Cisco VPN :: ISR1921 - Two IPSec On One Interface Not Working?
Nov 7, 2011
I'm actualy trying to bring two IPSec VPN on only one interface. I've successfully created a tunnel between Par and Barcelone and between Par and Mad. But I can't create it between Barcelone et Mad. We have a cisco ISR1921 in Mad and Barcelone, and a Netgear in Par.
How to make a Cisco 881 router finally work. I have the following configuration:
Current configuration : 2964 bytes ! ! No configuration change since last restart version 15.1 no service pad service timestamps debug datetime msec service timestamps log datetime msec
[code].....
As much as I understand, the VPN tunnel is active.I can access the Internet, but I cannot access anything through the VPN tunnel.
I am actualy trying to make a remote access VPN between a ISR1921 and Windows 7 pro. I already managed to put a PPTP VPN with an authentication against our LDAP databse via radius. But our password are in SHA1 in our LDAP, so I had to let the password unencrypted on the network using pap and this is bad.If I don't use pap, it simply doesn't work since all the other method need unencrypted password for the challenge authentication.Does that mean that every remote access VPN keep our password unencrypted ? Maybe use EAP (but I can't find a howto or good documentation about it)? Can I add a certificate or something?
I currently have an ASA 5510 setup with Dual homed ISP's and a remote access IPsec VPN setup to terminate at either interface. The first interface is named Outside and the second is simply called Outside-2. When outside the company(such as at home), the VPN client will connect on the Outside-2 interface and work normally. The problem is while testing on our DMZ, the VPN Client will not connect on the Outside-2 interface. It will try that interface fail to connect and then connect to the backup Outside interface. This isn't a huge concern because it still connects, but if we were ever to get rid of one of those connections, it would be nice to reliably test from our DMZ.
I have a network with Two 3800 Cisco Routers as Central and many Cisco 2811 Router as Branches. Now I set two Tunnel on each router connection Interface FastEthernet from each 2811 to SubInterface Fastethernet on 3800. I set OSPF as Routing Protocol and I configure QOS on Tunnel connections. Then I have a safe connection with backup connection between 3800 Router and each 2811 Router. Now I want to set VPN with IPSEC and Certification Authentication with CA Server for Security all connection. I set IPSEC and ISAKMP and Certificate on each Router and Set Dynamic VPN on Cisco 3800 Router and Static VPN on each Cisco 2811 Router. Now when if I configure tunnel with Crypto map, it works correct and all packets are encrypt. But if I try to set crypto on physical Interface(because I want to set qos on tunnel then protect packets on physical interface) however all packets are routed but crypto and encrypt d o not work. Set qos on tunnels and crypto on fastethernet interface.
I have at the moment an ASA5510 pair in Multiple Context configured. Everything is ok, but we use til now only ACL features.Now I would be interested in configuring 2 contexts, with IPSec VPNs. One VPN per context. But I cannot find any information if it would be possible to use a shared interface for both contexts. My wish would only be to spare public IPs.If I have to configure 100 VPNs in 100 contexts, do I need 100 public IPs ?
We are setting up a new VPN from an ASA to a cisco 2801 router (behind a third parties checkpoint firewall). We seem to be almost there with the setup but the tunnel is not working correctly. I have included a debug from the 2801 router and its config and a diagram of the setup. [code]
I have setup a ASA and everything but ipsec seems to be working. I was able to use the clientless ssl but I need ipsec working. I'm at a loss. config is a little sloppy and i will be cleaning it up but would like to get this working first.
Cisco Systems VPN Client Version 5.0.07.0290 Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT
I have a stable l2tp/ipsec config that I have been using for many years with the Windows XP native VPN client and the iPhone VPN client.This configuration does not seem to work with the native Windows 7 VPN client. What has changed between XP and 7 on the native VPN client front? I'm running IOS 12.4(15)T5.
i've an Cisco ASA 5510 with Security Appliance Software Version 8.0(2), in this ASA i've many L2L tunnels to this ASA, anda sometims new tunnels can't connect, the older tunnels still ok and working, yesterday this situation occured again and i've tried to clear all ipsec tunnels and try to reconnect again no one cames up again. At the time of this situation memory usage was about 78% and CPU is was around 5%. I've made a reload without changes and the situation returns to the normality.
At the time of the fail i've collect the outpu from debug crypto isakmp 255, the outpu was in the annexed file.
I configured my cisco client with the info from the vpn wizard and get the following error :
error in the cisco vpn client when enabling the log : Invalid SPI size (log) + reason 412 the remote peer is no longer responding (application) message I see via the ASDM-IDM : Built inbound UDP connection for interface WAN
I'll explain briefly what I'm trying to do here :
* Remote vpn with windows users having cisco clients * Group authentication and in the asa5510 LOCAL authentication
My WAN interface contains a public ip/29 I also defined a LAN interface with security level 100 in 10.0.60.0 255.255.252.0 range the vpn dhcp range I want to attribute to vpn users : 10.0.69.0/24
Basically I want users to initiate the vpn tunnel to the public IP and be able only to access the LAN range with the 10.0.60.0/22 range
ASA Version 8.2(5) ! hostname xxxx domain-name xxxx
I have set up a remote access ipsec vpn on an asa 5520. I can connect, and ping internal ip addresses, however I cannot ping back out to the internet, and dns resolution does not work.
We have 2 RV220W Routers installed in seperate offices. We are attempting to setup a IPSec tunnel between the two sites. So far we have been unsuccessful in getting this to work.On both sides, we are getting a successful connection established, but netiher site is recieving any packets. Both sides are transmitting packets though. We have exhausted our resources trying to figure out why.
A customer of mine has two RV082 in different locations. The "main" router is providing a gateway-to-gateway VPN tunnel, and is also used by a few road warriors for VPN access. We've had some issues with the "main" router lately, so we've decided to exchange it for a brand new device (v3). The old RV082 was a hardware revision v2 device, so I had to manually rebuild the config on the new router. The new router is working fine so far - connectivity and gateway-to-gateway VPN are fine. IPsec Client VPN, however, doesn't work at all. The config of the new router is identical to the config of the old one, IPsec Client VPN used to work fine on the old router.
The router is running the latest firmware (v4.0.4.02-tm). I've been trying to make IPsec VPN work with "QuickVPNplus ver: 1.0.6" and the "Cisco QuickVPN Client v1.4.2.1". From what I understand, both programs first connect to the routers external IP and download some sort of VPN config file. The info in that file is then used to create the actual connection. The problem is that the config file is invalid. It contains HTML code instead of config data. This is the code: "<HTML><HEAD><meta http-equiv="refresh" content="0; URL=/cgi-bin/welcome.cgi"></HEAD><BODY></BODY></HTML>". The URL is the same I see when logging in to the admin interface of the router. The Cisco client tells me in its "wget_error.txt": "rwConnStart message=All 1 wget requests did not return a valid vpnserver.conf". Both clients connect to the router fine, and the config download itself is working - only the returned data is invalid.
I've already tried lots of stuff to make the problem go away - enabling/disabling the firewall, VPN passthrough options, and other things. I'm beginning to think that there may be a bug in the firmware I'm using, or that the way Client VPN works has changed in a way that makes connecting with a client implementing the "old" method impossible. By the way, PPTP is working fine, so we're using it as a temporary workaround. My client, however, isn't happy with this workaround - he bought a relatively expensive router so he can make use of its advanced features, after all.
Problem: IPsec VPN setup seems ok (Client to gateway) but is not responding from client requests. However, remote manage works, PPTP works.
My environment:
Hardware: RV016 10/100 16-Port VPN Router Firmware: v4.2.1.02 (Jan 18 2012 14:10:55) Clients: Mac OS X 10.8 (integrated VPN client) , Windows 7 (build in VPN client) OR both with NCP-E VPN client.
None of the above works with IPsec. I have tried all kinds of combinations. I don't think the problem is wether I use Group1 or Group2 or DES or AES...It must be something else... Neither of the built-in VPN (IPsec) clients in Mac OS X or Windows can be configured in an easy way. BUT the NCP-E client can. I have tried to set it up to exactly meet the settings on the server but no progress...How do I setup an IPsec VPN group so that I can use any of my VPN clients to work?
PS. I have also tried the client that comes delivered. 1- It does not work and 2- it's only available for Windows.
I'm in process of purchasing a new Cisco routers for our branches that will be used primary to enable IPSec virtual tunnel interfce with "tunnel mode ipsec ipv4". does the default IOS IP Base supports this feature? or i need to purchase DATA license or SECURITY license?
We have a Cisco Access Control Server (TACACS+ version 5.1) with an additional 2 port NIC card. This produces 4 ports on the ACS server(G0 through G3).After initial setup of the ACS server with an IP address on G0, I connected a Windows 7server with IE8 to G0. The ACS web interface appears (after accepting certificate) and Ientered some user accounts and NDGs.I then connected the ACS server to a configured port with port-security on our 6500switch. The port becomes err-disabled since the MAC address does not match up. It appearsthat the onboard NIC on the ACS server is bonded thus producing the MAC address issue.To fix this connection issue, on the ACS server, I cleared out G0 and setup G2 (additiional NIC card) with the IP address. After connecting to the 6500 switch, the ACS server port works fine. I removed the connection to the 6500 and connected the Windows server to the ACS.I can ping the ACS server but the web interface is now unavailable unlike before. I do not get a certificate warning on IE, it just states that internet not available. On ACS, the 'show' status of acs shows all the processes are running and initialized. It has got me stumped as all I did was change NIC configurationon the ACS server.
I have a cisco asa 5010 where, during the process of configuring, the outside ports become down/down. The /0 port won't even reactivate after cycling power on the unit.Port /1 is the inside interface and it is not affected by the problems.I switched the outside port to port /3 and it worked for awhile then it stopped working. I switched it to Port /2 and the same thing.Port /2 and Port /3 are on after a power recycle but shut down completely (down/down) during the reconfiguration. It seems like a hardware failure, but I'm wondering if it could be anything else.
I have a Cisco 2821 with two serial interfaces bundled using PPP multilink. I want to monitor traffic flow (net flow) on the multilink interface. I have tried configuring ip route-cache flow/ ip flow ingress / egress but no luck.The other thing is when I do sh ip cache flow I guess I should see the multilink interface in both Source and destination columns which is not happening (not showing in destination column).The other router with same config but with ATM sub-interface working properly (same IOS). Are there any hits on this ? Also, is it possible to use SPAN feature ? The monitoring server is at some other site (coming via WAN).
I build a Config with a DMZ,INSIDE and OUTSIDE Interface. My Plan is to use the IP-Address of the OUTSIDE Interface with PORT to setup a HTTP Server In the DMZ
But my Config doesn't work. And I have no Plan why .....
The Inside Interface have to work normal. The Traffic to the Internet is TRiggert from Inside with Dynamic PAT
ciscoasa(config)# exit ciscoasa# show run : Saved : ASA Version 8.4(1)
Can Cisco 881G cellular interface (Modem Firmware Version = K2_0_7_19AP C:/WS/FW) work with r-uim cards? I can't find correct answer in documentation .
I just recently bought a new Cisco 2611 for my home lab and am having trouble getting the serial port to work. I have tried multiple things such as erase startup, switching the cables to rule them out, and even changing IP addresses but none worked. [code]
I need to configure a Cisco ASA5510.Connencted the a single interface I have a switch. To this switch (same VLAN) there are connected:
1. The Subnet of the main office (192.168.1.253)
2. A router (IP 192.168.1.254) that routes the traffic to a remote location (Subnet 192.168.8.0/24)
I have so allowed any traffic incoming to the inside interface as follows:access-list inside_access_in extended permit ip any any and I have permitted traffic intra interface as follows: same-security-traffic permit intra-interface. [code]Unfortunately I cannot RDP into that server. When I simulate the connection via Packet tracer, it tells me that the implicit deny on the bottom of the connections from "inside" (firewall) does not allow the connection. It sounds to me like that "same-security-traffic permit intra-interface" does work only if there are 2 interfaces and not a single one.Unfortunately I cannot just unplug the cable and connect it into another port as the ip is on the same subnet and I cannot configure the other end router.
We bought an RV042 at the end of June. It is used as a gateway and VPN router. DHCP server is disabled and all IPs are configured manually.Every once in a while (Tuesday night, then Friday night - yesterday, it has hapened once or twice before that) the router appears to restart (see log below) then comes back up with system time of Jan 01 2010. At this point the router will no longer load its configuration page (https://10.29.238.197:16443/) and VPN connection to our customer in Africa drops. However, devices behind the router can be reached and can access the internet. The only way to fix this is to power cycle the router at which point everything starts working flawlessly again.The PID VID is RV042 V03 running firmware v4.0.3.03-tm (May 12 2011 21:27:37). Our RV042 is a newer one with Cisco SMB Router branding not the older Linksys branding.
From the log when the router reboots:
Aug 12 22:38:42 2011VPN Log(g2gips0) #141: retransmitting in response to duplicate packet; already STATE_QUICK_I2Jan 1 01:00:05 2010System Logheart : System is upJan 1 01:00:13 2010System LogWAN connection is up : 10.29.238.197/255.255.255.192 gw 10.29.238.225 on eth1Jan 1 01:00:15 2010VPN Log(g2gips0) #1: [Tunnel Negotiation Info] >>> Initiator Send Main Mode 1st packet
I looked at the log more and all the usual messages assosciated with VPN being established are there - the last thing in the log before the router coming back up again is:
Jan 1 01:03:49 2010VPN Log(g2gips0) #4: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel ConnectedJan 1 01:03:49 2010VPN Log(g2gips0) #4: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel ConnectedJan 1 01:03:49 2010VPN Log(g2gips0) #4: sent QI2, IPsec SA established {ESP=>0x575a01c0 <0x6534ae4e
So it even claims the tunnel should be up but I can never reach anything on the far side.
I have an ASA 5510 attached to 2 internal networks. Everything is working except communications between the 2 internal interfaces.I can ping the FW from either interface and I can ping hosts on both networks from the CLI but can't get any traffic to pass.I'd like to open the connection to all traffic. [code]
I have been trying to create a Guest WLan on my 4402 WLC system and have found several confilcting documents explaining the procedure. During this process I have notices that although the current corp wireless works, there was never a virtual interface created for it. Instead it uses the same Wlan/Vlan as the ap manager and managemnt interfaces. Could this by why I cant seem to get the Guest access working? or is this not a problem after all since the wireless does work.
I installed two AIR-AP1142N-E-K9 access points, running a fairly simple config, WPA2 PSK, with AES cipher, both the same SSID.The two access points are connected to Cisco 2960G switches, which are in turn connected to each other, again without any fancy config options, no VLAN's ed.
After a random while, varying from 30 minutes to 15 hours, the access points will stop sending/recieving traffic on the ethernet interface.The units don't stop at the same moment, this also varies seemingly random. It's not related to load or the amount of clients (1 to 15).Only turning on one unit doesn't make any difference.
The units keep sending out their SSID, you can associate to them, but the DHCP requests aren't passed on to the DHCP server which is connected to one of the 2960G's.If you wirelessly connect to the AP and set a manual IP adress you can reach the webinterface and telnet/ssh to the access point. The ethernet link is reported as being up on the access point. Also the switch reports a link on the port to which the access point is connected.Resetting the link does have no effect. The log doesn't mention any errors or warnings.Power cycling or reloading the access point will put it back in working order for a varying amount of time.
! ! Last configuration change at 14:41:40 +0100 Sat May 12 2012 by admin ! NVRAM config last updated at 14:41:40 +0100 Sat May 12 2012 by admin ! version 12.4 no service pad service timestamps debug datetime msec service timestamps log datetime msec
We have several pairs of ASA5510s in failover A/P mode, some running 8.3(2) and others running 8.4(1).
e0/0 = outside e0/1 = inside m0/0 = management
The problem we're having is we can't get anything to route out of the management interface unless we put in a static route at least to the subnet level. For example, we want syslog traffic to exit out m0/0 to our syslog server 10.71.211.79. Our 'gateway of last resort' points to the next hop out e0/0, and a second static route with a higher metric and a more distinct network space is for m0/0 as in:
This doesn't work, and ASDM loggin gives this error: ".....Routing failed to locate next hop for udp from NP Identity Ifc:10.72.232.89/514 to management:10.72.211.79/514"
If I put in a more granular subnet route, or a host route of the syslog server it works, such as:
route management 10.72.211.0 255.255.255.0 10.72.232.94 10 <------------- this works
route management 10.72.211.79 255.255.255.255 10.72.232.94 10 <------------- this works too
Why won't a static route for 10.71.0.0 255.255.0.0 work in this case?
We are going to have numerous hosts access and be sent messages though the management interface of these ASAs, and it would be very burdonsome to have to add a host, or even a subnet, route for every one. I've removed all static routes and tried to rely on EIGRP, but that doesn't work. I also had to put 'passive-interface management' under the EIGRP for this to work.
Here is the pertinant ASA config concerning syslog, routing, and interfaces:
So I have 2 routers (cisco 3640) that each go to their own ISP and then back to the same switch. I have setup ospf and glbp, and now have pretty good redundancy. If either internet connection or routers go down everything is still golden.
So I was thinking that if an interface went down then the router would not be load balanced with glbp which got me thinking whats the best way to get interface redundancy (and I was going to add a 2nd switch with the second interface).
1) Setup BVI on the 2 interfaces. 2) Setup a 2nd interfaces (on each router), I would have to split the subnet, for instance: [code]then the machines could be on the subnet 192.168.0. 0/23 and setup glbp for 1 ip across all 4 interfaces (I'm not even sure if you can do this but think it would work). 3) Is there a way to utilize etherchannel or anything like this
A negative to option 2 would be that if 1 of the interfaces went down, all the sudden 2/3 (or so) of your traffic would be going through 1 router.
After I have upgraded our ASA 5510 to 8.4.2 I have problem with the management interface.Our former firmware 8.2.3 had no problem using the management interface as a DMZ zone, but after we upgraded to 8.4.2 we can't make it work.The interface and the protocol is up, when I type: show interface.But when I ping the interface from a computer connectet to the interface, nothing happens. Even the logging shows nothing.