit ip any any
access-list outside_cryptomap extended permit ip object-group Branch_Segment object-group HQ_Segment
pager lines 24
logging enable
logging timestamp
logging buffer-size 512000
logging buffered debugging
              
logging asdm informational
mtu outside 1500
mtu inside 1500
no failover
no monitor-interface service-module
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-761.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source dynamic any interface
nat (inside,outside) source static Branch_Segment Branch_Segment destination static HQ_Segment HQ_Segment no-proxy-arp route-lookup
route outside 0.0.0.0 0.0.0.0 175.140.195.165 1
route inside Office_LAN 255.255.255.0 192.168.101.1 1
route inside Wifi_Mgmt 255.255.255.0 192.168.101.1 1
route inside Office_Wifi 255.255.255.0 192.168.101.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
              
timeout floating-conn 0:00:00
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
http server enable
http Office_LAN 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 outside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev2 ipsec-proposal AES256
 protocol esp encryption aes-256
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
 protocol esp encryption aes-192
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
 protocol esp encryption aes             
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
 protocol esp encryption 3des
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
 protocol esp encryption des
 protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto map outside_map 1 match address outside_cryptomap
crypto map outside_map 1 set peer 175.156.233.162
crypto map outside_map 1 set ikev1 transform-set ESP-3DES-MD5
crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
crypto map outside_map interface outside
crypto ca trustpool policy
crypto ikev2 policy 1
 encryption aes-256
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 10
 encryption aes-192
 integrity sha
 group 5 2             
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 20
 encryption aes
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 30
 encryption 3des
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 40
 encryption des
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 enable outside
crypto ikev1 enable outside
crypto ikev1 policy 160
 authentication pre-share
 encryption 3des
 hash md5
 group 5
 lifetime 86400
telnet timeout 5
no ssh stricthostkeycheck
ssh 0.0.0.0 0.0.0.0 outside
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 60
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outside
!
ntp server 10.12.1.2 prefer
group-policy GroupPolicy_175.156.233.162 internal
group-policy GroupPolicy_175.156.233.162 attributes
 vpn-tunnel-protocol ikev1 ikev2
dynamic-access-policy-record DfltAccessPolicy
username misadminservice password 6Pee0pMhMPokimu4 encrypted privilege 15
tunnel-group 175.156.233.162 type ipsec-l2l
tunnel-group 175.156.233.162 general-attributes
 default-group-policy GroupPolicy_175.156.233.162         
tunnel-group 175.156.233.162 ipsec-attributes
 ikev1 pre-shared-key *****
 ikev2 remote-authentication pre-shared-key *****
 ikev2 local-authentication pre-shared-key *****
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect ip-options
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny  
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip  
  inspect xdmcp
  inspect dns preset_dns_map
  inspect icmp
policy-map type inspect dns migrated_dns_map_1
 parameters
  message-length maximum client auto
  message-length maximum 512
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:2dea187e87f731aa3c2523ff031aeea6
: end

Below is packet tracer result.

ccbcherasfw# packet-tracer input inside(icmp010.12.1.100 8 0 10.1.1.57 detailed

Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 175.139.195.165 using egress ifc  outside

Phase: 2
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (inside,outside) source dynamic any interface
Additional Information:
Dynamic translate 10.12.1.100/0 to 175.139.195.166/36199
 Forward Flow based lookup yields rule:
 in  id=0x2aaac183d570, priority=6, domain=nat, deny=false
        hits=13139, user_data=0x2aaac1839b90, cs_id=0x0, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=inside, output_ifc=outside

Phase: 3
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac0d1c2f0, priority=0, domain=nat-per-session, deny=true
        hits=8597, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=any, output_ifc=any

Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac181a5d0, priority=0, domain=inspect-ip-options, deny=true
        hits=13314, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=inside, output_ifc=any

Phase: 5
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map inspection_default
 match default-inspection-traffic
policy-map global_policy
 class inspection_default
  inspect icmp
service-policy global_policy global
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac26b0bf0, priority=70, domain=inspect-icmp, deny=false
        hits=1198, user_data=0x2aaac26aed50, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
        src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0
        input_ifc=inside, output_ifc=any

Phase: 6
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac1819de0, priority=66, domain=inspect-icmp-error, deny=false
        hits=1202, user_data=0x2aaac1819350, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
        src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0
        input_ifc=inside, output_ifc=any

Phase: 7
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (inside,outside) source dynamic any interface
Additional Information:
 Forward Flow based lookup yields rule:
 out id=0x2aaac183e270, priority=6, domain=nat-reverse, deny=false
        hits=12637, user_data=0x2aaac1839ca0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=inside, output_ifc=outside

Phase: 8
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Reverse Flow based lookup yields rule:
 in  id=0x2aaac0d1c2f0, priority=0, domain=nat-per-session, deny=true
        hits=8599, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=any, output_ifc=any

Phase: 9
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
 Reverse Flow based lookup yields rule:
 in  id=0x2aaac17beb40, priority=0, domain=inspect-ip-options, deny=true
        hits=12951, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=outside, output_ifc=any

Phase: 10
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 12959, packet dispatched to next module
Module information for forward flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_inspect_icmp
snp_fp_translate
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat

Module information for reverse flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_translate
snp_fp_inspect_icmp
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat

Result:
output-interface: outside
output-status: up
output-line-status: up
Action: allow

Thank you.

14 Replies 14

Terence Payet
Level 1
Level 1

HI,

The reason why it is not working is because of your object-group network Branch_Segment

There are no network networks defined apart for  network-object object Facing_FW which is  range 192.168.101.1 192.168.101.2

You need to create the additional network for it to work. 

HTH.

Regards,

Terence

Hi Payet,

It is already defined in network object.

object network Facing_FW
 range 192.168.101.1 192.168.101.2
 description Facing FW Segment
object-group network Branch_Segment
 description VPN Segment
 network-object Office_LAN 255.255.255.0
 network-object Wifi_Mgmt 255.255.255.0
 network-object Office_Wifi 255.255.255.0
 network-object object Facing_FW

Thank you.

HI,

I saw that, but where are the subnets define for network-object Office_LAN 255.255.255.0 for example.

This is just an object, you need to configure the subnets within your object as per below:

network-object Office-LAN

 subnet 10.10.10.0 255.255.255.0

and then apply under the object-group

object-group network Branch_Segment
 description VPN Segment
 network-object Office_LAN 

 HTH.

Regards,

Terence

Hi,

Ok. I saw it. :) You are using naming to define your networks.

And i didn;'t see your packet tracer output as well.

Your issue is with NAT.

You need to do a no NAT for those subnets.

What ASA software version are you using?

REgards,

Terence

Hi Payet,

I am using Cisco ASA 5506-x.

ASA# sh ver

Cisco Adaptive Security Appliance Software Version 9.6(1)
Device Manager Version 7.6(1)

Compiled on Fri 18-Mar-16 14:04 PDT by builders
System image file is "disk0:/asa961-lfbff-k8.SPA"

Hi,

TRy the below:

nat (inside, TM Unifi) source static Branch_Segment Branch_Segment static HQ_Segment HQ_Segment

HTH.

Please rate helpful post.

Regards,

Terence 

Hi Terence,

It is already configured in config above.

nat (inside,outside) source static Branch_Segment Branch_Segment destination static HQ_Segment HQ_Segment no-proxy-arp route-lookup.

Oh yes..

Is it possible to do a debug on the ASA.

If so can you post the output of 

debug crypto isakmp 200

Note that the issue might be on the remote device as well.

Regards,

Terence

Hi Terence,

I tried to ping from 10.12.1.100 to 10.1.1.57.

Please find the attached for debug log.

The configuration in HQ is same with other branch.

