Cisco VPN :: VPN Tunnel Between ASA 5520 And Juniper Tears Down Intermittently

Feb 13, 2013

VPN tunnel between ASA 5520 ver 8.0(4) and a remote Juniper firewall keep tearing down during Phase 1 rekeying.  After the rekeying process fails, manually pinging one of the remote hosts that are proteced behind the Juniper firewall,initates the tunnel renegoation and rebuilds the tunnel successfully.
 
When the tunnel is down,  sh crypto isakmp sa shows no active SA for the remote peer.  That indicates the PHASE 1 negotation had indeed failed.When the tunnel is working, sh crypto isakmp sa indicates an IKE role of Responder - always.Clearly that also means Phase 1 negotation works only one way, i.e. negotation initated by the remote Juniper unit only.
  
Interestingly, the Syslog server logged the following SNMP trap messages at the time rekeying Phase1.Note, Line#2 and #7 and wrapped to the next line for easy of reading.
  
Line#1:   IP = Remote-Peer-IP-#, Starting phase 1 rekey
Line#2:   IP = Remote-Peer-IP-#, IKE Initiator: Rekeying Phase 1, Intf outside,
IKE Peer Remote-Peer-IP-# local Proxy Address N/A, remote Proxy Address N/A,  Crypto map (N/A)
Line#3:   IP = Remote-Peer-IP-#, constructing ISAKMP SA payload

[code]...
 
As I understand from the above syslog trap, the Responder ( the ASA unit this time) started Phase 1 rekey (Line #1).  It prepare a message to be sent to IKE Initiator, that it is about to start rekeying Phase 1 (Line #2). Down on the next line, it indicated that the local Proxy, remote Proxy and Crypto map as N/A ( not avaiable).Why would the ASA unit send N/A message as shown in Line#2, is that normal?

View 3 Replies


ADVERTISEMENT

Cisco VPN :: 3825 And 878 With Juniper SRX3600 Shows Tunnel Down

Apr 16, 2013

We have VTI tunnels between Cisco (3825 and 878) and Juniper (SRX3600).Sometimes tunnel is going down and I should manualy shutdown and no shutdown tunnel interface to bring it up.This is logs from Cisco:%%crypto-4-recvd_pkt_inv_spi: decaps: rec'd ipsec packet has invalid spi for destaddr=X.Y.100.200, prot=50, spi=0xc5d07a33(3318774323), srcaddr=X.Y.100.100 ,%%crypto-4-ikmp_no_sa: ike message from X.Y.100.100 has no sa and is not an initialization offer.

View 3 Replies View Related

Cisco VPN :: Setup Tunnel On 1721 Router To Juniper Srx 240?

Mar 27, 2011

Is it possible to set up a vpn tunnel on a 1721 router that uses the following ios:
 
c1700-y7-mz.124-13b.bin
  
I thought I had read somewhere that tunnels were not supported on the 1700s but wanted to make sure. If they are I would like to know if they are supported in the above ios.

View 2 Replies View Related

Cisco VPN :: 5510 IPSec Tunnel With Juniper Netscreens

Apr 25, 2011

I'm having an issue bringing a L2L tunnels up between my ASA 5510 and an ISPs Netscreens. I can establish the tunnels from my side by initiating traffic to the far end. The tunnels come up and stay up as long as there is traffic. Once the tunnels drop, they will not re-establish with inbound traffic. The only way to re-establish the tunnel is to send traffic outbound from our network. My ASAs are on ASA Version 7.0(8) in active/standby. [code]

View 2 Replies View Related

Cisco :: Setup A Juniper VPN Into ASA 5520

Jan 25, 2012

I have a ASA 5520 with a functional IPSEC VPN using the Cisco VPN client. This allows my remote users (Staff) using laptops to come in from anywhere on the Internet and tunnel in. Works great.Next, we need to stand up a VPN over a Juniper SSG5 so that when we have groups working outside of our network, they can tunnel back into our network. If they were going to be coming from a known, fixed IP, or even netblock, we'd probably use Route-based setup from a Juniper SSG5 into the ASA 5520. But they may very well be coming from any IP. I am thinking this leads us to Site-to-Site VPNs- it won't be Network Client access obviously, nor will it be Clientless (browser-based).

