DMVPN Router Behind ASA - Need Help Please.

Hello,

After reading many other discussions on this topic, it appears with the correct IOS and NAT-T enabled router, you can bring up DMVPN behind a NAT device.

I have attempted to complete this task, but I cannot even get phase 1 going for the DMVPN. The routing has been verified and I can ping the public IP's from the DMVPN routers. I am pretty sure the configurations for the routers are good, but question whether any additional NAT is required on the ASA.

Here is the topology:

DMVPN hub > ASA > Internet > ASA > DMVPN Branch

The ASA on the hub side is in our Data Center and is in production with several site-to-sites and DMZ traffic. The DMVPN devices is a Cisco 2921 and 1921. When I run a "debug crypto isakmp" on both routers, I see ISAKMP messages being sent on the branch DMVPN router ONLY. From the debug output it would appear phase 1 settings do not match but I have verified this. Nothing in the Hub and no hits on the ASA ACL's.

I have tried both the public IP's and the private IP's for the ACL on the ASA. I also did port forwarding in the ASA to port forward UDP ports to the DMPVN router as I was told I may need this.

 

I have attached the relevant configurations and can post more if needed.

 

Thanks!
DMVPN-Hub.txt
ASA-Hub.txt
ASA-Branch.txt
DMVPN-Branch.txt
LVL 1
danherbonAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

asavenerCommented:
I see ISAKMP messages being sent on the branch DMVPN router ONLY.

This is normal for DMVPN - only the branch routers will initiate connections.


From your description, I assume that the GRE tunnel is going to be protected via IPSec.  You need to make sure you're allowing UDP 500 and UDP 4500 in both directions.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Pete LongTechnical ConsultantCommented:
To be honest, Id bring up the DMVPN tunnel over GRE, then protect it with IPSEC, then you are only troubleshooting one technology at a time.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.