rafatifard
asked on
Watchgautd Site-to-site VPN Problem
Hi There,
i give you a brife explnation on what do i want to achive with ipsec tunnel, i want to conect two site through Internet , Site A has watchgaurs (managed by me) as Internet gateway and the Site B has Cisco ASA as internet gateway which is managed by ISP.
I communicate with ISP and wemanaged to setup ipsec/BOVPN successfully, phase1 and phase 2 can establish. but i cannot any PC's behand firewalls.
Watchgaurd model is
site A ip subnet is 192.168.100.0 default gateway 192.168.100.1 (watchgaurd)
Site B ip subnet is 192.168.4.0 default gateway 192.168.4.3 (Cisco ASA)
Note: From a PC at site B, i can ping watchgaurs (192.168.100.1) Internal ip address but not any other machine behind it.
Also from a PC at site A, i cannot ping any ip address at site B.
so i think that routing/natting should working fine at Cisco ASA because site B can ping my watchggautd Internal IP.
i think there should be a routing/NAt issue at watchgaurd which cannot route packet to inside or from inside route to 192.168.4.0
I addedd watchgaurd and Cisco ASA configs, the red lin shows the new configs on ASA
your assist on this is much appreciate.
watchgaurd.docx Cisco.doc
i give you a brife explnation on what do i want to achive with ipsec tunnel, i want to conect two site through Internet , Site A has watchgaurs (managed by me) as Internet gateway and the Site B has Cisco ASA as internet gateway which is managed by ISP.
I communicate with ISP and wemanaged to setup ipsec/BOVPN successfully, phase1 and phase 2 can establish. but i cannot any PC's behand firewalls.
Watchgaurd model is
site A ip subnet is 192.168.100.0 default gateway 192.168.100.1 (watchgaurd)
Site B ip subnet is 192.168.4.0 default gateway 192.168.4.3 (Cisco ASA)
Note: From a PC at site B, i can ping watchgaurs (192.168.100.1) Internal ip address but not any other machine behind it.
Also from a PC at site A, i cannot ping any ip address at site B.
so i think that routing/natting should working fine at Cisco ASA because site B can ping my watchggautd Internal IP.
i think there should be a routing/NAt issue at watchgaurd which cannot route packet to inside or from inside route to 192.168.4.0
I addedd watchgaurd and Cisco ASA configs, the red lin shows the new configs on ASA
your assist on this is much appreciate.
watchgaurd.docx Cisco.doc
From what I can see of the ASA config, 192.168.4.3 is not one of its interfaces, although it could be an internal router. I don't know much about Watchguards, but if you have to add a route back to 192.168.4.0, then you might try using their outside IP (125.7.91.218) as the gateway.
apart from the previous comment you can allow all port open between the vpn channel
ASKER
you right, 192.168.4.3 is internal switch. where should i add route back, on watchgard ?
ASKER
as far as i know all porrs (any) are open between trustes-external and the VPN tunnel, or if there is not the case, where should i add the policy, on whatcguard or ASA ? if yes can you send me an example.
Also, i can ping from a PC at site B to 192.168.100.1 (the internal watchgaurd IP address) but not get through any server/pc behind it. and from a PC at site A i cannot ping anything beyond the tunnel.
Also, i can ping from a PC at site B to 192.168.100.1 (the internal watchgaurd IP address) but not get through any server/pc behind it. and from a PC at site A i cannot ping anything beyond the tunnel.
ASKER
Hi There,
Any comment on this, i need an assist on this to fix the routing quickly
Mant thanks
Any comment on this, i need an assist on this to fix the routing quickly
Mant thanks
Does the Watchguard have any sort of monitoring of the VPN tunnel statistics, like number of packets encrpted/decrypted? If so, then try starting a continuous ping from site B to the Watchguard. If everything is working like we think it is, the number of encrypt/decrypt packets should increase steadily. Once that is confirmed, try pinging a known live IP in your network. If both counters increase, then the problem is probably not on your side. If however, you only see the decrypt counter increase, then that means the Watchguard isn't sending traffic back through the tunnel for some reason. You may also want to trace route from both sites and see if there are any abnormal results, like public IPs showing up, indicating the traffic is going out the public interface rather than the tunnel.
Right now, there are some devices on the other side that you don't have control of and we don't know the details of, like the managed switch at 192.168.4.3. Since it's managed, is it also a layer 3 switch? If so, there might be other routing issues that we're unaware of, but first we have to verify that traffic is indeed being encrypted on your side and being forwarded to the ASA.
Right now, there are some devices on the other side that you don't have control of and we don't know the details of, like the managed switch at 192.168.4.3. Since it's managed, is it also a layer 3 switch? If so, there might be other routing issues that we're unaware of, but first we have to verify that traffic is indeed being encrypted on your side and being forwarded to the ASA.
it looks like both ends of the routes are missing. I would also make sure your tunnel is part of a ANY ANY rule if you are allowing everything through.
Site B wouldn't be able to ping the Watchguard if that were the case. We need to see some trace route and encrypt/decrypt stats to get a better idea of exactly where packets are getting lost.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.