06-17-2016 03:39 PM
Hi,
I am trying to create a VPN connection from a 891 to a Meraki MX84. The VPN connection looks like its working as I am not seeing any errors on either side from any of the isakmp, ipsec debug and firewall logs, but I am unable to ping either subnets on the other side. I can ping the routers so I am thinking there is something wrong with my NAT settings. This is my first time trying to configure this so I apologies for any stupid mistake that I might have made.
If anyone noticed any blatant issues please let me know or if you have some suggest I am willing to give anything a try.
I have attached a trimmed version of the config with the odd lines removed
The local subnet is 192.168.50.0\24 and the remote is 10.190.200.0\24
A few outputs
show crypt isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
***.***.***.*** ***.***.***.*** QM_IDLE 2010 ACTIVE
show crypto ipsec sa
interface: GigabitEthernet0
Crypto map tag: CMAP, local addr ***.***.***.***
protected vrf: (none)
local ident (addr/mask/prot/port): (192.168.50.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.190.200.0/255.255.255.0/0/0)
current_peer ***.***.***.*** port 4500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 1610, #pkts decrypt: 1610, #pkts verify: 1610
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: ***.***.***.***, remote crypto endpt.: ***.***.***.***
path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0
current outbound spi: 0x47F1C42(75439170)
06-20-2016 12:52 AM
Access-list 100 does not exists for this NAT entry.
ip nat inside source list 100 interface GigabitEthernet0 overload
Also you wouldn't normally need multiple NAT lines for the same interface like this,
NAT-INSIDE_ACL should have the deny first. But the IP addresses don't match your VPN. They should be more like:
ip access-list extended NAT-INSIDE_ACL
deny ip 192.168.50.0 0.0.0.255 10.190.200.0 0.0.0.255
permit ip 192.168.50.0 0.0.0.255 any
06-20-2016 09:57 AM
Thanks for getting back to me Philip.
I have removed the old NAT record I was playing with
ip nat inside source list 100 interface GigabitEthernet0 overload
and changed the order of the ACL, never even noticed I had the wrong IP in there, guess that is what happens when looking at the problem for so long.
With the changes made it still hasn't resolved the issue.
06-20-2016 11:54 AM
Could you post your updated config now please. I'm guessing the issue is the zone based firewall now.
06-20-2016 01:16 PM
06-21-2016 01:22 PM
I think some of your zone based rules for the "self" zone might be causing an issue. Try adding this:
ip access-list extended SELF-TO-WAN_ACL
permit esp any any
permit udp any eq 500 any
permit udp any eq 4500 any
ip access-list extended WAN-TO-SELF_ACL
permit esp any any
permit udp any eq 500 any
permit udp any eq 4500 any
06-21-2016 02:23 PM
I added the new ACL`s but its made no difference.
Looking at the packet capture I am not receiving any ESP traffic from the Cisco device.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide