Cisco VPN :: Cannot Access Remote LAN On EZVPN With DVTI 1841
Mar 18, 2011
configured Ezvpn Server/client with client mode configuration on IOS router with ver advipservicesk9-mz.124-15.T3.bin of ISR 1841 routers. Only my main issue is that once the tunnel is up I cant access the server side local LAN. However I could each site my icmp traffic is encrypt or decrypt but not both at the same time. However I can ping from the server to the client ip address which is assigned by the pool (int loopback10000)
Also once the tunnel is up I could also see there's static route towards the client side via virtual-access interface and also static route on client side. I have already configure SPLIT ACL on server side allowing the required network access.Attached is the configuration of both server and client with all required show output.
We have a VPN using 857 and 877 routers as remote connecting in to a 2800 EZVPN Server.
The VPN is working fine. However, the VPN connections sometimes (after a few hours/days) seem to "freeze". A "show crypt sess" shows the connections as Up/Active, but you can not ping antyhing from remote to server, or visa versa, nor does any traffic flow. I then added a "isakmp keep-alive" on the 2800, which improved the situation a bit, but not as much as I hoped.
On the 877 I then implemented a IP SLA, with Object Tracking and then use a Event Manager to just issue a "clear crypto session" . This solved the problem.
However, what do I do on the 857 ? It does not support Object Tracking or the Event Manager. Is there any other mechanism to monitor and reset these frozen/stale VPN connections automatically ?
Attached you find both configuration of the EzVPN server and remote. The tunnel is getting up and if I ping from the ASA to the Router, I see the packets getting encrypted:
ezvpn-asa# ping 172.16.100.1 ... ezvpn-asa# show crypto ipsec sa interface: outside Crypto map tag: _vpnc_cm, seq num: 10, local addr: 172.16.100.2
[code]....
If I connect a client with IP address 192.168.1.2 to the interface eth0/1 and do a ping to the cme, I don't see any packets getting encrypted. I don't have any idea about VPN, I just need it for a wireless lab environment. What do I have to configure on the ASA, so the inside traffic is encrypted?
I am attempting to get a solid setup for a remote office we have going up and I am running into little issues that I cant seem to get around.
Basically, we have a remote office that will have dual ISPs, one hard wired circuit from a local carrier and the other will be a Verizon 4G router that plugs in via Ethernet and hands out DHCP to my Cisco router.The Cisco router is a 2911 with IP SLA configured. I have it setup to ping my DC out one interface and if that fails, it removes the default route and injects a new default route from the other ISP,
The problem I am having is with the VPN. I figured using EZVPN would be the only solution because the Verizon 4G only supports DHCP so I have to be able to connect from a dynamic remote host. The other caveat is that failover needs to be seamless as we have no person onsite that can troubleshoot. Its fine if it takes a few minutes, but the VPN just needs to come back up on its own without any intervention.
I attempted to setup two different EZVPN crypto maps on the router but realized you can only have one inside cryptomap per interface, which would cause a problem with the internal network. I thought I could just create subinterfaces off the router to have two inside interfaces to work with but that wouldnt have supported because they would now be on different subnets.
I decided that adding an ASA5505 behind the router may be the simplest solution. Use the router only for the purpose of handling routing between the two ISPs and performing NAT out the interfaces. Then use the ASA to do EZVPN from. This works well but there are some issues I am trying to work through.
First, when the ISP fails over to the backup, the NAT translations have to timeout before things start working again. For a constant ping, this is fine, I have the timers set down to 15 seconds for NAT timeouts and after 15 seconds the ping picks right back up again. However, this breaks the EZVPN. The ASA keeps trying to bring up the ISAKMP nearly every second, which keeps resetting the countdown on the NAT timeout for the remote EZVPN server. Because of this, the VPN will never come up until I manually clear the NAT translations on the router. So my first question is this; is there a way to adjust the timer that the VPN uses to try to bring the tunnel up? I tried the crypto isakmp keepalive command but that didnt work, it looks like it doesnt work with EZVPN.
The second issue is really with the IP SLA and is only an issue because of the first issue I mentioned. When the router first comes up after a reboot, both the primary and secondary interfaces come up. However, since the primary default route is only injected into the routing table once IP SLA is up and can reach its destination, the secondary route gets injected initially and the VPN comes up over the secondary ISP. In a few seconds, the primary default route is injected, changes the path and because of the NAT translation, breaks the tunnel and never comes up again because of the first issue with the VPN tunnel renewing the NAT translation continuously.
I could easily go out and purchase a $100 Linksys router that will do the failover and clear its NATs and everything, but I need better reliability out of the hardware than that. There has got to be a way to do this on a Cisco device since consumer level equipment can.
I have setup a remote access on our 1841 device, with split tunnel.
now i am able to connect via the vpn tunnel, and even ping and telnet into the cisco device, but when i try to ping any device past the 1841, the ping fails and no traffic is even been encrypted to go over the vpn traffic (looking at the vpn client statistics).
From the ciscos side, pings to the vpn client is failing, yet i see the vpn client in the routing table.
Here is my config:
cisco1841#sh run Building configuration... Current configuration : 7682 bytes!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecservice password-encryption!hostname cisco1841!boot-start-markerboot-end-marker!logging buffered 51200
I am trying to set up Remote access vpn in 1841 router. The vPN client is connecting to router, but cannot ping to remote LAN Here is the config.
Current configuration : 3625 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption
[code]....
I am not getting any hit on the deny statement of 102 when i try pinging to client ip address (10.0.0.10).
I can ping across the tunnel from the pc's on either end of the tunnel, but I can't ping across the tunnel from the routers. If i ping using the source command using the LAN interface, the ping is successfull.
The reason i need this is for the remote router to be able to lookup the head office server for dns wins and ldap.
VPN 1841, and static nat. I have to create VPN to connect to remote network, but problem is that they already use same subnet as mine. How to configure static nat on cisco 1841 so static nat will work and address will be translated in different IP when connection trough VPN.
I have address 192.168.235.1 and I want to translate to 192.168.100.1?This 1841 is border router, and all VLNAs and VLANs routing is on 3650.
I have an GRE Tunnel across my head office and remote site with multiple subnets using cisco 1841 routers.I can ping most of the devices on the remote side, but I can not ping certain devices.These devices respond to ping requests on the local LAN, but not through the WAN link. If I change the IP of device than it start responding. I am using same gateway and mask on these devices.The remote site is running classic STP on switches with distribution switch being the root bridge.
I am just setting up a simple scenario with a 1841. Server @ 172.31.1.1 cannot ping 172.31.0.254 or 172.31.0.105. It can ping 172.31.1.250. The router can, on the other hand, ping devices on both networks. This is just for testing routing theory so I don't know why hosts on either side of the network cannot ping each other.
I am only using the FastEthernet interfaces on Router 1841.
I have an 1841 that I set up to do site to site VPN between my company's network and an external network. This has a backup connection point. All works well including automatically failing over to the backup site.
We also want to be able to VPN remotely to our company's network using the same 1841.I have tried many different ways to configure this, but the best I had resulted in an external VPN request taking down the site-to-site link.
Is this possible? Our internet connection is through an ADSL router set up with pasthrough, then into the Cisco 1841 which does the dialer PPPOE authentication.
I'm trying to configure a router 7606S with SPA-IPSEC-2G for EzVPN.I was reading some examples in SPa and 7606 documentation but with the current configuration in our router I don't know how to do it.
The router has the SPA installed in slot 3, interfaces G3/0/0 and G3/0/1. The router has the interface G2/0/0 connected to our provider, and we have the interfaces connected directly to network; ie: not vlans, no trunks, ports configured as IP ports conected directly to network.Where can I find an EzVPN example configuration ?
I'm having trouble configuring with EZVPN on ASA5510. EZVPN uses the local LAN as the source IP, now since the EZVPN is configured on the ASA, it will use its local port 2.2.2.1 as the source local LAN. The actual local network is behind a firewall and i need the tunnel to extend to the 10.10.10.10 network. Is there a way to extend the tunnel to use the 10.10.10.10 as the source LAN? How to do it via the GUI?
I am having an issue get an EZVPN working between a 2811 server and a SR520 client. The symptoms are the SR520 makes multiple connection attempts to the 2811. It appears that sometimes these connections are successful and the SR520 is assigned an IP address but then the tunnel will be dropped and a new session will be started. I've attached scrubed configs for both the 2811 and the SR520. One other note, when connecting to the 2811 with a software VPN client, there are no problems, so I think the problem is with the SR520. On the other hand, the SR520 wasn't having any problems until we switched our VPN server from a UC520 to the 2811.
I have a 3825 configured as an EZVPN server with 881 routers as clients. One issue I am seeing is that sessions don't seem to time out, such as when a peer's public IP changes. Show crypto ISAKMP peer shows the same host (using device certificates for authentication) with multiple public IPs establishing sessions. I have ISAKMP keepalives configured on the router.
Our company has a handful of sites that use the EasyVPN technology.On my remote router (Cisco1841) - I add the crypto inside to the FA0/0 and the Loopback0 interface.On the other end my Cisco ASA 5580 - 8.41 code - I have RRI enabled and the tunnel comes up fine.However I only see the static route from the fa0/0 interface on the remote router. I can not figure why I can not see the Loopback0 address?Wondering if this is a limitation or feature not enabled.
I added multiple interfaces on the Cisco 1800 and can see the networks.I run "show crypto ipsec sa" on the Cisco ASA and see the spi encaps/decaps for the loopback, but the SH ROUTE does not show the static route being injected.
I have lots of 857's routers in the field with mostly the latest OS - 12.4(15)T17 making ezVPN connections to a 2951 with 15.1(4)M5.All the 857's have lookback and vlan interfaces similar to :
interface Loopback0 ip address 50.43.8.1 255.255.255.255 ip tcp adjust-mss 1452 end
[code]....
Now lately for some or other reason we have instances where I can ping either the VLAN or the LOOPBACK interface, but not both. Or I have instances where the 2951 can ping all the interfaces on the 857, but the 857 can not ping the 2951. Or I have instances where the 2951 can not ping the 857, but the 857 can ping the 2951.The way I have been fixing this is either to add crypto ipsec client ezvpn SMS_VPN inside to the loopback interface, or if it is there already to remove it. This usually works for a few days, but then suddenly I have to reverse this again. If that does not work then I usually do lots of clear crypt sess and/or clear crypt ipsec client ezvpn on the 857, or clear crypt sess remote 857_ip_address from the 2951 and then suddenly it starts working again.
configured 2 EzVPN groups using a 2811 router, i am trying to do this but is not working i have another VPN working thru EzVPN but if i try to configure another group for another EzVPN client is not working and the problem is that the debug crypto isakmp say that Apr 3 08:45:25.802: ISAKMP:(1309): phase 2 SA policy not acceptable!
How is that possible? in my understand the EzVPN server will inject the the IKE (phase 1) and IPSec (Phase 2) parameters for the client and that's they dont need to negotiate nothing, is important to say that the EzVPN client is an ASA5505 with onlu DES encryption enabled, 3DES and AES are not available due to licensing reasons.
I have new DIA Internet service coming in and unlike the last vendor who provided a router, I am configuring my own. This is my first full Cisco config - I've been looking at this for 3 days now. I have SIP signalling, rtp and default traffic on a (3) t1 multilink (4.5mb). My lan and firewall uses dscp tags and passes them to the 1841 for outbound. The ISP only prioritizes by destination address so I just need the 1841 to respect the tags internally. Inbound, I have only port numbers to go by to differentiate voice traffic and I want to tag EF and CS3 accordingly for use by the 1841 and the rest of my network.
Below is part of my proposed config. I have read tons of Cisco docs and looked at all the queuing methods and this one I understand the best. I am getting the error: "CBWFQ : Can be enabled as an output feature only", so I presume that something is wrong on an input definition somewhere. For now all the firewall functions are done at the actual firewall (Sonicwall NSA) so other than limiting ports to the PBX everything else is just pass-through. Any changes required. IOS is 12.4(4)T1.
I'm trying to advertise the branch LAN subnets via OSPF back to our core.I can create the OSPF adjacency and the ASA is learning routes fine. However it does not appear to be pushing the branch LAN subnets to the connected router. show ospf database reveals they're not in the OSPF database.Here is my routing config, the branches are 10.114.0.0 /16.As an aside, why I need the statics below, they appear to be necessary to reach my LAN subnets behind the EZVPN spoke sites. I would have thought the ASA would learn it automatically as I'm running network-extension mode on the spokes. [code]
I've got some ASA5505 which run as EzVPN clients in NEM, connecting to a ASA5510 as head-end. The ASAs are configured with a CSM and AUS. But whenever they are getting a new configuration through the AUS they stop trying to establish an EzVPN connection to the head-end. After a "reload" they run with the new configuration and establish the tunnel as expected.
I have setup DMVPN and EAZYVPN on one router. Tunnel interface on Spoke one and Spoke two are up/up and show crypto ISakmp sa shows both tunnels are in idle. However, tunnel to Spoke one(10.10.1.1) keep bouncing on and off(see below). Every 30 sec or so, the tunnel gone back to IKE phase while tunnel for spoke two(5.5.5.1) still leave active. THe configuration on the HUB side is the same for both spoke!! show crypto ipsec sec shows both side has the same life time(IOS default). Could that be an IOS debug on the spoke one?
I have ezVPN configured on an ASA 5520 for my server with 5505s as my clients at several remote sites. The tunnels come up no problem and I can hit everything I need to on both sides of the tunnel, but I'm not able to get to another remote network from a remote network. The traffic goes out the tunnel on the 5505 but on the 5520 all I see is a bunch of scrolling tear down messages.
I have problem auto connect Easy VPN client to Easy VPN server using saved X auth username/password. The ez vpn client is a Cisco 2691 using IOS 12.4.15T7. The config is as follows:
crypto ipsec client ezvpn EZ connect auto [code]....
the router keeps prompting me to manually enter username/password. connectivity will work be established after i manually enter the username/password. But this is not what i desired. I need it to connect automatically.
The Ez vpn server is a 7200 running 12.4.22T. Config as follows: aaa new-model aaa authentication login USERAUTHEN local aaa authorization network GROUPAUTHOR local [code].....
I have the following problem on configuring ezvpn for the following situation: 3 different locations - 1 HQ with 2901 server and 2 offices with 861 clients. Clients connects to HQ, I do traffic between HQ and offices but I cannot ping between offices (ping from 192.168.1.0/24 to 192.168.2.0/24 and vice versa.
The configs: aaa new-model ! ! aaa authentication login default local aaa authentication login vpn_xauth_1 local [Code]....
Im currently connected to a remote acess vpn setup using the vpn client and am unable to get anywhere around my network, this normalyl works fine The only difference i can see is that the are multiple virtualaccess interfaces pointing to my public ip address, which im presuming is causing routing issues How can i clear these unsed virtual access lines and how can i make it forget them automatically after disconnects?
We have an ASA5510 and a few days ago we were unable to access some segments from remote access VPN, the problem was not the config. A few hours later the problem was resolved on its own and I suspect we have an IOS bug. This has happened a few times in the past and its becoming an issue. How can this be confirmed and which IOS should we upgrade to? Prefer not 8.3 given the syntax difference
I was able to configure the cisco to accept VPN connections from clients. But when i am connected i can not access the VPN LAN. My cisco VPN client shows all the time Packet Decrypted: 0 when connected. I tried the split tunneling configuration based on the example on cisco.com for split tunneling.
I include config for better understanding. The outside interface is fa0/1 with ip 10.0.0.2 w LAN 10.0.0.0 Inside interface fa0/0 with ip 192.168.10.9 w LAN is 192.168.10.0
I have a branch office connected to the Head Office through a VPN Tunnel in cisco 1841 Router. If i enable Internet for any pc in Branch Office through cisco router i cannot access it remotely from Head Office. [code]
I have a 1841 router with two wan access from two different ISP:throught dialer with fixed ip obtained from dhcp - ATM interface,thought fastethernet 0/1 with fixed ip and a specific gateway - can be use for Internet traffic if dialer is down.I can't manage to make them accessible at the same time (ping and ssh).In a second time I would like to have a VPN client access on one wan and site to site VPN on the other, instead of having the two on one wan.