View 9 Replies View Related

Cisco VPN :: Setting Up LAN To LAN Between ASA 5520 And Juniper Device

May 16, 2011

i am setting up a LAN to LAN VPN between Cisco ASA 5520 and Juniper device. its my first time i am setting this up. What will be the peer device of my device that i need to give to the other person.. is this the outside address of my device ?
 
Also with the setup i have made i am getting the follwong error msg:
 
IKE Peer: 81.45.22.222    Type    : L2L             Role    : responder     Rekey   : no              State   : MM_WAIT_MSG5
 
also i was getting Type: user intead of l2l - what does htis mean as well

View 8 Replies View Related

Cisco VPN :: Srp527 VPN Tunnel Dropping Packets Intermittently

Dec 12, 2012

We have a Cisco ASA and recently purchased a cisco small business srp527 router.  It is connected to our ADSL2 connection and is working fine.  I have configured the device with an ipsec tunnel using an ike profile and the tunnel is created successfully with packets traversing the tunnel.  However packets are being dropped intermittently, with no cause.  The link is currently not being utilised, there is no load on the network however when I ping Google and any address subject to the rules of the tunnel i notice that a single packet is dropped every now and then.

View 0 Replies View Related

Cisco Firewall :: Connection Failing Intermittently - ASA 5520 Version 8.3 (1)

Oct 19, 2011

I have a server in a DMZ behind the ASA, connections to this server work sometimes and then fail others, so I dont think i'm looking at an ACL or NAT problem here.The syslogs report a SYN Timeout,I have taken a trace on the ASA, it seems that a SYN-ACK does come from the destination server within the 30sec timeout, but its not passed through the ASA back to the source ?  there is one odd thing, what seems to be an out of sequence ACK from the destination which arrives before the SYN-ACK at the ASA, i'm wondering if this might be the problem ? This only occurs on the connections which fail, the connections that work, the destination responds quickly to the initial SYN, and the 3way handshake completes.
 
Syslogs :
 
Oct 18 19:17:32 nzlsudfedsi001-pri Oct 18 2011 19:17:32 NZLSUDFEDSI001 : %ASA-6-302013: Built outbound TCP connection 42327212 for IIP-ARCHIVE-PROD:172.24.32.31/21 (172.24.32.31/21) to BPO-TRANSIT:x.x.x.x/59392 (x.x.x.x/59392)
 Oct 18 19:18:02 nzlsudfedsi001-pri Oct 18 2011 19:18:02 NZLSUDFEDSI001 : %ASA-6-302014: Teardown TCP connection 42327212 for IIP-ARCHIVE-PROD:172.24.32.31/21 to BPO-TRANSIT:x.x.x.x/59392 duration 0:00:30 bytes 0 SYN Timeout

[code].....

View 2 Replies View Related

Cisco VPN :: VTI Tunnel Using ASA 5520

Mar 4, 2013

Can i use at one site  ASA 5520 and another site Router to configure VTI tunnel with OSPF routing?

View 1 Replies View Related

Cisco VPN :: ASA 5520 How To Assure About Having IKEv2 Tunnel Instead Of SSL

Mar 18, 2012

I've ASA 5520 with 8.4(3) running.I want to set up VPN remote access using following document url...I managed to get a connection running, but when I check the connection on the ASA, it shows as a SSL-tunnel, not an IKEv2 tunnel.How can I assure I have an IKEv2 tunnel instead of a SSL tunnel ?Can I do with annyconnect same kind of connections I used to do with the Cisco VPN client for IPSEC?

View 4 Replies View Related

Cisco Firewall :: ASA 5520 VPN Tunnel Up But Not Traffic

Nov 1, 2012

We just migrated from a single 5510 to a dual (failover)  5520, It seems that everything is working except the remote VPN. We can establish a tunnel and authenticate as local users, (going to LDAP when all is working) but no traffic is passing. I know I am overlooking something but cant see it. [code]

View 12 Replies View Related

Cisco VPN :: Establish Tunnel From Client To ASA 5520

Oct 2, 2012

I have remote branches that connect to the corporate office as a site-to-site VPN. Now the clients at the branch are getting an application that is using an unsecured port (tcp/23). I would like to use a set of ASA 5520's that I have at the corporate office, with the AnyConnect license on them. I want the client machines to establish a tunnel from the client to one of these ASA's. The ASA' then would have a connection to the VLAN that the receiving server is housed on. The trick is to just establish the tunnel from the client to the ASA that will allow the IP of the client to not be translated. So I would use the ASA as a security 'pass-through' for the clients that use this new application.

View 1 Replies View Related

Cisco VPN :: ASA 5520 - Tunnel Up But Can't Access LAN For Each Side

Nov 1, 2012

i have configured site to site VPN between asa 5520.

Site A (192.168.56.0/24)------ASA5520------Internet--------- ASA5520-------Site B ( 192.168.255.0/24)
 
VPN tunnel is up but i cant access LAN for each side. config Site A 

host name CCASA 
name 192.168.255.0 CCNetwork
dns-guard interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 41.41.38.156 255.255.255.248
[code]...

View 5 Replies View Related

Cisco VPN :: 5520 - Tunnel Up But Not Passing Traffic

Jan 15, 2012

I have a site to site tunnel between two 5520 ASAs.  Tunnel is up but when I try to talk to the other side, the implicit deny on the inside interface of the local ASA blocks the traffic.  When I ping, the tunnel comes up but in the logs it says it is blocking icmp from inside to outside.  I have tried the sys opt connection permit-vpn but it is not working.  The traffic is from 5 specific machines within the local sub net that I put in a network object group called Celerra_Replication.

I want to them to be able to talk to 5 machines on the far end of the tunnel in a seperate sub net.  They are in a net wrok object group called GP_Celerra_Replication The ACLs I created for this appear to be created correctly allowing IP from Celerra_replication to GP_Celerra_Replication and the opposite on the other side. 

View 1 Replies View Related

Cisco WAN :: 871 / 5520 - L2L IPSec Tunnel Between Two Routers

Apr 4, 2011

Here is the situation: A CISCO871 router is configured to establish an IP SEC tunnel with a CISCO ASA5520. The configuration is OK about that. I wish to configure the same CISCO871 in order to establish a LAN-to-LAN IP sec Tunnel with another CISCO871 at the same time in order to reach private network. So, I have followed the Cisco procedure Document ID: 71462 "LAN-to-LAN IP sec Tunnel Between Two Routers Configuration Example"; it works, I can reach the peer private network BUT ONLY when the IP SEC tunnel with ASA is not established.
 
It seems to be a routing problem...I don't find how to configure to make both tunnels up and functional at the same time.

View 1 Replies View Related

Cisco VPN :: ASA 5520 - Monitor / Trace VPN To VPN Tunnel Traffic?

Sep 7, 2011

I have a two ASA 5520's  and I want to be able to see or monitor the traffic between each tunnel. I am using external addresses but for the sake of this question I will use the following: 1.1.1.1  to 2.2.2.2 .   How can I montior the traffic? 

View 3 Replies View Related

Cisco VPN :: Crypto ACL Asa 5520 Direct All Traffic To Go Over Vpn Tunnel

Feb 14, 2013

we have a L2L-VPN-Tunnel beetween our Headquarter (ASA5520 with Network 10.100.1.0) and a branch office (Cisco1841 with network 10.100.10.0 ). This works fine for years, but now we wish to change the configuration so that ALL traffic from the branch office goes over the vpn-tunnel. My question: How I have to change the crypto acl to reach this. Below the relevant parts of the branch route.

View 6 Replies View Related

Cisco Firewall :: ASA 5520 8.3 VPN Tunnel Drops Traffic

Aug 23, 2011

We have a 100 Mbps WAN circuit, we have configured an IPsec tunnel between ASA 5520 and Cisco 3845 Router for our DR site replication via Veeam Backup and Replication, it was working fine before, when we established the 3DES tunnel the traffic for certain subnets is dropped after an hour and it stops the replication, although tunnel remains up and we can access the other subnets, as soon as we clear the crypto SA and ISAKMP sessions on the firewall the traffic starts flowing again and then after an hour the traffic is dropped again.So far the testing and differnet configurations we tried are as under.
 
Tried with a different MTU size both on firewall and ESXi servers but nothing happened.Their is no QOS configuration.Checked the utilization on both ends its Noram although their are subsequent 100% spikes on Cisco 3845 but on average it remians at 30-40%.

View 6 Replies View Related

Cisco VPN :: ASA 5520 8.4(3) Tunnel Default Gateway And Various Subnets

Apr 9, 2012

I am struggling on a problem for over 2 weeks despite of various researches.
 
We have a Cisco router, then an ASA 5520 8.4(3).
The private interface of the ASA is connected to a switch, and so on connected to one interface of the router.
The private interface is as following : 129.88.63.253 255.255.248.0 (/21) =>
It is in the 129.88.56.0/21 subnet
 
Here is the part of the router config we are interested in  :
!
interface Vlan32
ip address 129.88.63.254 255.255.248.0 (this is the tunnel default gateway configured on the ASA - 129.88.56.0/21 subnet)
ip address 129.88.71.254 255.255.255.0 secondary
ip address 129.88.75.254 255.255.252.0 secondary
ip access-group CVPN-depuis-129.88.56 in
ip access-group CVPN-vers-129.88.56 out
ip verify unicast source reachable-via rx allow-default
no ip redirects
mls rp ip
!
 
On the ASA, there is currently one default route for the tunneled traffic :
route Private 0.0.0.0 0.0.0.0 129.88.63.254 tunneled
As you can see, it's on the same subnet as the primary IP address of interface Vlan32 on the router.
 
The scenario is as following :
- we can connect to the VPN with the appropriate alias (LDAP connection), then we get an IP address in the defined range (it's a local ASA pool)
- the pool is : 129.88.71.0/24
- but, once we are connected, we can't do anything, because it seems like we don't have any network access

View 9 Replies View Related

Cisco VPN :: 5520 Feature That Allow To Have Backup VPN Tunnel On At Secondary ISP

Oct 8, 2011

My question is very simple is there any way or feature that could allow us to have a backup VPN tunnel on at the secondary ISP at the asa 5520? Lets assume if the primary isp goes down is there any way for  the VPN tunnel come online at the backup isp ? [code]

View 2 Replies View Related

Cisco Firewall :: 5520 - VPN Tunnel Not Working Properly?

Jan 11, 2012

I am getting the below  messages in my cisco asa 5520, during this time tunnel is down. just what to check whether the problem is at remote FW or with asa

[code]...

View 4 Replies View Related

Cisco Firewall :: 5520 - Remote Access VPN Through A Tunnel?

Oct 17, 2011

I have a site to site VPN between SiteA to SiteB which is working fine. SiteA has an ASA5520 and SiteB Pix501. The ASA5520 is running version 804 with split tunneling. Users connect to SiteA using remote access VPN. Is it possible to setup SiteA ASA5520 so that when users connect to SiteA they can access servers located on SiteB through the tunnel? I know i can setup the Pix501 for remote access VPN but it is located in another country and i don't want to take a chance just incase i lose connectivity.

View 7 Replies View Related

Cisco Firewall :: 5520 - SSH Socks Tunnel Set Up On Server

Jul 18, 2012

I have the following setup 
|| Socks Server || >> Switch1 >> ||Cisco 5520 ASA || -->> | Switch 2| -->> Clients
 
I have a SSH SOCKS tunnel set up on the socks server which is a Linux box. When I connect my machine to the switch 2, I am NOT able to receive and mail by setting up a mail client and it seems SOCKS traffic does not reach the socks server. I can however run a telnet command on port 1080 (socks port) which connects  which shows that the port was going through and open. However there was no SOCKS traffic. When I connected the machine to Switch 1, SOCKS traffic worked as expected and I was able to receive mail.

This suggests to me that the ASA has some inherent rule that does not allow SOCKS traffic. IS this true and if so how can I bypass this?

View 4 Replies View Related

Cisco VPN :: 5520 - Monitoring IPSec Tunnel Bandwidth Utilization

Sep 8, 2011

We have a Cisco ASA 5520 supporting multiple VPNs - both remote-access  and Lan-to-Lan.  We would like to monitor the bandwidth utilization of the IPSec Lan-to-Lan tunnels.

View 3 Replies View Related

Cisco VPN :: Monitor Tunnel That Has End Devices ASA 5520 And NetScreen Firewall?

Dec 27, 2011

Monitor a VPN tunnel that has as end devices a Cisco ASA 5520 and a NetScreen Firewall. I'll like to be receive an alert when the VPN is down.

View 1 Replies View Related

Cisco Firewall :: ASA 5520 - IPSec Tunnel Without Private Network

Apr 11, 2013

I'm trying to achieve a site-to-site ipsec tunnel to a Cisco ASA 5520.  Most examples feature the ASA with a public interface that terminates the tuennel and a private network on another interface that the tunnel interacts with.  Where my scenario differs is that the interface that accepts the tunnel is part of a public /29 network where I want the remaining hosts on that subnet to be able to route thrugh to the other end of the tunnel.  My tunnel gets established, but any attempts to route via the IP assigned to that one interface result in the ASA rejecting traffic. If so, what configuration options should I consider?

View 5 Replies View Related

Cisco VPN :: 5520 / 5505 - Split Tunnel On Easy Client

Mar 16, 2013

Is it possible with ASAVPNSERVER 5520 and an EasyVPN 5505 Client to have the client do split tunnel to a single public IP address?  Both devices are on 8.2(5) 33.  Could you possible provide sample config for split tunnel?

View 1 Replies View Related

Cisco Firewall :: Command To Check IPSEC Tunnel On ASA 5520?

Jan 7, 2013

Need to check how many tunnels IPSEC are running over ASA 5520.Tried commands which we use on Routers no luck?

View 6 Replies View Related

Cisco VPN :: 5520 / 5505 - VPN Tunnel Ping Branch Side But Not Other Way Around

Nov 2, 2012

I have HQ side with ASA 5520 (8.4) & Branch Side with ASA 5505 Design

VPN LAN<------->ASA5520(8.4)----->Thomson Business TG628s----->Internet<--->ADSL Modem------>ASA5505(8.2)
 
Now on both modems UDP 500 & TCP/UDP 4500 ports are enabled I can ping from internal LAN of HQ to internal LAN of branch but I cant ping from internal LAN of branch to internal LAN of HQ

HQ ASA 5520 Side
ASA Version 8.4(3)
host name aljoaib-fw01
[ code].... 
Branch side ASA 5505
ASA Version 8.2(5)
host name GTC- DMM- FIREWALL
domain-name ALJOAIB.COM
enable password 7pgp93AEPfHtDc5N encrypted
[Code]....
 
Both sides have static ip address.

View 22 Replies View Related

Cisco VPN :: ASA 5520 - IPSEC Tunnel / Error When Ping Protected Network

Nov 2, 2009

On my ASA5520 I am trying to do a IPSEC tunnel between two sites. When I ping the protected network on the other side I get this when debugging IPSEC:
 
IPSEC(crypto_map_check): crypt o map man map 20 does not hole match for ACL man1
 
Not too sure what this means...

View 11 Replies View Related

Cisco VPN :: Establish Site To Site IPSec Tunnel Between ASA 5520 And 3030?

Feb 17, 2013

We have configured a site to site tunnel from our ASA to another organizations Cisco 3030.  It appears to have just one way initiation.  We can do a ping to a device on the remote site and it will ping just fine.  however, when the tunnel needs to be initiated from the remote site, it will not work until we have initiated the tunnel and then everything works.
 
I continue to see Error processing payload: Payload ID: 1 errors on the ASDM logs.It appears that all the configuration is in place because we can in fact establish the IPSec tunnel unidirectional.  And once established, traffic can flow bidirectional.

View 1 Replies View Related

Cisco VPN :: ASA 5520 / Define Specific IKE Proposal For Specific L2L Tunnel?

May 24, 2011

ASA 5520 running 8.0.4
ASDM v.6.1
 
Need assistance understanding how in ASDM/Configuration/Site-to-Site VPN/Connection Profiles/ "Any Entry" I can specify that I only want to offer an IKE Proposal of pre-share-aes-256-sha?
 
The IKE Proposal field has a number of possible options including: pre-share-aes-256-md5, pre-share-3des-md5, pre-share-aes-256-sha, pre-share-aes-192-sha, pre-share-3des-md5, pre-share-aes-sha and pre-share-3des-sha.
 
I am able to pick a specific IPSec Proposal w/o issue but when I attempt to do the same for the IKE Proposal, and click OK the choice does not "stick" but rather returns to the entire list as defined above.

View 2 Replies View Related

Cisco VPN :: 5520 And 5505 Site-To-Site Tunnel Between Two ASA

Apr 2, 2013

I am using the Site to Site Wizard on an ASA 5520 and ASA 5505 from the ADSM. Both are using 8.4(5). When you create the configurations. Do you have to follow up the wizard configurations with manual ACL's to allow for traffic from each connected subnet to talk to each other? Or are they automatically generated in the configuration file? Have not been to school yet to properly understand how to create the VPN tunnels from the CLI and what to look for.

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved