Cisco VPN :: ASA 5500 - Restored Failed Unit Now Unable To Pass Traffic Over VPN Tunnels

Nov 11, 2012

I restored the HA pair back to Active/Standby.
 
1 remaining issue.
 
I have 3 IPsec Site-to_SIte tunnels.
 
I noticed that when the NEW UNIT becomes ACTIVE that I am unable to pass traffic over the VPN tunnels.When I failback I am able to pass traffic.

View 7 Replies


ADVERTISEMENT

Cisco WAN :: 881-K9 - Unable To Pass DHCP Or Other Traffic Through L2tp Tunnel

Dec 14, 2011

we have two routers CISCO881-K9 and we have established l2tpv3 pesuduwire between two routers: attached the configuration file for both routers.
 
Although the l2tp established but we are unable to pass the DHCP or other traffic through l2tp tunnel from router A to router- B. [code]

View 1 Replies View Related

Cisco VPN :: 2801 - Unable To Route Traffic Over IPsec / GRE Tunnels

Jan 12, 2013

I have an issue where I can get traffic to pass from HDQ to two branch offices over our ipsec/gre tunnels even though the tunnels appear to be UP. The HDQ is a 2811, branch is a home office using an 871W and branch runs a 2801 router. I initially had HDQ working fine with the 871W but when I configured branch2 (2801), they both broke. The tunnels appear to be up but traffic is not routing across them. The two 2801 routers run 12.4 (c2800nm-adventerprisek9-mz.124-24.T2.bin). These are gre over ipsec tunnels. Currently traffic flows over an exsting MPLS network that we are getting away from due to cost. As soon as I change the routes to point to the Tunnels, it breaks. Traffic doesn't appear to pass through the tunnel. I have attached my sanitized configs.

HDQ#sh crypto sessCrypto session current status
Interface: FastEthernet0/1Session status: UP-ACTIVEPeer: 205.205.205.21 port 500  IKE SA: local 204.204.204.66/500 remote 205.205.205.21/500 Active  IPSEC FLOW: permit 47 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0        Active SAs: 4, origin: crypto map  IPSEC FLOW:

[Code]....

View 3 Replies View Related

Cisco Firewall :: ASA 5510 Users Are Unable To Pass Traffic When Connected Through Vpn

Sep 12, 2011

I am migrating over from and old PIX to an ASA 5510. After configuring the new device everything else is functional (Internet) but users are unable to pass traffic when connected through the vpn, they are able to authenticate and I see their session connected on the ASDM but no data is passed..[code]

View 4 Replies View Related

Cisco Firewall :: Replacement Of Primary Unit Failed ASA5510

Sep 7, 2011

I have an issue bringing up my RMA'd primary ASA unit.
 
So what happened so far:
 
1. primary unit failed
2. secondary took over and is now secondary - active (as per sh fail)
2. requested RMA at Cisco
3. got ASA and checked that Lic (SSL), OS (8.2.2) and ASDM are at the same level as the secondary
4. issued wr erase and reloaded
5. copied the following commands to the new (RMA) primary unit:
failover lan unit primary
failover lan interface Failover Ethernet3
failover interface ip Failover 172.x.x.9 255.255.255.248 standby 172.x.x.10
int eth3
no shut
failover
wr mem
6. installed primary unit into rack
7. plugged-in all cables (network, failover, console and power)
8. fired up the primary unit
9. expected that the unit shows:
Detected an Active mate
Beginning configuration replication from mate.
End configuration replication from mate.
10. but nothing happened on primary unit
 
What is a valid and viable approach in replacing a failed primary unit? Is there a missing step that hinders me to successfully replicate the secondary - active config to the primary - standby unit.
 
I was not able to find anything related to ASA55xx primary unit replacement with a clear guideline or step by step instructions.

View 10 Replies View Related

Cisco :: ASA 5520 - LU Allocate Xlate Failed / Failover Unit Reloads

Mar 24, 2010

We just had an issue with our failover unit reloading. In perusing the logs there were a number of %ASA-3-210007:
LU allocate x late failed, errors prior to the reload. These units had just had their OS upgraded to fix a DOS issue a few weeks ago. I have not seen the error since it reloaded. However, I was asked to report the issue just in case it is a bug in the new version of the OS.Two units in failover. 
 
Cisco Adaptive Security Appliance Software Version 8.0(5)9 Device Manager Version 6.0(2). Compiled on Mon 01-Feb-10 10:36 by buildersSystem image file is

"disk0:/asa805-9-k8.bin"Config file at boot was "startup-config"  
CP-ASA up 17 days 21 hoursfailover cluster up 17 days 22 hours
[code]....

View 1 Replies View Related

Cisco Firewall :: 5520 - Procedure To Replace Failed Secondary ASA Unit

Apr 10, 2012

i just received a RMA for failed ASA 5520 that was acting as secondary unit in multicontext configuration. What would be correct procedure to install it back in production? Do i need to restore backed up config of the fallen unit or is it just enough to enable multimode and connect to existing (primary) unit? Any good link for documentation that deal with this issues.

View 5 Replies View Related

Cisco Firewall :: How Many IPSec Tunnels An ASA 5500 Series Supports

Aug 4, 2012

I tried looking in ASA documentations but unable to find out that how many IPSec Tunnels can be terminated to an ASA cluster. I have 5545 running only two IPSec Tunnels so far but need to terminate 18 sites all up and would like to confirm how many tunnels we could terminate? Is there a limitaion to it?

View 2 Replies View Related

Cisco :: VPN Connects But Can't Pass Traffic?

Apr 29, 2011

A former coworker of mine setup VPN capabilities to our office network shortly before he left. It is no longer working. We can connect to VPN but I'm not able to ping any devices on the remote network or Remote Desktop to any of the server. After 30 minutes, the VPN connection drops. I have attached our ASA 5505 config to assist in troubleshooting.

View 3 Replies View Related

Cisco WAN :: 1921 Won't Pass Traffic?

Jul 9, 2011

I can telnet to the router and ping places on the inside and outside. However when I connect a laptop to the inside interface I can ping to the outside for a bit but can't open a web page and then connectivity is gone all together. At first I thought it was a NAT issue but I know I am good on that front. I have attempted to change the speeds and duplex settings on the outside interface but it does not seem to work. Again if I take the cable from the outside interface and plug it into a laptop it works fine. The thing that makes me wonder is why can I connect to the outside interface and configure it just fine?

View 4 Replies View Related

Cisco Firewall :: ASA5505 Does Not Pass Traffic

Jan 25, 2013

I used the GUI configuration tool for this ASA 5505. When I install it no traffic passes. I am wondering to verify my config. I have masked the usernames for VPN with xxxxxx and yyyyyy. [code]

View 6 Replies View Related

Cisco WAN :: 877 Pass PPPOE Traffic To Another Router?

Jan 7, 2011

A PC connected to a Cisco 877 router and 877 router is connected to another router (7301) via GRE tunnel,Cisco 7301 router is a NAS server and is being used as a PPPOE server.If user create a PPPOE connection on his computer and dial with a username/pass we want to send the PPPOE traffic to 7301 router, so 877 router should pass the PPPOE traffic to 7301 and user will be able to connect,User -> 877   -> 7301(PPPOE server).

View 4 Replies View Related

Cisco Firewall :: ASA5505 Will Not Pass Traffic?

Nov 15, 2011

I am trying to setup my very first ASA5505 and I cannot get it to pass traffic from the inside to the outside. I am not using NAT/PAT. Here is what I have done so far.
 
ASA5505(config)# interface Vlan 1ASA5505(config-if)# nameif insideASA5505(config-if)# security-level 100ASA5505(config-if)# ip address 33.46.132.34 255.255.255.248ASA5505(config-if)# no shut

[Code]....

Then from the asdm I permited everything from inside to go out but I cannot get any traffic through. I can ping the outside if I source the outside interface but not if I source the inside. The logs would not show me anything.
 
I did a packet tracer and it indicates the implicit deny rule at the end of the access-list is stopping my traffic eventhough I have allow rules above it?
 
I also checked the box in the asdm to allow traffic to pass without NAT

View 5 Replies View Related

Cisco Firewall :: PPTP Traffic Cannot Pass Through PIX 525 7.0(7)

May 6, 2008

i read cisco document:[URL] pptp client is in inside,pptp server is in outside.when i donot use firewall, the pptp connection can establish successfully.but use pix 525 7.0(7) i config:

inspect pptp.
pptp connection cannot setup.
show connection in pix:
pptp tcp 1723 is ok.

gre connection only one "E" flag, E means 'outside back connection'.i try second method:delete 'inspect pptp',permit tcp 1723 and gre traffic from outside to inside, and i have config static nat,but the pptp connection cannot work too.so i think there is a pptp bug exist in pix 7.0(7).

View 5 Replies View Related

Cisco Wireless :: 5500 - Default Gateway ARP Lookup Failed

Aug 31, 2012

On a 5500 series WLC I see I have an issue where peap clients get randomly disconnected with these errors
 
MAX_EAPOL_KEY_RETRANS: 1x_ptsm.c:444 Max EAPOL-key M1 retransmissions exceeded for client 24:77:03:35:79:34
 
AAA-6-ARP_LOOKUP_FAIL: radius_db.c:3232 Default gateway arp lookup failed.
aaaQueueReader: Aug 31 19:12:14.938: %AAA-4-RADIUSMSG_SEND_FAILED: radius_db.c:3567 Unable to send RADIUS message to

View 7 Replies View Related

Cisco :: Ikev1 ASA 8.4 VPN Connects But Doesn't Pass Traffic

May 2, 2011

I setup the ikev1 client and can connect but I can't pass traffic either way. I have tried icmp, port 80, smb etc... here is my config: ........

View 9 Replies View Related

Cisco VPN :: ASA 5510 - Anyconnect Connects But Won't Pass Traffic?

Aug 11, 2011

I am trying to use a ASA 5510 with AnyConnect as an in-line SSL VPN device.  I have a separate firewall that NAT's 443 to the inside IP of the ASA, which is the only configured interface on the ASA.  I can connect to the ASA from the WAN just fine and the AnyConnect client connects just fine, I get an IP lease across the VPN on my LAN, all looks well.  The problem is that I cannot pass any traffic.  The only device on my LAN that I can ping is the ASA, nothing else including the default gateway is accessibe.  I have setup a static route on the ASA pointing 0.0.0.0 0.0.0.0 to the LAN gateway, but no dice.

View 1 Replies View Related

Cisco Firewall :: ASA5505 Connects Through Lan But Cannot Pass Traffic

Sep 13, 2011

We have an issue where by we connect to various customers and the Cisco IPSEC remote access works fine from our LAN through an ASA5505 to a customer site.We have 1 customer that we have some issues with. We can connect  from the LAN through to the customers VPN, authenticate and establish a tunnel but in we cannot pass traffic. When we try from outside of the office on a public internet connection the VPN works fine. What could cause this issue?

View 3 Replies View Related

Cisco WAN :: 7206 VXR Configuration To Pass MPLS Traffic?

May 28, 2013

I have a 7206 VXR router between a several Mikrotik routers on our backbone.  We have the Mikrotiks on both sides of the CIsco 7206VXR setup for MPLS/VPLS.  I need to simply setup the 7206 to pass the MPLS/VPLS tagged packets to the next router on the link.  We are using OSPF as the routing protocol.  I am told by our Mikrotik guy that I just need to enable LDP and VPLS tunnels 4:0 on the 2 gig interfaces on the 7206VXR to let it pass the MPLS/VPLS traffic.  It sounds simple but I'm not sure how to do this. 

Any commands I need to imput to allow this router to pass this MPLS/VPLS traffic. 

View 1 Replies View Related

Cisco VPN :: 5520 - How Much Traffic Pass Through Into IPSec In ASA Firewall

Mar 20, 2013

How can I see the quantity of traffic that is passing through into an IPSec VPN in a ASA 5520.

View 3 Replies View Related

Cisco WAN :: 3825 Router Interface Does Not Pass Traffic

Mar 7, 2012

we have a Cisco 3825 router which does not work well with a DSL  modem(ISP provided). I have configured the Gi0/0 port of the router to  plug into this DSL modem but it does not ping to the ISP gateway. If we  do a shut/no shut on the interface then it work fine for about 30 secs.  Sometimes even for 1 hr. Then the packets drop and we cannot pass any  traffic through this interface.
 
Now, if the ISP connection is terminated on a computer it works fine. It works fine without dropping any packet.I  have tried various options like using a straight/cross cable. I have  tried to configure the interface negotiation for 100/full, 100/half,  auto/auto and almost all the options.I have also tried to interconnect the devices using a L2 device like a HUB. Nothing works.

View 5 Replies View Related

Cisco VPN :: 3900 / How To Ensure All VPN Traffic Will Pass Through Router

Jan 11, 2013

I recently upgraded from a Cisco 3900 series router to a Cisco ASR1k router. Since the upgrade, I have internal clients who claim they cannot connect to external VPNs. These internal clients are behind a NAT that routes a public IP address to a group of clients with private IP addresses.
 
How can I ensure that all VPN traffic is able to pass through the NAT? 

View 2 Replies View Related

Cisco VPN :: 2811 - SSL VPN Services / Cannot Pass Traffic To Internet

Jan 17, 2013

[OK]     Site to Site IPSec + GRE = success, no problems.
[OK]     IPSec remote access = success, no problems.
[NO]     SSL VPN = remote users can successfully connect to all internal systems. Cannot pass traffic to the Internet.
 
Hardware:
Cisco 2811, Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4(22)T5, RELEASE SOFTWARE (fc3) . Software: Cisco Any Connect Secure Mobility Version 3.1.01065
 
Single hub router terminating IPSec+GRE site to site, IPSec remote access, and SSLVPN remote access VPN services. All services currently configured and running successfully with the exception of the SSLVPN service. Remote users can initiate and successfully establish SSL VPN sessions. While established, connectivity to all internal systems/resources are successful. Only when the remote access client tries to connect to "Outside" Internet resources does traffic not pass successfully. Troubleshooting has pointed to a NAT related issue (I believe).
 
When connecting from a remote access workstation, utilizing IPSec remote access client (built-in Cisco IPSec client from Mac OS), the session establishes and the client works flawlessly. Examining the Cisco 2811 router, you see the /32 host route from the remote access session get installed, and you see the corresponding NAT translation entries created when the client accesses outside (Internet) resources. Appropriate configuration to implement "hair pinning" have been included to handle the in and right back out (with NAT translation) needed for remote clients to access the Internet.
 
Configured the 2811 for SSL VPN, and remote access clients can successfully connect and access all internal network resources. Examining the Cisco 2811, the /32 host route for the remote access client is installed, pointing to SSLVPN-VIF0 interface with a next hop of 0.0.0.0  When checking the NAT translation table, there are NO entries for the remote access client address created which leads me to believe the hair pinning/NAT function is not being invoked for SSLVPN clients.
 
Originally, the IPSec remote access VPN local pool was 10.0.100.0 /24. To keep from having to adjust the existing NAT translation, PBR Route-MAP for the hair pinning function - I took the 10.0.100./24 and broke it into a pair of /25 networks. Bottom half for the IPSec remote access VPN pool (10.0.100.0 /25); upper half for the SSL VPN pool (10.0.100.128 /25). By utilizing SSL VPN, is the traffic somehow bypassing the DIALER1 interface where both the crypto map (and more importantly: IP NAT OUTSIDE, and PBR configuration for the hair pinning function)? I cant explain why NAT translation entries are not being created for SSLVPN client sessions.
 
Cisco 2811 Configuration has been included. IPSec & SSL VPN Remote Access Sessions Captures (performed from same remote client) have been included.

View 2 Replies View Related

Cisco VPN :: 1803 ISR - Restrict Traffic Through EasyVPN Tunnels

Feb 16, 2011

We are using a 1803 ISR for remote vpn users. They use Cisco VPN clients with the EasyVPN server functionality of the ISR. I would like to restrict the ports/protocols which they can use to the remote network they connect to.
This is the (edited) client config in the ISR:
 
crypto isakmp client configuration group RemoteVPN key remoteaccess dns 192.168.0.1 domain domain.local pool POOL_1 acl 140 netmask 255.255.255.240,access-list 140 remark EasyVPN ACLaccess-list 140 permit ip 192.168.0.0 0.0.0.255 any
 
I tried to edit the acl 140 with access rules, but they do not seem to have any effect. If I edit acl 140 with deny ip any any, for example, the remote users can still use any protocol to access the remote network.

View 2 Replies View Related

Cisco VPN :: ASA5510 - Slow Traffic On IPSec Tunnels

May 2, 2013

We have many VPN tunnels back to our corporate office.  All of these tunnels are very slow (same with our client VPN's).  Our main firewall device at the corporate office is an ASA5510.  We have a 100 Mb/sec Metro Ethernet internet connection here.  We do not allow split-tunneling.

Our remote sites vary.  We have DSL connections, cable internet connections, and other types of broadband that vary in speeds from 5 to 100 Mb/sec (up and down).  The remote sites mostly have PIX 501's, but we have an ASA 5505 in one of the locations.

To take an example.  On one of our remote sites that has a 100 Mb/sec connection, if I ping device to device, I'm getting ping times of about 50ms.  And I'm pinging back through another 100 Mb/sec connection.  If I get on a computer down there and run a speed test, I'm showing down speeds of about 1.5 Mb/sec... nowhere near 100.  Some of that could be due to the lack of split tunneling, but I also suspect this could be an MTU issue. 

Right now, all my MTU's are just set to the default 1500.  Perhaps this is too high.  I used this site to check my max: [URL]
 
I did a few tests from behind several of my firewalls.  I pinged from a machine on one side of the tunnel to the firewall on the other end.  I'm assuming the max MTU I come up with is the max MTU for the firewall I'm behind while pinging, right?  The max amounts I came up with for some of my devices were as follows: Corporate ASA 5510 > 1272 (if you add the 28 byte packet header that would make it 1300) Remote PIX 501 > 1416 (if you add the 28 byte packet header that would make it 1444) Remote ASA 5505 > 1418 (if you add the 28 byte packet header that would make it 1446)

So, do I just need to set my MTU values to the appropriate amounts?  I have tried changing the value, but I don't see any change in speed/performance.  But I also don't know if I need to reboot the firewalls after changing the MTU.  I know with Catalyst switches, you have to reload.  But I didn't see any messages about needing to reboot on the ASA's/PIX's.

View 10 Replies View Related

Cisco WAN :: 1941 Router Not Pass Traffic From Window 7 Computers

Jul 14, 2011

I cannot telent to 1941 router from a Window 7 PC and I can a Window XP PC. Telnet is enabled on Win 7 PC. I upgraded 1941 to latest IOS.Compters running Windows XP can telnet to router and hit the internet. Computers running Windows 7 cannot hit the internet. I replaced the 1941 with a 1760 router and Win 7 computers can telnet to router and hit the internet. I used the same config from the 1941 on the 1760.

View 5 Replies View Related

Cisco Firewall :: Allowing Multicast Traffic To Pass Through ASA5510

Mar 1, 2011

I ' m not able to configure the asa 5510 to allow the multicast traffic to pass through ASA.The multicast traffic have to pass from inside interface to outside interface.Can I configure the multicast traffic to pass through asa with a static nat ?

View 1 Replies View Related

Cisco Firewall :: 5520 To Pass Traffic Through Ssm 20 And To Create Sensors

Jun 20, 2011

I have installed asa 5520 , software ver is 8.4,I have SSM-20 installed in asa 5520. How to pass traffic through this ssm-20 ,how to create sensors,how to update signatures of this IPS module ,is there any procedure to automatically update the signatures .

View 1 Replies View Related

Cisco VPN :: ASA 5520 / VPN Phase 2 Complete But LAN Traffic Doesn't Pass

Aug 6, 2011

Just setup a site to site vpn between 2 ASA 5520 Firewalls in two locations but vpn doesn't work even though i see phase 2 completed on the logs. I can't ping across the LANs.

View 2 Replies View Related

Cisco :: 5500 - SNMP Operation To Device Failed / Sparse Table Not Supported

May 29, 2013

I am currently running WCS 7.0.230 I have controllers that are 2500 that are running 7.4.100.60?
 
My problem is that when I try to add my controller that is a Cisco 5500 running the same 7.4.100.60 I am getting the error SNMP operation to Device failed: Sparse table not supported. Verify that the WCS and WLC versions are compatible and try again.
 
I have double checked SNMP strings, IP Addressing and everything else I can think of. It just doesn't make sense that I can add a Controller with the same image but different hardware and no the other to the WCS server.

View 1 Replies View Related

Cisco Firewall :: Pass Management VLAN Traffic Through ASA 5510 In Transparent

Mar 10, 2013

We have a small cisco 1800 series workgroup router that seperates our network from the outside world.  The data coming into our network goes into the router on interface fa0/1 and comes out on interface fa0/0.  fa0/0 is split into 2 sub-interfaces (fa0/0.2 and 0/0.3).  These sub-interfaces correspond to a desktop and server vlan on our network.  The workgroup router is connected to a 3560G trunk port (we'll call it switch 1) and switch 1 connects to another 3560G (we'll call it switch 2). Recently I was asked to add another layer of security to our network by installing an ASA 5510 firewall and forcing certain types of traffic to authenticate using their domain credentials for our network.  The firewall was set up between the router and switch 1 in transparent, multi-context mode.  There are 2 security contexts, 1 for the desktop vlan and 1 for the server.  Both have the same security settings applied to them since we want the same behavior regardless of whether they are trying to access the servers or the workstations.

View 2 Replies View Related

Cisco Switching/Routing :: ASA 5520 - Can't Ping / Pass Traffic Through Interfaces

Apr 17, 2012

I've just started a CCNA course and my lack of knowledge has me a bit stuck. My network is comprised of Cisco components and I'm semi familiar with them just from reading and looking through options. I currently am using a Cisco ASA 5520 on my network and I am trying to join another network via one of the interfaces. My network is 192.168.0.0 255.255.0.0 and my inside interface is 192.168.1.1 255.255.0.0. I enabled a second interface using a static ip of 10.0.0.1 with a subnet of 255.255.255.128. Connected to that interface, I have a Fortigate firewall at 10.0.0.2 255.255.255.128. I can ping just fine from the Fortigate network to the 10.0.0.1 interface on the Cisco ASA 5520 network, but I can not ping the 10.0.0.1 interface (or anything past it) on the ASA 5520 from any computer on the Cisco network. I've read that ACL's and NAT have to be done as well as enabling traffic between interfaces with the same security levels. (both interfaces have security levels of 100 and the option is checked to allow traffic).

Note: each network has it's own internet connection. The connection is to share information on servers on both networks with each other.

View 1 Replies View Related

Cisco Firewall :: 5505 Transparent Mode Doesn't Pass Traffic

Dec 4, 2012

  asa 5505 do not pass traffic as a patch cord, how to make it pass traffic? [code]

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved