We help IT Professionals succeed at work.

How to debug ipsec on Cisco ASA?

5,595 Views
Last Modified: 2012-05-08
I have a problem related to ipsec on a Cisco ASA 5520. Briefly told the problem is when the remote site is initiating traffic againt my site. Traffic initiated from my site is working perfect. When the remote site is initiating traffic sometimes it works and somestimes it is not working. When it is NOT working the log shows the output that I have included in the attached file. So my question is: How can I set up logging on the ASA so that I can see exactly WAHT is causing the problem? The attached file is the result from logging with debug level, but how to see the exact cause of the failure? How to see what proposals the remote gateway is suggesting and so on...?

The really strange thing is that it sometimes work, sometimes not. Any ideas?
asa.txt
Comment
Watch Question

Istvan KalmarHead of IT Security Division
CERTIFIED EXPERT
Top Expert 2010

Commented:
HI, the following debug option do you have:

debug crypto isa
debug crypto ips
Istvan KalmarHead of IT Security Division
CERTIFIED EXPERT
Top Expert 2010

Commented:
Please refer this guide about debugging:

http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a00800949c5.shtml

Could you show us the configs?
Istvan KalmarHead of IT Security Division
CERTIFIED EXPERT
Top Expert 2010

Commented:
Error Message    %FWSM-7-713222: Static Crypto Map check, map = crypto_map_tag, seq =
seq_number, ACL does not match proxy IDs src:source_address dst:dest_address

Explanation    This message indicates that while iterating through the configured crypto maps, the security appliance could not match any of the associated ACLs. This generally means that an ACL was misconfigured.

Recommended Action    Check the ACLs associated with this tunnel peer and make sure they specify the appropriate private networks from both sides of the VPN tunnel.

Author

Commented:
Hi and thanks for you ansers. It seems that it iterates through all maps and finally finds a successfull match (seq=3), I think this is normal operation of the ASA? So probably it is not the ACLs that cause the failure?

I cannot understand why the config sometimes work and sometimes not.

2009-11-01 15:15:52      Local4.Debug      158.36.61.9      Nov 01 2009 15:15:53: %ASA-7-713221: Group = 195.204.82.130, IP = 195.204.82.130, Static Crypto Map check, checking map = outside_map, seq = 1...
2009-11-01 15:15:52      Local4.Debug      158.36.61.9      Nov 01 2009 15:15:53: %ASA-7-713222: Group = 195.204.82.130, IP = 195.204.82.130, Static Crypto Map check, map = outside_map, seq = 1, ACL does not match proxy IDs src:skogdata-10.1.131.0 dst:Osalle-158.36.61.0
2009-11-01 15:15:52      Local4.Debug      158.36.61.9      Nov 01 2009 15:15:53: %ASA-7-713221: Group = 195.204.82.130, IP = 195.204.82.130, Static Crypto Map check, checking map = outside_map, seq = 2...
2009-11-01 15:15:52      Local4.Debug      158.36.61.9      Nov 01 2009 15:15:53: %ASA-7-713222: Group = 195.204.82.130, IP = 195.204.82.130, Static Crypto Map check, map = outside_map, seq = 2, ACL does not match proxy IDs src:skogdata-10.1.131.0 dst:Osalle-158.36.61.0
2009-11-01 15:15:52      Local4.Debug      158.36.61.9      Nov 01 2009 15:15:53: %ASA-7-713221: Group = 195.204.82.130, IP = 195.204.82.130, Static Crypto Map check, checking map = outside_map, seq = 3...
2009-11-01 15:15:52      Local4.Debug      158.36.61.9      Nov 01 2009 15:15:53: %ASA-7-713225: Group = 195.204.82.130, IP = 195.204.82.130, Static Crypto Map check, map outside_map, seq = 3 is a successful match
Istvan KalmarHead of IT Security Division
CERTIFIED EXPERT
Top Expert 2010

Commented:
Please use mirrored ACL on booth side:

for example:
SITE a
ip access-list extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0

SITE b
ip access-list extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0

Author

Commented:
I have mirrored ACLs on both sides for all the tunnels. I have a feeling that this may be related to the NAT-rules. I have configured the ASA by using ASDM,  but in the CLI I see 2 NAT-rules:
* nat (inside) 0 access-list inside_nat0_outbound
* nat (inside) 0 0.0.0.0 0.0.0.0

The accesslist "access-list inside_nat0_outbound" contains all traffic from my internal networks to the remote networks for all the tunnels. I think that  nat (inside) 0 0.0.0.0 0.0.0.0 should be enough so I can delete the statement  "nat (inside) 0 access-list inside_nat0_outbound" ?

I have official addresses so I do not have to NAT the internal addresses. Therefore I think the first NAT-rule is not necessary?
Head of IT Security Division
CERTIFIED EXPERT
Top Expert 2010
Commented:
This one is on us!
(Get your first solution completely free - no credit card required)
UNLOCK SOLUTION

Author

Commented:
I think I will follow up the NAT-ideas, thank you for your help.

Author

Commented:
want to test som ideas from the case.
Istvan KalmarHead of IT Security Division
CERTIFIED EXPERT
Top Expert 2010

Commented:
Your welcome!

Best regards,
Istvan

Gain unlimited access to on-demand training courses with an Experts Exchange subscription.

Get Access
Why Experts Exchange?

Experts Exchange always has the answer, or at the least points me in the correct direction! It is like having another employee that is extremely experienced.

Jim Murphy
Programmer at Smart IT Solutions

When asked, what has been your best career decision?

Deciding to stick with EE.

Mohamed Asif
Technical Department Head

Being involved with EE helped me to grow personally and professionally.

Carl Webster
CTP, Sr Infrastructure Consultant
Empower Your Career
Did You Know?

We've partnered with two important charities to provide clean water and computer science education to those who need it most. READ MORE

Ask ANY Question

Connect with Certified Experts to gain insight and support on specific technology challenges including:

  • Troubleshooting
  • Research
  • Professional Opinions
Unlock the solution to this question.
Join our community and discover your potential

Experts Exchange is the only place where you can interact directly with leading experts in the technology field. Become a member today and access the collective knowledge of thousands of technology experts.

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.