HQ is using SonicWALL.

Regards

Kevin

Can you run the below debug.

debug crypto ikev1 127

Hi Terence,

Nothing comes out.

ASA# sh debug
debug crypto ikev1 enabled at level 200
debug crypto ikev2 protocol enabled at level 200

You need to generate traffic whilst doing the debug.

Can you debug at level 127 by debug cry ikev1 127

ASA# sh debug
debug crypto ikev1 enabled at level 127

Ping from 10.12.1.100 to 10.1.1.57

Aug 23 2016 19:57:55: %ASA-7-609001: Built local-host outside:10.1.1.57
Aug 23 2016 19:57:55: %ASA-6-302020: Built outbound ICMP connection for faddr 10.1.1.57/0 gaddr 175.140.195.166/1 laddr 10.12.1.100/1
Aug 23 2016 19:57:55: %ASA-6-302021: Teardown ICMP connection for faddr 10.1.1.57/0 gaddr 175.140.195.166/1 laddr 10.12.1.100/1
Aug 23 2016 19:57:55: %ASA-7-609002: Teardown local-host outside:10.1.1.57 duration 0:00:02
Aug 23 2016 19:57:55: %ASA-6-305012: Teardown dynamic UDP translation from inside:10.12.1.100/64901 to outside:175.140.195.166/64901 duration 0:00:30
Aug 23 2016 19:57:55: %ASA-6-305012: Teardown dynamic UDP translation from inside:10.12.1.100/52057 to outside:175.140.195.166/52057 duration 0:00:30
Aug 23 2016 19:57:55: %ASA-6-305012: Teardown dynamic UDP translation from inside:10.12.1.100/63933 to outside:175.140.195.166/63933 duration 0:00:30
Aug 23 2016 19:57:55: %ASA-6-305012: Teardown dynamic UDP translation from inside:10.12.1.100/56051 to outside:175.140.195.166/56051 duration 0:00:30
Aug 23 2016 19:57:55: %ASA-6-305012: Teardown dynamic UDP translation from inside:10.12.1.100/54737 to outside:175.140.195.166/54737 duration 0:00:30
Aug 23 2016 19:57:55: %ASA-7-609001: Built local-host outside:10.1.1.57
Aug 23 2016 19:57:55: %ASA-6-302020: Built outbound ICMP connection for faddr 10.1.1.57/0 gaddr 175.140.195.166/1 laddr 10.12.1.100/1
Aug 23 2016 19:57:56: %ASA-6-305011: Built dynamic UDP translation from inside:10.12.1.100/63602 to outside:175.140.195.166/63602
Aug 23 2016 19:57:56: %ASA-7-609001: Built local-host outside:8.8.8.8
Aug 23 2016 19:57:56: %ASA-6-302015: Built outbound UDP connection 8002 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:10.12.1.100/63602 (175.140.195.166/63602)
Aug 23 2016 19:57:57: %ASA-6-302021: Teardown ICMP connection for faddr 10.1.1.57/0 gaddr 175.140.195.166/1 laddr 10.12.1.100/1
Aug 23 2016 19:57:57: %ASA-7-609002: Teardown local-host outside:10.1.1.57 duration 0:00:02
Aug 23 2016 19:57:57: %ASA-6-302016: Teardown UDP connection 8002 for outside:8.8.8.8/53 to inside:10.12.1.100/63602 duration 0:00:01 bytes 177
Aug 23 2016 19:57:57: %ASA-7-609002: Teardown local-host outside:8.8.8.8 duration 0:00:01

This very strange.

Phase 1 is not coming up.

The only thing i can think of is the name-based objects

Can you try the below and advise:

network-object Office-LAN

 subnet 10.12.1.0 255.255.255.0

access-list outside_cryptomap extended permit ip object Office_LAN object-group HQ_Segment

nat (inside,outside) source static Office_LAN Office_LAN destination static HQ_Segment HQ_Segment

Regards,

Terence