troubleshooting Question

Cisco ASA 5500 Site to Site and Remote Access VPN Configuration Issues

Avatar of zatara1
zatara1 asked on
CiscoNetworkingRouters
6 Comments1 Solution898 ViewsLast Modified:
I am having issues setting up a VPN to another companies network.  We currently have the Remote Access up and working for our clients.  This is tested as working.  I was sent a configuration list to connect site-to-site for the company we can not connect to.  I went through the VPN wizard in the GUI and it didn't work.  I then tried to manually setup the site-to-site in the CLI, but then it broke the remote access vpn and still wouldn't connect to  the remote company.

For the site-to-site VPN, the company has a server at 192.168.50.100 that we need to access.  They gave us their remote public ip address and it is pingable.  They then told us that we need to set our local network as 10.1.0.205/32,  and that we will need to NAT interesting traffic to 10.1.0.205/32.  They also said that we will need to make an IPSec ACL from 10.1.0.205/32 to remote network 192.168.50.0/24.  

In addition, they gave us the authentication information for phase1 and phase 2 as follows:
Phase1:
Authentication: Pre-Shared
Encryption: 3DES
Hash: SHA
DH: 1
Lifetime: 86400 sec

Phase2:
ESP encryption: 3DES
ESP authentication: SHA
Lifetime: 28800
PFS: Disabled

So it seems I have stumped the experts... Does this mean I get a refund?
ciscoasa# show run
: Saved
:
ASA Version 7.2(2) 
!
hostname ciscoasa
domain-name default.domain.invalid
enable password 1N13LocgBffkO053 encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address x.x.11.108 255.255.255.0 
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
<--- More --->              !
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd N7FecZuSHJlVZC2P encrypted
ftp mode passive
dns server-group DefaultDNS
 domain-name default.domain.invalid
access-list inside_nat0_outbound extended permit ip any 192.168.1.128 255.255.255.192 
access-list inside_nat0_outbound extended permit ip host 10.1.0.205 192.168.50.0 255.255.255.0 
access-list Local_LAN_Access remark Beaver VPN Client Local LAN Access
access-list Local_LAN_Access standard permit host 0.0.0.0 
access-list 1 extended permit ip 192.168.1.0 255.255.255.0 host 10.1.0.205 
access-list outside_access_in extended permit ip any any 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool VPN4CLIENTS 192.168.1.151-192.168.1.160 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any outside
asdm image disk0:/asdm-522.bin
no asdm history enable
arp timeout 14400
global (inside) 1 interface
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 208.88.11.108 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
group-policy WHVPN internal
group-policy WHVPN attributes
 dns-server value 192.168.1.2 8.8.8.8
 vpn-tunnel-protocol IPSec 
split-tunnel-policy excludespecified
 split-tunnel-network-list value Local_LAN_Access
 default-domain value CCIOWH
group-policy WHVPN-1 internal
group-policy WHVPN-1 attributes
 dns-server value 8.8.8.8 8.8.4.4
 vpn-tunnel-protocol IPSec 
group-policy WHVPN_1 internal
group-policy WHVPN_1 attributes
 dns-server value 192.168.1.2
 vpn-tunnel-protocol IPSec 
group-policy NewGrp internal
group-policy NewGrp attributes
 vpn-tunnel-protocol IPSec l2tp-ipsec 
username user1 password /paswordhash/ encrypted privilege 0
username user1 attributes
 vpn-group-policy WHVPN
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec transform-set myset esp-3des esp-sha-hmac 
crypto dynamic-map outside_dyn_map 20 set pfs 
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 288000
crypto dynamic-map outside_dyn_map 20 set reverse-route
crypto map outside_map 20 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto map inside_map interface inside
crypto isakmp enable outside
crypto isakmp policy 30
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
tunnel-group EMDs type ipsec-l2l
tunnel-group EMDs general-attributes
 default-group-policy NewGrp
tunnel-group EMDs ipsec-attributes
pre-shared-key *
tunnel-group WHVPN type ipsec-ra
tunnel-group WHVPN general-attributes
 address-pool VPN4CLIENTS
 default-group-policy WHVPN
tunnel-group WHVPN ipsec-attributes
 pre-shared-key *
tunnel-group x.x.80.108 type ipsec-l2l
tunnel-group x.x.80.108 ipsec-attributes
 pre-shared-key *
telnet 192.168.1.4 255.255.255.255 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 5
console timeout 0
dhcpd dns 192.168.1.2
dhcpd auto_config outside
!
dhcpd address 192.168.1.100-192.168.1.150 inside
dhcpd dns 192.168.1.2 interface inside
 dhcpd enable inside
!
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny 
  inspect sunrpc 
  inspect xdmcp 
inspect sip 
  inspect netbios 
  inspect tftp 
  inspect icmp 
  inspect icmp error 
!
service-policy global_policy global
prompt hostname context 
Cryptochecksum:ae3af8106ea61221c45594ffc4868f1a
: end
ASKER CERTIFIED SOLUTION
zatara22

Our community of experts have been thoroughly vetted for their expertise and industry experience.

Join our community to see this answer!
Unlock 1 Answer and 6 Comments.
Start Free Trial
Learn from the best

Network and collaborate with thousands of CTOs, CISOs, and IT Pros rooting for you and your success.

Andrew Hancock - VMware vExpert
See if this solution works for you by signing up for a 7 day free trial.
Unlock 1 Answer and 6 Comments.
Try for 7 days

”The time we save is the biggest benefit of E-E to our team. What could take multiple guys 2 hours or more each to find is accessed in around 15 minutes on Experts Exchange.

-Mike Kapnisakis, Warner Bros