Link to home
Start Free TrialLog in
Avatar of daxa78
daxa78

asked on

Site to Site VPN problem

Hello guys and girls.

Happy christmas to you all.

Here is the case.

I have this client that has a Site to site VPN connections betweeen two remote sites.
Using two Cisco ASA 5505
 

This has been working great but now site A got a new ISP and a new IP.

I modified the site B to and set the Peer to the correct IP
but it still did not work.

I also tried to change the preshared password (yes on both ends)

I assumed this would be an easy switch.

Any ideas?

I could set them up from scratch again im sure that would work but
its not very educational. A bit like formatting your HD when you get spyware og viruses.
 

How do i troubleshoot these connections?


PS im unable to post the config since im not in the office.
I cant seem to get it out of my mind.
Avatar of rdmlda
rdmlda

Did you remember to create a new tunnel group with the correct new IP address on the 5505 that didn't change IP?
Avatar of daxa78

ASKER

Ok so i have to modify both boxes?
yes you have
And you need to clear the translation table and reset the crypto maps.  (or just reboot).
any thing in the log ?
can you post the configs?
Avatar of daxa78

ASKER

What do i need to change in the router a that has the new IP? Except setting the fw up so that its online again? I assumed i only had to change the peer ip on router B.

Avatar of daxa78

ASKER

Here are the running configs that i have. It is ASA A that has gotten a new IP.

Here are some info from the log

4      Dec 27 2009      07:59:17      713903  IP = 215.145.177.74, Header invalid, missing SA payload! (next payload = 4)
5      Dec 27 2009      07:59:19      713904 IP = 215.145.177.74, Received encrypted packet with no matching SA, dropping
4      Dec 27 2009      07:59:29      713903      Group = 215.145.177.74, IP = 215.145.177.74, Can't find a valid tunnel group, aborting...!
ASA-A.txt
ASA-B.txt
Typo in your ASA-A access lists. :) You have 84.* instead of 85.*
 
Avatar of daxa78

ASKER

Nevemind that its just a poor attempt at hiding IP addresses.
did you reboot after the change?  (both ASAs?)
Avatar of daxa78

ASKER

yes
ASKER CERTIFIED SOLUTION
Avatar of rdmlda
rdmlda

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of daxa78

ASKER

Cool how do i change that ?

I cant use the no command to remove it?  I thought that was only a naming thing and did not refer to an ip address.
clear config tunnel-group 62.101.223.50
As RPPreacher said in order to eliminate that you need to enter the clear config command, and after that you just need to enter the correct one, remember that you need to have the same Pre Shared Key on both devices.

Regards,
Avatar of daxa78

ASKER

I have done that now but im still unable to connect. I have not made any changes to asa A.

I still dont know what i need to change there. I have changed the Preshared key on both locations and i have restarted the boxes.
Once you enter the new tunnel-group you need to shut down the crypto map and reenable the crypto map or reboot (which achieves the same thing).
The PSK is key sensitive, so you need to take that into consideration, you can enable debugs to see what is the problem,

   debug crypto isakmp 155
   debug crypto ipsec 155

This can give us a clue of what is going on, this will trow a lot of information if you can post everything it would be great.

Regards,
Avatar of daxa78

ASKER

Debug ipsec does not display anything but i get this from isakmp.

                          Dec 28 05:47:24 [IKEv1]: IP = 213.145.177.74, IKE_DECODE RECEI                                                                                            VED Message (msgid=89f1aa33) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE                                                                                             (0) total length : 84
Dec 28 05:47:24 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, proc                                                                                            essing hash payload
Dec 28 05:47:24 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, proc                                                                                            essing notify payload
Dec 28 05:47:24 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Rece                                                                                            ived keep-alive of type DPD R-U-THERE (seq number 0x7725f067)
Dec 28 05:47:24 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Send                                                                                            ing keep-alive of type DPD R-U-THERE-ACK (seq number 0x7725f067)
Dec 28 05:47:24 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, cons                                                                                            tructing blank hash payload
Dec 28 05:47:24 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, cons                                                                                            tructing qm hash payload
Dec 28 05:47:24 [IKEv1]: IP = 213.145.177.74, IKE_DECODE SENDING Message (msgid=                                                                                            675132fa) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length :                                                                                             84
Dec 28 05:47:34 [IKEv1]: IP = 213.145.177.74, IKE_DECODE RECEIVED Message (msgid=29a9f23f) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:47:34 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing hash payload
Dec 28 05:47:34 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing notify payload
Dec 28 05:47:34 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Received keep-alive of type DPD R-U-THERE (seq number 0x7725f068)
Dec 28 05:47:34 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x7725f068)
Dec 28 05:47:34 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing blank hash payload
Dec 28 05:47:34 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing qm hash payload
Dec 28 05:47:34 [IKEv1]: IP = 213.145.177.74, IKE_DECODE SENDING Message (msgid=4567d72b) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:47:48 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Sending keep-alive of type DPD R-U-THERE (seq number 0x206d52a2)
Dec 28 05:47:48 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing blank hash payload
Dec 28 05:47:48 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing qm hash payload
Dec 28 05:47:48 [IKEv1]: IP = 213.145.177.74, IKE_DECODE SENDING Message (msgid=6a867e72) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:47:48 [IKEv1]: IP = 213.145.177.74, IKE_DECODE RECEIVED Message (msgid=10bc2df7) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:47:48 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing hash payload
Dec 28 05:47:48 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing notify payload
Dec 28 05:47:48 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x206d52a2)
Dec 28 05:47:58 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Sending keep-alive of type DPD R-U-THERE (seq number 0x206d52a3)
Dec 28 05:47:58 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing blank hash payload
Dec 28 05:47:58 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing qm hash payload
Dec 28 05:47:58 [IKEv1]: IP = 213.145.177.74, IKE_DECODE SENDING Message (msgid=1a736217) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:47:58 [IKEv1]: IP = 213.145.177.74, IKE_DECODE RECEIVED Message (msgid=145261c9) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:47:58 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing hash payload
Dec 28 05:47:58 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing notify payload
Dec 28 05:47:58 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x206d52a3)
Dec 28 05:48:08 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Sending keep-alive of type DPD R-U-THERE (seq number 0x206d52a4)
Dec 28 05:48:08 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing blank hash payload
Dec 28 05:48:08 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, constructing qm hash payload
Dec 28 05:48:08 [IKEv1]: IP = 213.145.177.74, IKE_DECODE SENDING Message (msgid=41b2dfa3) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:48:08 [IKEv1]: IP = 213.145.177.74, IKE_DECODE RECEIVED Message (msgid=80017ea8) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Dec 28 05:48:08 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing hash payload
Dec 28 05:48:08 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, processing notify payload
Dec 28 05:48:08 [IKEv1 DEBUG]: Group = 213.145.177.74, IP = 213.145.177.74, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x206d52a4)

All I see in the debugs are keepalives coming and going, this tell us that the VPN tunnel is up, if you do a "sh crypto isakmp sa" you should see that the tunnel has been created.

Avatar of daxa78

ASKER

ciscoasa(config)# sh crypto isakmp sa

   Active SA: 1
    Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1

1   IKE Peer: 213.145.177.74
    Type    : L2L             Role    : responder
    Rekey   : no              State   : MM_ACTIVE

According to this the tunnel should be up and running right?

But im still unable to ping any host on the inside...
Correct the VPN is up, do a "sh crypto ipsec sa" to see the SA's and if the traffic is reaching the peer device.

Regards,
Avatar of daxa78

ASKER

Yes thats nice but it does not help me much since im not able to ping any hosts :-)

Here is the output

    Crypto map tag: outside_map, seq num: 1, local addr: 84.205.45.74

      access-list outside_1_cryptomap permit ip 192.168.1.0 255.255.255.0 10.10.1.0 255.255.255.0
      local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
      remote ident (addr/mask/prot/port): (10.10.1.0/255.255.255.0/0/0)
      current_peer: 213.145.177.74

      #pkts encaps: 8640, #pkts encrypt: 8640, #pkts digest: 8640
      #pkts decaps: 9565, #pkts decrypt: 9565, #pkts verify: 9565
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 8640, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
      #send errors: 0, #recv errors: 0

      local crypto endpt.: 84.205.45.74, remote crypto endpt.: 213.145.177.74

      path mtu 1500, ipsec overhead 58, media mtu 1500
      current outbound spi: 8D2860FD

    inbound esp sas:
      spi: 0xFD31AF72 (4247891826)
         transform: esp-3des esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, PFS Group 2, }
         slot: 0, conn_id: 8192, crypto-map: outside_map
         sa timing: remaining key lifetime (kB/sec): (3824291/17925)
         IV size: 8 bytes
         replay detection support: Y
    outbound esp sas:
      spi: 0x8D2860FD (2368233725)
         transform: esp-3des esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, PFS Group 2, }
         slot: 0, conn_id: 8192, crypto-map: outside_map
         sa timing: remaining key lifetime (kB/sec): (3824862/17925)
         IV size: 8 bytes
         replay detection support: Y
From where are you pinging? because according the information you posted the traffic is flowing across the VPN.

      #pkts encaps: 8640, #pkts encrypt: 8640, #pkts digest: 8640
      #pkts decaps: 9565, #pkts decrypt: 9565, #pkts verify: 9565

Encaps is outgoing traffic, and decaps is incoming traffic, make sure you are trying to ping from a computer within this range 192.168.1.0/24 to a computer within this range 10.10.1.0/24.

 If you are trying to ping from the ASA you need to make sure that the management is on the correct interface and you are sourcing the ping from the correct interface as well.

Regards,
Avatar of daxa78

ASKER

Im trying to ping a server on the 192.168.1.0 network it has the IP of 192.168.1.2.

Im trying from the 10.10.1.0 network.

Avatar of daxa78

ASKER

PS Not trying from ASA trying from computer on the 10.10.1.0 network.
Have you try to map the drive or something else besides ICMP?
Avatar of daxa78

ASKER

This is what i needed