cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
14162
Views
235
Helpful
115
Replies

VPN Connectivity

wynneitmgr
Level 3
Level 3

We currently have a VPN setup for our users when they are on the road or working from home using Cisco AnyConnect. We have the VPN setup on our ASA 5508 Firewall.

 

I now have a client that we send data to that needs us to setup a VPN for the connection. I was wondering if there was anyone out there that would be able to help me create the VPN (IKEv1 or IKEv2) and fill out this VPN questionnaire. Thank you in advance!!

 

vpn1.png

115 Replies 115

@Rob Ingram 

@Aref Alsouqi 

 

Also wondering about "Local Pre-shared Key" and "Remote Peer Pre-Shared Key". Can those be the same? They are both the same PSK right now.

 

keys1.png

 

 

Yes the local and remote PSK can be the same. I assume the 3rd party is using the same for both?

Your debug output above confirms that your ASA and the 3rd party firewall are communicating and attempting to establish the VPN tunnel...if they were to turn on debugs they'd see similar information.

I think the third party made a typo when they configured your public IP address:

crypto map VPN 124 set peer 66.147.191.67

That should read 63.147.191.67, not 66.

Also, is there any reason why they are not using your ASA outside interface IP 63.147.191.66?

@Aref Alsouqi 

@Rob Ingram 

Thanks for catching that typo Aref!!!

 

We have Fiber internet so we actually have 5 working IPs. The machine that I am trying to ping the 3rd party from has an IP of 63.147.191.67.

 

Thank you!

@wynneitmgr 

You do have appear to have a static NAT for that host using that public IP address. Without the VPN all traffic from the host 10.0.0.3 would be natted behind that public IP address.

 

The 3rd party needs to setup their VPN to peer with the IP address of your outside interface, which ends .66 - they cannot terminate the VPN on the NAT ip address ending .67.

 

@Rob Ingram 

@Aref Alsouqi 

 

Thanks Rob! I guess I wasn't clear on which IP to use as our "public" IP. I had the 3rd party change our IP to 63.147.191.66. Hopefully, this will fix the issue. I will let you know as soon as I have confirmation that they changed it.

 

Here is what is setup in ASDM on my ASA

vpn66.pngvpn77.png

Right, so your traffic over the VPN should match the first NAT rule, which is the NAT exemption rule. Which means, traffic between 10.0.0.3 (WYNNEAPP1) and the 2 x Comdata IP address will not be natted.

 

The 4th NAT rule will only be used by WYNNEAPP1 for traffic destined for any other IP address other than the 2 comdata ip addresses, i.e. internet access etc.

@Rob Ingram 

@Aref Alsouqi 

 

Okay, our 3rd Party has updated our address to 63.147.191.66. Do I need to make any other changes? As I can still not ping their IPs

From the configuration you provided, the 3rd party is also running ASA, can you check they changed the tunnel-group to reflect the new IP address?

 

Turn on the debug (as before) run some pings or packet-tracer and provide the debug output for review please.

 

@Rob Ingram 

@Aref Alsouqi 

Packet TRace is successful when I run it from outside interface IP but not the device IP 10.0.0.3.

vpn111.pngvpn222.png

@Rob Ingram 

@Aref Alsouqi 

 

Here is what our 3rd Party is saying now, do you know what it means?

 

I am now receiving logs, phase one is failing due to a DH group mismatch. Local:148.59.168.18:500 Remote:63.147.191.66:500 Username:Unknown IKEv2 Negotiation aborted due to ERROR: The peer's KE payload contained the wrong DH group

 

 

Yes, there is a mismatch between your IKEv2 Policies in regard to DH (diffe hellman) group, ask them to give you their IKEv2 Policy configuration and then provide your own here, so we can compare.

@Rob Ingram 

@Aref Alsouqi 

 

Here is our IKEv2 Policy and the 3rd Party's policy is below the screenshot

IKEV2-1.png

3rd Party's IKEv2 Policy:

crypto ikev2 policy 50

encryption aes-256

integrity sha256

group 19 14 5

prf sha256

lifetime seconds 86400

You should have a match on policies 11, the peer will process policies 1,2 and 3 and fail before processing policy 11.

 

Run the ping and then from the CLI, can you run "show crypto ikev2 sa" and see if there is an IKEv2 SA formed please.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: