03-10-2021 01:01 PM
Hi, all good day;
I am facing an issue with an S2S tunnel between cisco ASA and FortiGate firewall, so far tunnel is UP, and apparently, I am receiving packets from Fortigate
###Crypto MAP
crypto map OUTSIDEMAP 10 match address VPN_DRE
crypto map OUTSIDEMAP 10 set pfs group5
crypto map OUTSIDEMAP 10 set peer (RemotePublicIP)
crypto map OUTSIDEMAP 10 set ikev1 transform-set AES256-SHA
crypto map OUTSIDEMAP 10 set reverse-route
crypto map OUTSIDEMAP interface outside
tunnel-group (RemotePublicIP) type ipsec-l2l
tunnel-group (RemotePublicIP) ipsec-attributes
ikev1 pre-shared-key (PRESHAREDKEY)
03-10-2021 01:35 PM
As is evident by your output there are no encaps, which means nothing is being sent via the VPN tunnel.
Is the ASA the default gateway for your network? Or do you have another firewall for outbound traffic?
Run packet-tracer from the CLI and provide the output for review.
When you run the ping are you testing from the IP address 192.168.0.7?
03-11-2021 06:22 AM
Hi Rob good day, I wasn't aware that the local server had another gateway so after changing the server gateway to point to ASA traffic flow perfectly, thanks for this.
now I have another question as in this kind of configuration I am really new I want to protect traffic allowing just port for SFTP between servers, which is the best way
adding another ACL allowing SFTP traffic
or
Modifying the encryption domain
and an example of how to do it, please.
Thanks.
03-11-2021 06:26 AM
Glad to hear it's working, if you have multiple routing devices, you might want to check that the server can access the other network resources.
Rather than modify the crypto map ACL (encryption domain), use a VPN Filter to restrict traffic sent/received over the VPN tunnel.
03-11-2021 10:35 AM - edited 03-11-2021 10:40 AM
https://packetswitch.co.uk/cisco-asa-vpn-filter/ this is a great example and step by step setup configuration.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide