01-02-2016 01:39 PM
Hi all,
First, I'd like to say that I'm trying to implement this on Packet tracer. I'd like to establish a VPN using an ASA 5505 and a Cisco Router 1841 (both available on Packet tracer).
The devices can ping each other external IP.
The problem is that the VPN is not established. If I run sh crypto isakmp sa command on the ASA, it says: There are no IKEv1 SAs
Configurations for both devices are attached.
Any idea why it's not working?. Sorry if it's not the right forum for this, it's the firt time I post. I've been looking in the forums and I've checked some of the proposed solutions but I haven't found the right answer for my problem :-(
Thanks in advance,
Patty
Solved! Go to Solution.
01-02-2016 03:00 PM
01-02-2016 03:00 PM
01-02-2016 04:46 PM
Hi Karsten,
Thanks for answering my post :-)
So I adjusted my configuration, attached the new files.
After the modifications,if I run sh crypto isakmp sa command on both devices I get:
on the ASA:
There are no IKEv1 SAs
on the router:
IPv4 Crypto ISAKMP SA
dst src state conn-id slot status
IPv6 Crypto ISAKMP SA
But at least after applying the crypto map on the router to the fa0/0 interface, the router gave this message:
*Jan 3 07:16:26.785: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
If I run sh crypto ipsec sa on both devices, I get:
on the ASA:
There are no ipsec sas
on the router:
No SAs found
------------------------------
The modifications:
1- I created a crypto map on the router as recommended, as it's a bit different than creating it in the ASA I hope I did it well
2- I fixed the parameters for phase 1 in the router
3- not sure how to make the tunnel-traffic not NATed... could you please guide me a bit?
4- I've created an access list in the router called vpn like in the ASA, is it ok or is it redundant with the other ACLs?
Sorry, all this VPN and ASA configurations are kind of new to me as I've been learning from some articles I've found in the internettrying to implement it , probably I'm missing a deep knowledge of some important concepts.
Thanks a lot,
Patty
01-02-2016 05:35 PM
That config looks much better now. Typically, it's easier to learn first the foundation of router- and ASA-operation, which includes NAT, and then go further with things like IPSec. But here we go:
On both devices you need NAT rules that tell the router/ASA not to NAT the traffic that comes from the local network and goes to the remote network. For the router it could look like the following:
ip access-list extended NAT
deny ip any 172.16.0.0 0.15.255.255
permit ip 172.16.0.0 0.15.255.255 any
!
ip nat inside source list NAT interface FastEthernet0/0 overload
Whenever you communicate *to* a network 172.16.0.0/12 (which includes your remote network) the traffic is not NATed. Whenever you communicate from your local private addresses to anywhere else, the traffic is NATed.
For the ASA, it's completely different:
nat (inside,outside) source static internal-subnet internal-subnet destination static TERASA-subnet TERASA-subnet no-proxy-arp route-lookup
Here I used the existing objects for Identity NAT, when you start to use the VPN for multiple local or remote subnets, then I would configure extra objects/object-groups for that.
For testing, make sure that the triggering traffic is part of your crypto-definition. On the router you could use an extended ping:
ping 172.23.101.100 source vlan 101
01-03-2016 03:02 AM
Thanks for your answer, the problem is the ASA is recognising the nat as an invalid input:
asa#nat (inside,outside) source static internal-subnet internal-subnet destination static TERRASA-subnet TERRASA-subnet no-proxy-arp route-lookup
^
% Invalid input detected at '^' marker.
Here the list of available commands:
asa(config)#?
aaa Enable, disable, or view user authentication, authorization and accounting
access-group Bind an access-list to an interface to filter traffic
access-list Configure an access control element
class-map Configure MPF Class Map
clock Configure time-of-day clock
configure Configure using various methods
crypto Configure IPSec, ISAKMP, Certification, authority, key
dhcpd Configure DHCP Server
domain-name Change domain name
enable Configure password for the enable command
end Exit from configure mode
exit Exit from configure mode
group-policy Configure or remove a group policy
hostname Change host name of the system
http Configure http server and https related commands
interface Select an interface to configure
ipv6 Global IPv6 configuration commands
name Associate a name with an IP address
names Enable/Disable IP address to name mapping
no Negate a command or set its defaults
ntp Configure NTP
object Configure an object
object-group Create an object group for use in 'access-list', etc
passwd Change Telnet console access password
policy-map Configure MPF Parameter Map
route Configure a static route for an interface
service-policy Configure MPF service policy
setup Pre-configure the system
ssh Configure SSH options
telnet Add telnet access to system console or set idle timeout
tunnel-group Create and manage the database of connection specific records
for IPSec connections
username Configure user authentication local database
webvpn Configure the WebVPN service
Is there any other possible work around?
01-03-2016 04:23 AM
I never used Packet-Tracer, but I would assume that it's related to this software. On real ASAs, there is a nat-statement in global configuration which is needed here.
As a workaround you could remove all NAT-statements from the ASA. Then the ASA will pass all allowed packets without translation. With that you could at least continue your VPN-practicing (if there are not more restrictions in Packet Tracer).
If you want to do more learning on Cisco, then you could also switch to VIRL where all needed features are available. ut this is commercial software ($199/yr) with quite high prerequisites on the PC.
01-03-2016 04:37 AM
Thanks a lot Karsten, you've been really helpful :-)
04-15-2019 10:38 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide