02-25-2013 02:02 AM
Hi guys,
I've configured a site to site VPN between two routers, everything is working fine except pinging the internal (LAN) IP of one router.
Everything else is working fine: pinging the hosts through the tunnel in both directions.
The routers I'm using:
- 1841 IOS: 15.0(1)M3
- 2811 IOS: 15.0(1)M5 -> here is the problem. I can't ping the inside interface of this router.
I checked the ipsec sa counters and it seems that it doesn't send the packets back through the tunnel when I'm ping the LAN interface.
#pkts encaps isn't incrementing.
Has anyone had this issue before?
Thanks a lot.
Best regards
Solved! Go to Solution.
02-25-2013 11:14 PM
I think that happens because when router responds to icmp request it puts it's outside interface IP (not IP of inside interface, wich you're trying to ping) as a source of a packet. So icmp-responce doesn't go to the tunnel, 'cause router's outside interface IP address doesn't included in the crypto-acl.
Solution to this, if it's correct guess, is to add router's outside IP to the crypto-acl.
02-25-2013 10:53 PM
has anybody had this problem before?
Thanks.
02-25-2013 11:14 PM
I think that happens because when router responds to icmp request it puts it's outside interface IP (not IP of inside interface, wich you're trying to ping) as a source of a packet. So icmp-responce doesn't go to the tunnel, 'cause router's outside interface IP address doesn't included in the crypto-acl.
Solution to this, if it's correct guess, is to add router's outside IP to the crypto-acl.
02-25-2013 11:21 PM
that did it.
thanks!
02-25-2013 11:46 PM
Hi Andrew,
thanks for the reply.
It worked for a second but now it doesn't anymore.
#send errors is incrementing when I ping the LAN interface.
here is the crypto ACL
Router A
permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.2.0 0.0.0.255 host WAN_IP
Router B -> here I got #send errors when I ping it form the other side.
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
permit ip host WAN_IP 192.168.2.0 0.0.0.255
I also got on Router B:
%CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main mode failed with peer at WAN_IP_Router_A
any ideas?
Thanks.
02-25-2013 11:55 PM
Try clearing all crypto isakmp/ipsec SAs and reestablish the tunnel.
02-26-2013 12:16 AM
still the same. no SAs are created. I realized that the hosts aren't pingable anymore.
if I remove the entry from the crypto ACL everything is working fine.
from Router B:
#send errors 26, #recv errors 0
local crypto endpt.: WAN_ROUTER_B, remote crypto endpt.: WAN_ROUTER_A
path mtu 1500, ip mtu 1500, ip mtu idb Vlan100
current outbound spi: 0x0(0)
PFS (Y/N): N, DH group: none
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
Thanks.
02-26-2013 01:17 AM
From where you are pinging inside interface of router. From Router A or form any host.
02-26-2013 01:30 AM
from both.
02-26-2013 02:18 AM
If u are pinging form Router then you will have to ping using your source interface command.
If you are on host Check GW of Host is Router Inside Interface IP.
Do Rate Helpful posts
02-26-2013 02:20 AM
yes I do an extended ping.
yes the gw is ok.
Thanks.
02-26-2013 02:28 AM
Post Config
02-26-2013 02:30 AM
of both Routers
02-26-2013 02:34 AM
Cristian, i don't know why, but if you say that no SA is established, it seems like after you add that string to the crypto-acl's, routers can't agree on that new crypto-acl's and don't establish SAs. Try to debug isakmp/ipsec and see why this is happening.
And, btw, why do you need to be able to ping that inside interface from the subned behind site A gateway?
02-26-2013 02:44 AM
Hi Andrew,
the isakmp is ok, the ipsec goes somewhere wrong.
I got this:
%CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main mode failed with peer at WAN_IP_Router_A
what is even stranger, is that the traffic between the 2 sites doesn't go through the tunnel anymore when I add the ACL entries.
I'd like to backup the config with cat tools over VPN. For this I need access to the LAN interface.
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide