cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
252
Views
0
Helpful
0
Replies

Unable to ping other side of L2L VPN via Anyconnect (Azure) - hairpinning

midhun.kr
Level 1
Level 1

I have a site to site VPN between ASA 5510 and Windows Azure cloud. There is an Anyconnect VPN connecting to the ASA. I enabled hairpinning and allowed the Anyconnect VPN pool over the site to site tunnel at both ends. The ASA internal network can reach the IPs in Azure cloud, however the Anyconnect IPs can't. 

Packet tracer output is given below:

 

packet-tracer input outside icmp 10.224.44.16 0 0 10.224.32.4 detailed
 
Phase: 1
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0xac14b1e8, priority=1, domain=permit, deny=false
hits=6336225801, user_data=0x0, cs_id=0x0, l3_type=0x8
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0100.0000.0000
input_ifc=outside, output_ifc=any
 
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         outside
 
Phase: 3
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (outside,outside) source static AZURE-DMZ AZURE-DMZ destination static VPN-POOL VPN-POOL no-proxy-arp route-lookup
Additional Information:
NAT divert to egress interface outside
Untranslate 10.224.32.4/0 to 10.224.32.4/0
 
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group outside_access_in_1 in interface outside
access-list outside_access_in_1 extended permit icmp any any 
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0xacc7ff68, priority=13, domain=permit, deny=false
hits=177578, user_data=0xa99bbd00, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0
dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0
        input_ifc=outside, output_ifc=any
 
Phase: 5
Type: IP-OPTIONS
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0xac14efd8, priority=0, domain=inspect-ip-options, deny=true
hits=83222459, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=any
 
Phase: 6      
Type: CP-PUNT
Subtype: 
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0xac2eda20, priority=79, domain=punt, deny=true
hits=1041, user_data=0xab8e0b50, cs_id=0x0, flags=0x0, protocol=0
src ip/id=10.224.44.16, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=any
 
Phase: 7
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map inspection_default
 match default-inspection-traffic
policy-map global_policy
 class inspection_default
  inspect icmp 
service-policy global_policy global
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0xae810058, priority=70, domain=inspect-icmp, deny=false
hits=1206452, user_data=0xae709af0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0
dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0
        input_ifc=outside, output_ifc=any
 
Phase: 8
Type: WEBVPN-SVC
Subtype: in
Result: DROP
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0xad7a31b8, priority=70, domain=svc-ib-tunnel-flow, deny=false
hits=1378, user_data=0x259f000, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=10.224.44.16, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=any
 
Result:       
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
0 Replies 0