cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
14191
Views
235
Helpful
115
Replies

VPN Connectivity

wynneitmgr
Level 3
Level 3

We currently have a VPN setup for our users when they are on the road or working from home using Cisco AnyConnect. We have the VPN setup on our ASA 5508 Firewall.

 

I now have a client that we send data to that needs us to setup a VPN for the connection. I was wondering if there was anyone out there that would be able to help me create the VPN (IKEv1 or IKEv2) and fill out this VPN questionnaire. Thank you in advance!!

 

vpn1.png

115 Replies 115

Yes, you don't need configure any certificate information.

Obviously that pre-shared keys needs to be the same key used by the peer.

@Rob Ingram 

 

Yes, peer will use the same key.

 

Here is what the finished VPN looks like.

 

vpn7.png

Ok, well you've selected all ciphers for IKEv1 and IKEv2, so it's bound to match one of them!!!

Did you create a NAT exemption rule to ensure traffic from your local network to the remote networks (those 2 ip addresses) are not natted?

@Rob Ingram 

 

No, I did not create NAT exemption rule. What should that look like?

vpn11.png

 

Also,  They are wanting our IP address, which I believe is our Public IP. And then our HOST address, not sure what this is?

vpn10.png

Correct, the public IP address.

 

The host address is the private IP address(es) of the computers accessing the peer network, which would be your internal/inside networks. It looks like they want each individual IP address (which is what a /32 represents). So for example if you have 5 computers accessing their VPN, you will define 5 host ip addresses in a network object. Your configuration needs to match exactly what they've configured.

 

NAT Exemption rule would look something like this:

 

nat exemption.PNG

 

@Rob Ingram 

 

Here is what I made for NAT rule:

vpn12.png

Ok, looks ok. So as long as "wynneapps1" represents the host(s) on your internal network and "Comdata" represents the hosts on the remote network, then this traffic would not be natted.

 

You'll need to ensure you are using those objects in the configuration of the VPN, these host objects should mirror the peers configuration.

@Rob Ingram 

 

Okay, thanks for all your help! I will send the info over to them so they can test. I'll let you know how it goes or if I have any additional questions.

@Rob Ingram 

 

So now that I have the VPN all configured on my Firewall, how do I test the VPN connection is working? I was thinking just ping the IP addresses, is that correct? Or is there another way to test the VPN connection?

Yes, run a ping from WYNNEAPP1 to Comdata IP address

 

If the ping doesn't work, from the CLI run "show crypto ipsec sa" and provide the output for review.

@Rob Ingram 

 

I was unable to ping 2 of the IP addresses.

 

Here is the output from the CLI "show crypto ipsec sa"

There are no ipsec sas

Ok, I assume there is no output from "show crypto ikev2 sa" either?

 

Can you turn on debugs "debug crypto ikev2 platform 128", "debug crypto ikev2 protocol 128" and provide the output for review please.

@Rob Ingram 

 

Yes same thing on "show crypto ikev2 sa": There are no IKEv2 SAs

 

Not getting anything on debug

firewall1.png

Sorry, I wasn't clear. After you entered those 2 debug commands, run the ping again. This will hopefully generate traffic and attempt to establish a VPN tunnel, this should provide a load of debug messages.

@Rob Ingram 

 

I ran those 2 commands again and then tried to ping. Where will I find the debug messages?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: