Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2698
  • Last Modified:

No IKE (ISAKMP) Message Exchange Between Huawei Eudemon 200 and Cisco ASA 5520

The requirement to secure the traffic is to establish L2L (Site-to-Site) IPSec VPN between Huawei Eudemon 200 and Cisco ASA 5520. Both outside interfaces of these 2 firewalls are reachable and the configuration is done on both ends with the mirrored ACLs on the firewalls. I turn on the debug on both firewalls but there is no any negotiation message for phase 1 between them, neither on Huawei Eudemon 200 nor on Cisco ASA 5522.

Debugging commands On Huawei Eudemon 200:
info-center enable
debugging ike all
terminal debugging
terminal monitor


Debugging commands On Cisco ASA 5520:
debug crypto isakmp 127

I am wonder what are the main reasons behind the fact that there is any single phase I negotiation message exchanged between both firewalls. I appreciate your suggestions to have these 2 firewalls negotiate successfully for Phase I. Why I cannot see any message related to Phase I negotiation between Huawei firewall and Cisco ASA?

Note: I have tried to reset/clear SA but there is no hope to see the negotiation message among them neither from Eudemon 200 nor from Cisco ASA 5520.
0
tballah
Asked:
tballah
  • 2
1 Solution
 
jmeggersSr. Network and Security EngineerCommented:
Can you post configs?  My guess is there's a mismatch in the default ISAKMP parameters, such as the DH group.
0
 
gavvingCommented:
Have you attempted to create interesting traffic which would trigger the tunnels to come up?  On the Cisco ASA it will not bring the tunnel up until it sees traffic that requires the tunnel.  

Assuming that the inside interface of the ASA is in the netblock you've got configured in the VPN ACL you should be able to do this by doing:

management-access inside
ping inside 10.x.x.x

Where 10.x.x.x is an IP number on the other side of the tunnel.  If you've got the crypto map applied correctly then you should see some debug output.

0
 
tballahAuthor Commented:
@jmeggers: DH group 2 is used
@gavving: I tried to trigger the traffic to let the tunnel up. What I observed is that there is no hit on my ACL.

I'm sorry for being late to respond as I check my email and access to EE not quite often. Please refer to the attachment for the configuration on Eudemon 200. Do you still need to see also configuration from Cisco ASA 5520? If so I will need to ask the guy in charge to share me his configuration. I do debugging on ISAKMP but there is any message complaining about any error related to Phase I negotiation. The traffic that I simulate is from Trust to Trust. From Eudemon 200 it can reach 10.30.105.20 normally.
IPSec-Erbil20100809.TXT
0
 
tballahAuthor Commented:
The problem is resolved, and the tunnel can be up after simulating ICMP traffic. The correct configuration on outgoing interface should look like to disable fast-forwarding on both incoming and outgoing interface:

interface Ethernet0/0/1
 ip address 10.30.30.12 255.255.255.224
 undo ip fast-forwarding qff
 undo ip fast-forwarding output
 vrrp vrid 3 virtual-ip 10.30.30.18
 ipsec policy poltbibank

Please close this question
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now