05-31-2012 08:06 PM
Hi,
I had a pix that had two working tunnels going to one 5510 and one 5520. Today the VPN tunnel to our 5520 stopped working but if I do sh cry isa sa both tunnels have QM_IDLE as the state. (both ends) I tried to debug crypto isakmp 255 but all I get is PEER_REAPER_TIMER and no other output on the pix side.
I'm looking for commands or something to try that could help ...
Solved! Go to Solution.
06-07-2012 07:46 PM
This ACL line overlaps with the actual crypto ACL "Outside_cryptomap_20"
access-list Outside_cryptomap_10 extended permit ip datacenter-inside-network 255.255.254.0 hq-office-network 255.255.255.0
Please kindly remove the above line, then clear all tunnels so it renegotiates the correct SA.
05-31-2012 08:14 PM
Please share the output of "show cry ipsec sa" from both ends.
05-31-2012 08:54 PM
#### 5520 ####
Crypto map tag: Outside_map, seq num: 20, local addr: 66.xx.xx.134
access-list Outside_cryptomap_20 permit ip 10.21.30.0 255.255.254.0 10.3.185.0 255.255.255.0
local ident (addr/mask/prot/port): (10.21.30.0/255.255.254.0/0/0)
remote ident (addr/mask/prot/port): (10.3.185.0/255.255.255.0/0/0)
current_peer: 66.xxx.xx.18
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 5739, #pkts decrypt: 5739, #pkts verify: 5739
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#send errors: 0, #recv errors: 0
local crypto endpt.: 66.xx.xx.134, remote crypto endpt.: 66.xxx.xx.18
path mtu 1500, ipsec overhead 58, media mtu 1500
current outbound spi: 27A6B8F0
inbound esp sas:
spi: 0xCAD7D446 (3403142214)
transform: esp-3des esp-md5-hmac no compression
in use settings ={L2L, Tunnel, PFS Group 2, }
slot: 0, conn_id: 16035840, crypto-map: Outside_map
sa timing: remaining key lifetime (kB/sec): (4373597/25842)
IV size: 8 bytes
replay detection support: Y
Anti replay bitmap:
0xFFFFFFFF 0xFFFFFFFF
outbound esp sas:
spi: 0x27A6B8F0 (665237744)
transform: esp-3des esp-md5-hmac no compression
in use settings ={L2L, Tunnel, PFS Group 2, }
slot: 0, conn_id: 16035840, crypto-map: Outside_map
sa timing: remaining key lifetime (kB/sec): (4374000/25832)
IV size: 8 bytes
replay detection support: Y
Anti replay bitmap:
0x00000000 0x00000001
#### pix ####
local ident (addr/mask/prot/port): (office_range_inside/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.21.30.0/255.255.254.0/0/0)
current_peer: 66.xx.xx.134:500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 7665, #pkts encrypt: 7665, #pkts digest 7665
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
#send errors 794, #recv errors 0
local crypto endpt.: 66.xxx.xx.18, remote crypto endpt.: 66.xx.xx.134
path mtu 1500, ipsec overhead 56, media mtu 1500
current outbound spi: cad7d446
inbound esp sas:
spi: 0x27a6b8f0(665237744)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 3, crypto map: to_colo
sa timing: remaining key lifetime (k/sec): (4608000/24961)
IV size: 8 bytes
replay detection support: Y
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0xcad7d446(3403142214)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 4, crypto map: to_colo
sa timing: remaining key lifetime (k/sec): (4607515/24954)
IV size: 8 bytes
replay detection support: Y
outbound ah sas:
outbound pcp sas:
local ident (addr/mask/prot/port): (office_range_inside/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.4.1.0/255.255.255.0/0/0)
current_peer: 66.xx.xx.134:0
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 66.xxx.xx.18, remote crypto endpt.: 66.xx.xx.134
path mtu 1500, ipsec overhead 0, media mtu 1500
current outbound spi: 0
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
05-31-2012 09:31 PM
Base on the above output, encaps increases on the PIX ends, but no decaps, and the opposite on ASA ends, ie: decaps increase and encaps is zero.
That means traffic is being sent from PIX towards the ASA end, however, either the traffic does not reach the
10.21.30.0/255.255.254.0 network, or that network is not replying or being blocked somewhere, or some routing error hence there is no encaps on the ASA end.
05-31-2012 09:45 PM
What could cuse an issue like this since this was working yesterday and just magaically stopped working today. I can still use my VPN client to access the 5520 connecting to the same network as the site-2-site.
If there is any information from the 5520 that would be helpful I can get that...
05-31-2012 10:17 PM
Well, that is the useful information from the output of "show cry ipsec sa" showing exactly where it is failing.
You would need to further investigate back towards your LAN network and see where it's failing.
If there is no changes on the ASA, there might be changes at your other network devices.
If you can still use your VPN client, then possibly it doesn't know how to route back towards the remote LAN subnet (
10.3.185.0/24).
06-01-2012 10:07 AM
I'm lost right now trying to find the solution for this problem... What other information would you need to troubleshoot this issue? Do you know of anyone that might be interested in looking deeper into this issue? (consulting)
06-01-2012 10:18 AM
if I do icmp trace and ping from the inside of our pix side to the inside if the asa side I see the ping return but it never gets encapsulated...
ICMP echo request from outside:10.3.185.106 to inside:10.21.31.56 ID=21782 seq=12 len=56
ICMP echo reply from inside:10.21.31.56 to outside:10.3.185.106 ID=21782 seq=12 len=56
Looks like there is a bug in 8.2.1 that I think I'm hitting.
CSCtb53186 Duplicate ASP crypto table entry causes firewall to not encrypt traffic
I found that a reboot will clear this up but is there another way?
06-01-2012 07:49 PM
Do you mean you did a reload and that fixed the issue?
If that is the case, I would suggest upgrading to the latest version of 8.2.x.
06-01-2012 08:40 PM
Hey Freddy, did a reboot fix it for you mate? which code do you run? I seem to have a similar issue, but mine is realted to the ASA 5540 running 8.4(2) which is not natting my tunnel traffic even though my nat statements are perfect and the packet tracer output shows everything to be okay!
W E I R D!
*having sleepless nights*
06-01-2012 08:47 PM
I will reload tonight. I'm using a 5520 8.2(1) looking to upgrade to 8.2(5). Is that easy btw? I have 2 5520 in active/active..
Sent from Cisco Technical Support iPad App
06-01-2012 08:51 PM
Yup, pretty easy. You can pre-upload the software to both the ASA.
Then when you are ready to reload it, just change the "boot system" to the latest software, save the config, and reload.
Here is the steps for your reference for Active/Active failover:
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/admin_swconfig.html#wp1057555
06-02-2012 01:20 AM
let us know how you go mate. I am very reluctant to bounce my asa as it is in a multitenant environment and being accessed 24/7..a downtime would be $$$.. so much for managing and setting up a whole asa all by myself. i wish I had a team to discuss my problems with. lol
06-04-2012 11:23 AM
Hi Guys,
This weekend I reloaded both active and standby asa but I'm still having the same issue with the one broken tunnel.
I tried re-creating the tunnel and that did not work I have used two pixes on the other end bit they both gives the same issue... Full connection BUT one side does encaps and the other decaps only!
My next step is to get 8.2(5) and do an upgrade this week.
I have other L2L tunnels working + I have about 10 User VPN connections going to this same asa. This is just crazy, everything looks good too me...
06-04-2012 05:43 PM
It doesn't quite sound like an ASA issue if other tunnels are working and vpn client is also working, plus you have already reloaded the unit as well.
Please check that you have the correct route back for this particular remote LAN network.
This is exactly what Mikull experience on his network, and it ended up with switch failure causes incorrect routing, and traffic is not being routed back towards the ASA for traffic destined to a particular remote LAN network.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide