Showing results for 
Search instead for 
Did you mean: 

VPN was down after running for few hours

Level 1
Level 1



I am facing an issue that the VPN is down after running for few hours.

It happens after migrating to new WAN connection.

It will back to normal if revert back to existing WAN connection

I found that it shows different encryption and hash with what I configured.


asa(config)# sh run crypto isakmp
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash md5

 group 2
 lifetime 86400
asa(config)# sh cry
asa(config)# sh crypto is
asa(config)# sh crypto isakmp sa det

   Active SA: 1
    Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1

1   IKE Peer:
    Type    : user            Role    : initiator
    Rekey   : no              State   : MM_WAIT_MSG2
    Encrypt : aes-256         Hash    : SHA
    Auth    : preshared       Lifetime: 0

Kindly advise.


Thank you

13 Replies 13

Level 1
Level 1



Anybody can help?


Thank you.


the status of your IKEv1 (MM_WAIT_MSG2) means it wasn't successful.

you should see "MM_ACTIVE" for established IPsec VPN peering.

did you configure the new public IP address on the remote VPN peer on its crypto map?

kindly post sanitized config from both VPN peers.


I did configured the new public IP in remote VPN peer.


Please find attached for config.



if is the new IP, your local ASA is still pointing at


you need to change the configuration of the tunnel on your side.


remember to create the tunnel-group and change the peer on the crypto map.


let me know if that helps-




Hi, is remote peer IP address.

The attached is branch asa config.

The remote site is HQ which is using SonicWALL. is the current public IP which works fine in VPN.

For new public IP, I only change the interface vlan 2 IP address and default routing.

As for remote site, I will point to new IP.

But I have VPN issue after migrating to new public IP.



enable crypto on the outside.


crypto map outside_map interface outside




Sorry I accidentally deleted in attached file. Actually it is there.


Well the configuration on your side looks good, but you are sending the request and the replay is not coming back.


is the sonic wall already pointing at make sure it also supports 3des and md5 for phase 1.


also your next hub IP is probably not right

route outside 1


can you ping from the ASA?


It is correct.

Can Ping.


route outside 1

ok i guess the config was just not updated.


what shows on the command is not the problem.

lets get a capture;

cap cap interface outside match ip host host

try to send traffic in order to bind the tunnel and get;

#show cap cap

then also export the capture.

save it and attach it here.


what we are probably going to see is one way traffic. probably peer does not know how to get to, or the ISP could be blocking UPD 500.



It is pointing to new.

But just when I do sh crypto isakmp sa det

Encrypt : aes-256         Hash    : SHA

It shows different encryption.

Is it normal?


I reproduced the issue on a lab, that seems to be expected. I will let you know if I find proper documentation for that.

so don't worry about that for now.


review attach.