cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1201
Views
0
Helpful
3
Replies

VPN Between Cisco ASA 5520 and OpenBSD

Greg01456
Level 1
Level 1

We use an appliance called the Calyptix Access Enforcer. The appliance basically does it all including managing VPN tunnel's. The Access Enforcer runs on OpenBSD. I've been migrating 12 existing VPN tunnel's off of our PIX 515 and was successful until the other day. The VPN in question used basic settings and at first we thought it was up but later found that our side could not bring up the tunnel. The Cisco side had no problem bringing up the tunnel. I have already established several VPN tunnel's with the Access Enforcer to Cisco ASA 5520 and ASA 5540 devices so I have no idea why this tunnel will not function properly. I do not have access to the detailed OpenBSD logs but can see this error: "transport_send_messages: giving up on exchange from-XX.XX.X.XXX-to-XX.XXX.XXX.XXX, no response from peer XX.XXX.XXX.XXX:4500". We have tore this tunnel down and rebuilt from scratch with no luck. I don't have much info from the Cisco side but apparantly Phase 2 is not coming up when we initiate traffic.We have verified we are using the correct settings over and over. Again, the Cisco side has no issue bringing up the tunnel. Has anyone seen this before? Any idea's? 

3 Replies 3

Jennifer Halim
Cisco Employee
Cisco Employee

From the one line error message, it seems that the IPSec tunnel is going through a NAT/PAT device, hence NAT-T has been invoked (UDP/4500).

This seems like an issue with the Calyptix Access Enforcer server as you advised that there is no problem bringing the tunnel from the ASA end. Possibly incompatibility of the way they initiate the NAT-T (this is just a guess).

Would probably best to check with Calyptix Access Enforcer support or post this on their forum.

I have been working with the Calyptix support team as well. They state that the Cisco side is blocking port 4500 (NAT-T as you said) but the Cisco side states they are not. And again what is extremely weird is I have 2 other tunnel's using these exact settings with Cisco ASA devices.

Seems to be possibly incompatible NAT-T packet that Cisco might not understand.

My suggestion is to open a TAC case so yourself, Calyptix support and Cisco support can look into the issue together, and this might require further engineering help. Most probably a bug from what it sounds.