cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
398
Views
0
Helpful
6
Replies

VPN between PIX and ASA

mickyq
Level 1
Level 1

I have a vpn beteen two sites which is working fine. traffic is initiated from site A and can successfully connect to site B ok.

I have just tried to configure traffic from site B to site A but its failing at the vpn encrypt point. I have checked the acl's and they match:

site A (PIX)

crypto acl

access-list site_a permit tcp host 10.51.3.32 10.0.0.0 255.0.0.0 eq 3389

no nat

access-list no_nat permit ip host 10.51.3.32 10.0.0.0 255.0.0.0

 

site B (ASA)

crypto acl

access-list site_b extended permit tcp 10.0.0.0 255.0.0.0 host 10.51.3.32 eq 3389

no nat

access-list nonat extended permit ip 10.0.0.0 255.0.0.0 host 10.51.3.32

 

the only difference i can see is the extended acl but it works ok in one direction?

 

thanks

 

 

1 Accepted Solution

Accepted Solutions

Abaji Rawool
Level 3
Level 3

Hi,

Using port based ACLs for crypto map is not recommended, use IP access-lists and configure VPN filters to implement port restrictions.

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/116639-technote-asa-00.html

Regards,

Abaji

View solution in original post

6 Replies 6

Abaji Rawool
Level 3
Level 3

Hi,

Using port based ACLs for crypto map is not recommended, use IP access-lists and configure VPN filters to implement port restrictions.

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/116639-technote-asa-00.html

Regards,

Abaji

Hi Abaji

Thanks for your responce.

ive changed the acl but it is still failing at the same point. config and capture below:

site A

access-list site_a permit ip host 10.51.3.32 10.0.0.0 255.0.0.0
access-list no_nat permit ip host 10.51.3.32 10.0.0.0 255.0.0.0


site B

access-list site_b extended permit ip 10.0.0.0 255.0.0.0 host 10.51.3.32
access-list nonat extended permit ip 10.0.0.0 255.0.0.0 host 10.51.3.32

SITEB/pri/act# packet-tracer input inside tcp 10.0.0.0 555 10.51.3.32 3389

Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         outside

Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group acl_in in interface inside
access-list acl_in extended permit ip 10.0.0.0 255.0.0.0 host 10.51.3.32
Additional Information:

Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 6
Type: FOVER
Subtype: standby-update
Result: ALLOW
Config:
Additional Information:

Phase: 7
Type: NAT-EXEMPT
Subtype:
Result: ALLOW
Config:
  match ip inside 10.0.0.0 255.255.0.0 outside 10.51.0.0 255.255.0.0
    NAT exempt
    translate_hits = 1, untranslate_hits = 0
Additional Information:

Phase: 8
Type: NAT
Subtype: host-limits
Result: ALLOW
Config:
static (inside,dmz1) 10.0.0.0 10.0.0.0 netmask 255.0.0.0
  match ip inside 10.0.0.0 255.0.0.0 dmz1 any
    static translation to 10.0.0.0
    translate_hits = 163183, untranslate_hits = 3799793
Additional Information:

Phase: 9
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (inside) 1 10.0.0.0 255.0.0.0
  match ip inside 10.0.0.0 255.0.0.0 outside any
    dynamic translation to pool 1 (193.x.x.x)
    translate_hits = 80872410, untranslate_hits = 9060235
Additional Information:

Phase: 10
Type: VPN
Subtype: encrypt
Result: DROP
Config:
Additional Information:

Result:
input-interface: inside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule

Could you check if the tunnel is up?

show cry isa sa

show cry ips sa peer <peer ip>

if the tunnel is not up use following debugs

debug cry cond peer <peer ip>

debug cry isa 127

debug cry ips 127

after debugs are collected type "undebug all"

 

 

 

 

Hi Abaji

changing the acl to full ip did work. I left it and it was working when i went to look at it again.

 

thanks

 

Packet tracer will keep showing a drop until the tunnel comes up. If the tunnel does not come up, check vpn related logs and debugs. 

Spooster IT Services Team

Hi there,

 

- - - - - - - - - - - - - - - - - -

Phase: 7
Type: NAT-EXEMPT
Subtype:
Result: ALLOW
Config:
  match ip inside 10.0.0.0 255.255.0.0 outside 10.51.0.0 255.255.0.0
    NAT exempt
    translate_hits = 1, untranslate_hits = 0
Additional Information:

- - - - - - - - - - - - - - - - - -

I suspect that you might have another tunnel routes over lap with Site A.

thanks

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: