04-15-2013 12:14 PM
I have a problem configuring a site to site VPN between two sites, one is an ASA5540 with version 8.2, the other is an ASA5545X with version 9.0
I'll try to include the relevant portions of the configs here... the tunnel will not establish and nothing shows on debug logs that I can find.
I know the outside addresses for both work, as clients can connect into both.
ASA5540:
: Saved
:
ASA Version 8.2(5)
object-group network VEYANCE_NET
network-object <ASA5540NetworkObject>
object-group network LAN_NETWORKS
network-object <ASA5540AllLocalNetworks>
bject-group network ASA5545X_NETWORKS
network-object <ASA5545XNetwork>
access-list ASA5545X_VPN_ACL extended permit ip object-group LAN_NETWORKS object-group ASA5545X_NETWORKS
access-list ASA5545X_VPN_ACL extended permit ip object-group ASA5545X_NETWORKS object-group LAN_NETWORKS
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map mymap 1 match address outside_1_cryptomap
crypto map mymap 1 set pfs
crypto map mymap 1 set peer <ASA5545XexternalIP>
crypto map mymap 1 set transform-set ESP-3DES-MD5
crypto map ASA5545X_VPN_CRYPTO_MAP 1 match address ASA5545X_VPN_ACL
crypto map ASA5545X_VPN_CRYPTO_MAP 1 set peer <ASA5545XexternalIP>
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 2
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
no crypto isakmp nat-traversal
tunnel-group <ASA5545XexternalIP> type ipsec-l2l
tunnel-group <ASA5545XexternalIP> ipsec-attributes
pre-shared-key <key>
!
ASA5545X:
ASA Version 9.0(1)
!
object network ASA5540
range <Networks on ASA5540 LAN>
object-group network LAN_NETWORKS
<all networks on internal LAN>
access-list ASA5540_VPN_ACL extended permit ip object-group ASA5540_Networks object-group LAN_NETWORKS
access-list ASA5540_VPN_ACL extended permit ip object-group LAN_NETWORKS object-group ASA5540_Networks
access-list OUTSIDE_cryptomap_1 extended permit ip object-group LAN_NETWORKS object-group ASA5540_Networks
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto map ASA5540_VPN_CRYPTO_MAP 3 set peer <ASA5540 External IP>
crypto map ASA5540_VPN_CRYPTO_MAP 3 set ikev2 ipsec-proposal 3DES
crypto map ASA5540_VPN_CRYPTO_MAP 3 set ikev2 pre-shared-key *****
crypto ca trustpoint _SmartCallHome_ServerCA
crl configure
crypto ca trustpoint localtrust
enrollment self
keypair VPNClientKey
crl configure
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 3
encryption 3des
integrity md5
group 2
prf md5
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption 3des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable OUTSIDE client-services port 443
crypto ikev2 remote-access trustpoint ASDM_TrustPoint0
crypto ikev1 enable OUTSIDE
crypto ikev1 policy 1
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
dns-server value <dns server>
group-policy GroupPolicy_<ExternalIP of 5540> internal
group-policy GroupPolicy_<ExternalIP of 5540> attributes
vpn-tunnel-protocol ikev2
tunnel-group <ExternalIP of 5540> type ipsec-l2l
tunnel-group <ExternalIP of 5540> general-attributes
default-group-policy GroupPolicy_<ExternalIP of 5540>
tunnel-group <ExternalIP of 5540> ipsec-attributes
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
Any thoughts are appreciated.
Solved! Go to Solution.
04-15-2013 10:47 PM
Your 5545 is configured for IKEv2 negotiation (see crypto-map and relevant config), while 5540 is trying to use IKEv1, when connecting to 5545. Those two are incompartable, so you have to modify config on 5545 to use IKEv1.
04-15-2013 08:56 PM
A debug usually highlights pretty quickly where site-site VPN runnel establishment is failing:
debug crypto condition peer
debug crypto isakmp 7
... and then introduce interesting traffic. The log should higlight the point of failure.
Note the second command is changed on the 9.x end to:
debug crypto ikev1 7
04-16-2013 08:19 AM
This did help, with troubleshooting, once I followed the step below. I was able to capture enough now to have some idea what to fix.
04-15-2013 10:47 PM
Your 5545 is configured for IKEv2 negotiation (see crypto-map and relevant config), while 5540 is trying to use IKEv1, when connecting to 5545. Those two are incompartable, so you have to modify config on 5545 to use IKEv1.
04-16-2013 08:20 AM
Thanks, this was a huge help, I couldn't see it (after looking at it for so long). Didn't totally fix my problem, but put me on the right track.
04-16-2013 08:43 AM
Ok, so I have made some headway, and I have resolved a further key issue, but am still getting an issue in the debugs as follows:
Apr 16 11:38:11 [IKEv1]: Group =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: Group =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: Group =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: Group =
Apr 16 11:38:12 [IKEv1 DEBUG]: Group =
Apr 16 11:38:12 [IKEv1]: Group =
Apr 16 11:38:12 [IKEv1]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: IP =
Apr 16 11:38:12 [IKEv1 DEBUG]: IP =
I'm wondering if the existing problem, why it is tearing it down, is the address space not matching? Is that a possibilty, not good at doing this CLI only...
04-16-2013 09:22 AM
From the config, you provided above i don't see any proxy-IDs configured on 5545 (match statemet under crypto-map config), plus on 5540 the ACL referred in the crypto-ID is not present in the config.
So, configure proxy-IDs appropriately, so they'll be mirrored to each other on each site.
04-16-2013 09:29 AM
Right. Andrew's observation is supported by the failure shown in the debug:
Removing peer from correlator table failed, no match!
That's usually an indication that crypto maps aren't set up to mirror each other. I think perhaps "outside_1_cryptomap" should instead refer to "ASA5545X_VPN_ACL" in your 5540 config.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide