we are trying to establish VPN tunnel between ASA5550 and RV042. The tunnel is connected but I cannot access any resources that are behind ASA5550. I can ping the servers but that is about it.
I have VPN Gateway to Gateway VPN tunnels set from my central office to four remote sites. The tunnels have always been problematic. Started out with five Linksys RV042 v2 devices these had problems with handshake, sometimes would disconnect during this process and had to click disconnect button on either device and this wouold force the tunnel to rebuild. Recently upgrade central device to a Cisco RV042 v3 device. Good news is that this seems to have corrected the handshake issue but now each of the remote sites are having problems during periods of inactivity losing tunnel. The staff at the remote site indicate that they have to close out application and restart router to rebuild the tunnel.
All tunnels are Gateway to Gateway static IP addresses. They all will connect and behave as expected until they reach a certian period of inactivity. I have searched all over Cisco, Linksys, and Google have seen problems similar but no consistant or logical solutions so I thought since I am slowly upgrading my network from my initial equipment which was truely purchased based on cost alone to adding more Cisco equipment. However since this is among the first of my upgrade moves and the improved equipment is creating more problems than my older less expensive equipment I needed a solution to the problem before submitting additional PO's to upgrade switches and firewall products.
I have a two RV042 VPN Router, I successfully connected the IPSEC tunnel. I cannot route Traffic in the tunnel. See the diagram.
MAIN Network 10.252.x.x --------------> FIREWALL a.a.a.1 INTERNET RV042a WANa <<------------------------------->> WANb RV042b a.a.a.2 b.b.b.b
In this manner the network of b.b.b.b wil connect to the Main Network 10.252.x.x, unfortunately I can't pass traffic to RV042b going to RV042a. Everytime I trace the route, the traffic goes outside the Internet not to RV042a.
I don't know if this is in the right section, but I cannot set up a vpn tunnel between an asa 5510 and a cisco rv042 router. I believe the problem is because i need to set up a nat exempt rule on the rv042 route but don't know how.
office 1 : rv042 hw3 ISP:Obtain an IP automatically
office 2 : rv042 hw3 ISP:PPPoE
VPN tunnel between both rv042, everything's fine but when i try to ssh from office 2 to an office 1's server, my connection drops.
When it drops, i can still ping pc in office 1, this is really strange!if i change the office 2 ISP to another provider (obtain an IP automatically) everything's ok !
i try to use another PPPoE ISP for office 2 and it's doing the same thing!I've also tried other rv042 in both locations with the same setup and it's doing the same thing, so it's not a router issue.
i've tried older firmware and it's doing the same thing, so it's not a firmware issue!
I have configured a VPN tunnel between two remote locations using static IP addresses on two RV042 routers. The tunnel seems to work but the problem is that when the two hosts attempt to ping each other only one can successfully ping. One PC with IP address 192.168.1.100 can ping across the network but the second PC with IP address 192.168.2.100 cannot. These are laptops seperate from the intranet used to test the tunnel. Someone had suggested NAT may be the issue so I enabled NAT Transverse on the routers but still no luck. The following is the results from a ping test.
PC 1 ping 192.168.2.1
Pinging 192.168.2.1 with 32 bytes of data: Reply from 192.168.2.1: bytes=32 time=116ms TTL=63 [Code] ......
We have 4 RV 042 routers and cisco router at HQ, we have Site to Site VPN tunnels in between, All branch offices are connected to HQ via S2S VPN tunnels
now lets say i am branch 1, i can access 10.10.1.0/24 network but cant access 10.10.5.0/24 network, means i dont have branch to branch connection, it should be through HQ, means my RV042 at brnach should fwd all traffic to HQ for another branches also. Under VPN tunnel if i try to configure remote destination 10.10.0.0/21 its not allowing me it says network overlaping with local network, how i can sole it, I know how to do in cisco, we can permit those networks in access lists.
I was hoping that the latest firmware would fix my (2) 'bugs', but it did not. We are using the RV042s at our remote medical clinics as an end-point VPN router to our Nortel 1700 VPN router, replacing our old Nortel Contivity 100s.When I try and do a reset when connected remotely via the WAN interface, the RV042 hangs and will only reset by re-powering.
I have a client that needs to establish a IPsec tunnel to a large organization. They will not forward any traffic to an IP using private reserved IPs. However I am not finding another way to accomplish this. I tried ipsec to the router and using a second IP to a 1:1 Nat but it will not pass the traffic and would seem really insecure from the public internet. 1:1 Nat does work from the public internet but not over the tunnel.I have an RV042 a /29 block of IPs. I am at a loss of how I can accomplish what they want without allowing a private IP.
I have an RV042 VPN tunnel with an RV082.The RV042 has a public IP Address obtained by PPPoE, the RV082 has a public IP Address obtained via Static IP.The problem I see is a really slow performance. Both internet conections are idle and the performance is about 2 or 3 kbyte/s My question are if I should I enable any of this:
- Agresive mode - NAT Traversal - IP Compresion - Dead Pear Detection
I have a remote location that has a Linksys/Cisco RV042 router [URL] that allows PPTP connections based on username and password combinations. There are no intermediary routers between this device and the internet - only a DSL modem. A secondary WAN connection is not present.
I am able to dial into this VPN using the Windows XP and Windows 7 dialers from any of my local free-wifi locations(e.g. Starbucks). I WAS able to connect to this VPN connection from my house when my home router was a Buffalo brand router.
I have replaced the Buffalo router with a 2620(non-XM) that is connected in ROaS fashion to a 2950 switch. I need some guidance on what in my config is not allowing me to connect to this remote site.
Home network info: Local subnets : 192.168.x.x
Remote network info: Local subnet : 10.214.x.x
The Windows XP dialer client indicates that the username and password challenge is where the connection fails. It ultimately gives me the error code 619. I have performed a Wireshark packet capture of an attempt to connect from ip 192.168.10.11. This packet capture shows multiple "Configuration Request" packets being exchanged between the two endpoints, but does not ever show an exchange of authentication.
My nat translation table shows an entry for both a GRE tunnel as well as port 1723 between 192.168.10.11 and the WAN port of the RV042 when attempting to establish this VPN.
I have attached my 2620 configuration for your review.
i have 2 rv042 with a vpn tunnel between them.the problem is that i can't access https over the VPN !if i telnet 192.168.10.1 443 through the VPN, it's not working either. if i telnet 192.168.10.1 443 in my 192.168.10.0 network it's working so it's reall the VPN tunnel the problem.
1. first location RV042 is the gateway attached to ADSL modem
2. second location RV042 is behind BT home hub gateway - for now the BTHH DMZ is enabled to the RV042
Followed the user manual config for two dynamic IP but it seems that the RV042 behind the BTHH obviously has a different IP than the resolved IP and is causing problems with connection.
This from the log file: Jan 14 15:04:16 2011 VPN Log Received Vendor ID payload Type = [Dead Peer Detection] Jan 14 15:04:16 2011 VPN Log [Tunnel Negotiation Info] <<< Responder Received Aggressive Mode 1st packet Jan 14 15:04:16 2011 VPN Log Aggressive mode peer ID is ID_IPV4_ADDR: '192.168.95.139' Jan 14 15:04:16 2011 VPN Log No suitable connection for peer '192.168.95.139', Please check Phase 1 ID value Jan 14 15:04:16 2011 VPN Log initial Aggressive Mode packet claiming to be from 81.156.xxx.xx on 81.156.xxx.xx
But no connection has been authorized,check peer ID Is there some way of making the RV042 behind the BTHH properly identifiable to the other end?
Im able to create a gateway tunnel with two rv042 routers in different locations ( i can see the tunnel connected in the router) but the quick vpn utility is not working , i also tried to use the pptp as server as an alternative( im able to connect using windows connection to the pptp server but whenever I browse any of the four ip's allowed for the pptp server \10.0.0.200-204 it takes me to the documents of the local computer....I attached the configuration for one of the routers it is the same as the other end , just the information is flipped.
I've inherited an ASA5550 which is missing its SSM-4GE-INC - it was taken out to upgrade a 5540, which is now in production elsewhere in the enterprise. Trouble is, now the 5550 will not boot, it gets stuck after a panic message, and reboots:
Panic: Init Thread - Module SSM-4GE-INC is not present. Rebooting...
I'm taking this as the unit cannot function without this module installed?
I have a ASA5550 setup with two boxes in HA.I have purchased AnyConnect Essentials for 5000 users for both boxes.The box runs 8.4.2.I tried on one box to enter new activation key and rebooted the box. Still the output of show version is the same !? [code] If I re-enter the key it says same as running key.I then tried downgrade to 8.2.5, same same show version output.
I are currently implementing a new patching schedule (when I say new i mean a company first!!!) and I have identified that the firewalls are all running 8.2(2). I would like to bring these up to the latest version but am a little worried about impact!!! I have setup a test firewall with the config from our live asa's and run the upgrade but have received multiple lines.
If my ISP brings ethernet into the building via duplex LC multimode fiber can I use the ASA5550 as the first device from the WAN or do I need some type of router for this? I realize I'll need an SFP to get to duplex LC, but I'm not sure if I need a router, or if the ASA can function as a router for this application.
What are the benefits of consolidation the VPN client users to the ASA 5550? My client currently has the old VPN 3000 series concentrator. Other than it's EOL and EOS, are there any other reasons I can give them?
I am trying to set up an ASA5550 so that I can access the servers behind it. Simple.
As of now, I am unable to even create an access-list to allow traffic from my remote IP into the firewall. As far as my level of experience with Cisco firewalls, it's basically zero but I have taken the Cisco CCNAX class and feel that I have a good understanding of the fundamentals. That said, we only dealt with routers and switches, and it's not impossible that I'm missing something that would be totally obvious to most folks on this board. I've used CLI and ASDM with no success.
I have been getting overrun errors on 3 different ASA 5550 HA pairs with traffic rates less than 100Mbps total. I was told by one TAC guy to split the traffic between the two slots so that traffic comes in one and exits the other to maximize throughput because the 5550 was designed to work that way. Another TAC guy told me to enable ethernet flow control to alleviate the overrun errors because the traffic was bursty, but this doesn't seem to address the root cause of the problem to either. TCP traffic is bursty by nature and has it own flow control mechanism. I can't seem to find any detailed info on why traffic needs to be split for 100Mbps when the marketting throughput number is 1.2G. Is this a design flaw or limitation? Is there a way to alleviate overrun errors?
I need to block 4000 nodes (Ultrasurf, TOR exit nodes) and I've written a script that will ssh and copy in these objects (prob 100 at a time) into an object group and then put a blanket deny. I don't see a flood of traffic (occassional hits every other day, etc) but I was wondering what the impact would be? Can the ASA handle an object group of that size plus an ACL with it? Any way to block incoming connections from TOR/Ultrasurf?
I want to run two syslogs, one to Loglogic for compliance and the other to Solarwinds for network administration. Currently the firewall is setup for just the one syslog device. If I add an additional device ie further IP in the config for the Loglogic box will there be any noticeable differences in the performance of the firewall, does affect the cpu utilisation, or memory in any way.
Is it possible to establish PBR rules that set the ip next-hop to point directly to the inside interface of the ASA5550?Or, do I need to direct this PBR traffic first to a directly connected router interface and then default route to the ASA?At a high level, here's what we have:
ISP 1 - with /21 IP PrefixNo BGP Routing3845 Edge Router - Default Route to ISP 1PIX535 Firewalls (HA) - Default Route to Edge RouterLAN Core/Distribution - Default Route to PIX535 Inside InterfaceAll applications/services use this egress path for PAT/NAT/DMZ/VPN/Etc.
Here's what we are adding:
ISP 2 - with /24 IP PrefixNo BGP Routing3925E Edge Router - Default Route to ISP 2ASA5550 Firewalls (HA) - Default Route to Edge RouterSame connectivity to LAN Core/Distribution
Goals:Maintain ISP 1 for nowMigrate only end user Internet traffic to ISP 2No disruptions to applications/services using current DefGW to PIX535
Question: how to best use PBR to selectively direct traffic to the ASA inside interface?
How to schedule automatic Xlate sessions cleaning in ASA5550. I want to clear few global nat sessions manually every week.Is there any way to automate that?
We have currently install single ASA 5550 and want to install one more ASA for active standby mode, but cisco discontinue or End of sale ASA 5550. can any one guide me ASA 5555X is compatible with ASA5550 on active standby mode or not.
I have the latest ASDM 7.1(2) & ASA5550 9.0(2). When I try to start Remote Access VPN Wizard, it's just nothing to select in Wizards-VPN Wizards, except "Site-toSite VPN Wizard..."
I currently have a Cisco ACS 3415 appliance with 5.4. Coming from the ACS 4.2 world, I'm have a bit of a struggle creating the following and I was hoping if I could be shown clear steps I can duplicate the rest.
I want to creat a group ie: AIRTEMP with access time from 7:00am to 5:00pm and add 2 users to the group.
Users access our site using a vpn client connecting to a ASA5550. The ASA and the ACS already communicate with each other.
The ACS 5.4 user guide has me bouncing all over different page.