Check EZVPN ASA-to - ASA

I have a remote location with about 10 PCs and users behind it.  I am currently using a standard IPSEC S2S connection but (don't ask, long story) the site soon will move to an ISP who can give him it is the own public IP address.  You get a private on its external interface IP address and using a NAT behind the public IP address of the ISP endangered.  This obviously means that I can't use a normal IPSEC tunnel.  My thought was to EZVPN to connect the clients/subnet behind the ASA remote to subnets behind the ASA HQ.  I just need someone for the sanity check my work.  Here's the config EZVPN I plan on adding the remote control and HQ ASAs.  I want that all traffic to RFC 1918 IPs to travel through the tunnel, while the internet traffic to the remote site continues to get out its own connection and not in the tunnel.

192.168.98.0 24 will be the subnet to the remote site.  The HQ site has subnets in all 3 areas of RFC 1918.

--------------------------------------------

ASA HQ CONFIG:

inside_nat0_outbound list of allowed ip extended access all 192.168.98.0 255.255.255.0

NAT (inside) 0-list of access inside_nat0_outbound

EZVPNSPLIT list of allowed ip extended access any 192.168.0.0 255.255.255.0

EZVPNSPLIT list of allowed ip extended access any 10.0.0.0 255.0.0.0

EZVPNSPLIT list of allowed ip extended access any 172.16.0.0 255.240.255.0

crypto ISAKMP allow outside

crypto ISAKMP policy 10

preshared authentication

3des encryption

sha hash

Group 2

life 86400

internal RemoteTG group strategy

attributes of Group Policy RemoteTG

Protocol-tunnel-VPN IPSec

Split-tunnel-policy tunnelspecified

Split-tunnel-network-list EZVPNSPLIT

value by default-field

allow to NEM

WebVPN

username password remote CLI! privilege 0

username remote attributes

VPN-group-policy RemoteTG

type tunnel-group RemoteTG remote access

attributes global-tunnel-group RemoteTG

Group Policy - by default-RemoteTG

IPSec-attributes tunnel-group RemoteTG

pre-shared key CLI!

-----------------------

ASA REMOTE CONFIG:

vpnclient Server

vpnclient mode network-extension-mode

vpnclient vpngroup password CLI RemoteTG!

vpnclient username password remote CLI!

vpnclient enable

Overall, it seems. Two things:

(1) on the SAA, normally a standard ACL is used for split Tunneling, but the scope can also work. Some subnet masks were wrong in your ACL:

EZVPNSPLIT list standard access allowed 10.0.0.0 255.0.0.0

EZVPNSPLIT list standard access allowed 172.16.0.0 255.240.0.0

EZVPNSPLIT list standard access allowed 192.168.0.0 255.255.0.0

(2) if it isn't already in your config file (and depending on your version) you must enable NAT-Traversal:

Crypto isakmp nat-traversal 20

--
Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
http://www.Kiva.org/invitedBy/karsteni

Tags: Cisco Security

Similar Questions

  • Cisco ezvpn ASAs cannot ping each other inside interfaces

    I have a set ezvpn in place with a 5506 (position B) client-side and a 5520 (location A) server-side. I have successfully connected vpn, and traffic flows. My problem is that I can't SSH in the location b. investigate this more than I can not ping is within the interface of the ASA opposing, or the machines inside each ASA ASA.

    I found the following links that describes a scenario similar to mine, but nothing on one of them helped me.
    http://www.experts-exchange.com/questions/28388142/cannot-ping-ASA-5505-inside-interface-across-VPN.html
    https://www.fir3net.com/firewalls/Cisco/Cisco-ASA-proxy-ARP-gotcha.html
    https://supportforums.Cisco.com/discussion/11755586/Cisco-ASA-VPN-established-cant-ping

    I joined sanitized versions of these two configs. Any help is appreciated.

    Hi Adam

    The site of B I'm not able to see "management of access to inside. Please try to set up the same. He could solve the problem.

    Also on the instruction of the ASA takes place nat can you please try to add keywords 'search non-proxy-arp route'.

    something like:

    nat (inside,outside) source static (Location A)_Networks (Location A)_Networks destination static (location B)-remote_network (location B)-remote_network no-proxy-arp route-lookup
    as I have noted problems with inside access to interface via the VPN when those keywords are not applied. If I remember correctly 8.6.x ASA version had a bug regarding the same. Cordially Véronique
  • Customer behind EzVPN remotely (ASA 5505)

    Hello

    I try to set up a simple EzVPN infrastructure:

    EzVPN Server (CISCO2811, hostname cme) < --=""> EzVPN remotely (ASA5505, hostname ezvpn - asa) < --=""> Client

    Attached you will find the two server EzVPN configuration and remote control. The tunnel is getting up and if I ping from the ASA to the router, I see the packets be encrypted:

    ezvpn - asa # ping 172.16.100.1

    ...

    ezvpn - asa # crypto ipsec to show her

    Interface: outside

    Tag crypto map: _vpnc_cm, seq num: 10, local addr: 172.16.100.2

    _vpnc_acl the host 172.16.100.2 ip access list permit 172.16.100.1

    local ident (addr, mask, prot, port): (172.16.100.2/255.255.255.255/0/0)

    Remote ident (addr, mask, prot, port): (172.16.100.1/255.255.255.255/0/0)

    current_peer: 172.16.100.1, username: 172.16.100.1

    dynamic allocated peer ip: 0.0.0.0

    #pkts program: 5, #pkts encrypt: 5, #pkts digest: 5

    decaps #pkts: 5, #pkts decrypt: 5, #pkts check: 5

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 5, comp #pkts failed: 0, #pkts Dang failed: 0

    success #frag before: 0, failures before #frag: 0, #fragments created: 0

    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0

    #send errors: 0, #recv errors: 0

    If I connect a customer with IP 192.168.1.2 interface eth0/1 and do a ping to the cme, I see not all packets are encrypted. I have no idea on the VPN, I just need a wireless lab environment. I need to configure on the SAA, so the Interior traffic is encrypted?

    Thanks in advance and best regards

    Dominic

    Hello

    Looks like you are missing split-tunnel list in 2811. Please see the link to the example configuration below.

    http://www.techsupportforum.com/forums/f137/how-to-configure-easy-VPN-server-on-Cisco-2811-router-192775.html

    HTH

    MS

  • The ASA CX Module failover

    Hello

    I didn't send a CX module before. We are about to deploy firewalls 2xASA5585-X with CX (for STROKE and WSE) modules.

    I'm sure I know the answer to this (I've deployed a lot of old OLD ASA with CSC modules in them, and I'm guessing that the CX module has the same).

    1 will be the failure of the module CX trigger a failover event (fail-over active standby)? My guess is not?

    2. If it is not and policy service is set to 'closed' this means that the client should perform a manual failover to the secondary/sleep to restore access, web - this correct?

    Pete

    www.petenetlive.com

    Hi Pete,.

    1 will be the failure of the module CX trigger a failover event (fail-over active standby)? My guess is not.?

    Yes he custom of tipping your ASA, depends on configuration either will be allowed or close the traffic

    In the area if ASA CX card fails, click permit traffic or close traffic. The narrow traffic option defines the ASA to block all traffic if the ASA CX module is not available. Permits for movement option sets the ASA to allow all traffic through, if not inspected, the ASA CX module is not available.

    2 if it is not and the service policy is set to 'closed' this means that the client should perform a manual failover to the secondary/sleep to restore access, web - this correct? .When set to allow traffic CX failure, there is no need to manually failover your ASA firewall between HA

    Step 8 check the ASA CX check this box traffic flow.

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/Quick_Start/CX/cx_qsg.html#wp49530

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/asa84/configuration/guide/asa_84_cli_config/modules_cx.PDF

  • ASA 5505 Flash files

    Hi all

    I want to make a file any cleaning on my 5505 without affecting any of its services.

    could someone throw me a glance and to highlight what should be removed?

    Thanks in advance!

    ASA5505 # dir

    Directory of disk0: /.

    152 - rwx 27260928 13:53:20 November 24, 2012 asa901 - k8.bin

    153 - rwx 4181246 07:32:20 5 June 2010 securedesktop - asa - 3.2.1.103 - k9.pkg

    154 - rwx 398305 sslclient-victory - 1.1.0.154.pkg June 5, 2010 07:32:38

    155 - rwx 17449432 13:23:38 November 24, 2012 asdm - 701.bin

    156 - rwx 14240396 15:53:48 asdm - 631.bin March 11, 2010

    drwx 17 4096 07:36:28 crypto_archive June 5, 2010

    10 drwx 4096 Journal 22:12:48 December 4, 2010

    158 - rwx 1530 04:31:54 7_2_4_0_startup_cfg.sav May 17, 2013

    18 drwx 4096 22:13:20 coredumpinfo December 4, 2010

    159 - rwx 4096 03:00:06 14 April 2013 ._asa901 - k8.bin

    160 - rwx 4096 03:00:10 14 April 2013 ._asdm - 701.bin

    drwx 161 4096 12:01:08 .fseventsd 14 April 2013

    162 - rwx 4096 23:38:12 December 4, 2010. _. Trashes

    drwx 163 4096 23:38:12 December 4, 2010. Trashes

    drwx 164 4096 23:38:14 December 4, 2010. Spotlight-V100

    165 - rwx 15943680 15:51:14 March 11, 2010 asa831 - k8.bin

    166 - rwx 28119320 13:23:52 24 November 2012 asdm-demo - 701.msi

    167 - rwx 4096 03:00:16 14 April 2013 ._asdm-demo - 701.msi

    168 - rwx 1189 00:42:28 upgrade_startup_errors_201304140042.log 14 April 2013

    169 - rwx 1189 09:36:58 upgrade_startup_errors_201304140936.log 14 April 2013

    170 - rwx 1189 22:13:20 upgrade_startup_errors_201012042213.log December 4, 2010

    171 - rwx 1189 04:11:30 upgrade_startup_errors_201305060411.log 6 may 2013

    172 - rwx 1189 22:52:32 upgrade_startup_errors_201012042252.log December 4, 2010

    173 - rwx 1189 06:41:10 upgrade_startup_errors_201305090641.log may 9, 2013

    174 - rwx 1189 02:45:26 upgrade_startup_errors_201012050245.log December 5, 2010

    175 - rwx 1189 06:34:08 May 10, 2013 upgrade_startup_errors_201305100634.log

    176 - rwx 1189 15:19:34 upgrade_startup_errors_201012111519.log December 11, 2010

    177 - rwx 1189 03:38:04 16 may 2013 upgrade_startup_errors_201305160338.log

    178 - rwx 1189 17:04:14 upgrade_startup_errors_201012121704.log December 12, 2010

    179 - rwx 1189 04:31:58 upgrade_startup_errors_201305170431.log may 17, 2013

    180 - rwx 1189 21:44:30 upgrade_startup_errors_201101252144.log January 25, 2011

    181 - rwx 100 05:50:40 upgrade_startup_errors_201306300550.log 30 June 2013

    182 - rwx 200 06:20:12 upgrade_startup_errors_201306300620.log June 30, 2013

    183 - rwx 14524416 05:50:46 July 27, 2013 asa802 - k8.bin

    184 - rwx 2142 05:23:44 8_0_2_0_startup_cfg.sav 25 October 2013

    185 - rwx 1138 03:33:20 upgrade_startup_errors_201308290333.log August 29, 2013

    186 - rwx 1138 05:23:48 upgrade_startup_errors_201310250523.log October 25, 2013

    total 127111168 bytes (2596864 bytes free)

    first check what ASA version you are running (see version).  If you run the 9.1 version then you can remove

    183 - rwx 14524416 05:50:46 July 27, 2013 asa802 - k8.bin

    165 - rwx 15943680 15:51:14 March 11, 2010 asa831 - k8.bin

    check what ASDM version you are running (version show and show run asdm).  If you are running version 7.1 so you can remove

    56 - rwx 14240396 15:53:48 asdm - 631.bin March 11, 2010

    You have two 7.1 pictures and a few demo also.  Demos, you should be able to withdraw without a problem, but you must identify what VersionYesYou ASDM are running before you remove the extra 7.1

    166 - rwx 28119320 13:23:52 24 November 2012 asdm-demo - 701.msi

    167 - rwx 4096 03:00:16 14 April 2013 ._asdm-demo - 701.msi

    160 - rwx 4096 03:00:10 14 April 2013 ._asdm - 701.bin

    155 - rwx 17449432 13:23:38 November 24, 2012 asdm - 701.bin

    You should be able to remove any of the upgrade starts the error logs... unless you need it for future documentation.

  • "ITS creation failed" problem for IPSec VPN

    An ASA 5100 is used to provide VPN access for my business. The configuration was made by a permeable man who has been missing for some time, and the configuration used to be OK until this morning. This morning, some users reported that their VPN would have fallen once got connected. I checked the ASA and ASDM, I see every time when user deletes, it IPSec tunnel is always action. Furthermore, I faked the problem and got the newspaper of errors such as:

    1 11:14:45.898 12/06/07 Sev = WARNING/3 IKE/0xE3000065 could not find an IKE SA for 10.2.1.8. Abandoned KEY_REQ.

    2 11:14:45.898 12/06/07 Sev = WARNING/2 IKE/0xE3000099 could not open the P2 generate a new key: error detected(Initiate:176)

    3 11:14:45.898 12/06/07 Sev = WARNING/2 IKE/0xE3000099 cannot open the QM (IKE_MAIN:458)

    On the side of the AS I did "debug crypto isakmp" and 'debug crypto ipsec' and I got the following errors:

    iscoasa # ERROR IPSEC: expiration of the timer of the asynchronous operation, SPI: 0x114CA5B6, user: roeladmin, peer: 202.x.x.70, time: 2 seconds, ctm_ipsec_create_sa:856

    IPSEC ERROR: Material outside ITS create command failed, SPI: 0x114CA5B6, error code: 0 x 17

    IPSEC ERROR: Asynchronous Operation timeout expired, SPI: 0x61BE2022, user: roeladmin, peer: 202.x.x.70, time: 2 seconds, ctm_ipsec_create_sa:856

    IPSEC ERROR: Cannot add a user auth, SPI input: 0x61BE2022, user: roeladmin, peer: 202.172.62.70

    IPSEC ERROR: Cannot create an inbound SA SPI: 0x61BE2022 document

    IPSEC ERROR: Unable to complete the command of IKE UPDATE

    12 June at 14:25:13 [IKEv1]: Group = LANWORKS, Username = roeladmin, IP = 202.172.62.70, error QM WSF (P2 struct & 0 x 4699058, mess id 0xf37ec6f4).

    12 June at 14:25:13 [IKEv1]: Group = LANWORKS, Username = roeladmin, IP = 202.172.62.70, peer table correlator Removing failed, no match!

    IPSEC ERROR: Material Inbound ITS create command failed, SPI: 0x61BE2022, error code: 0 x 17

    It shows that ITS creation has failed. But I can't find the problem with the configuration. Can someone help me on this? Thank you

    Outgoing material ITS create command failed, SPI: 0x114CA5B6, error code: 0 x 17

    It is a hardware problem, reset the firewall and it will work, I saw 4 times in different ASAs

    Please hate the post if help.

  • AnyConnect IKEv2

    I set up a new connection profile for remote access using IKEv2 instead of ssl. I used the following link for instructions:

    https://supportforums.Cisco.com/document/74111/ASA-AnyConnect-IKEv2-CONF...

    It's pretty simple, but it does not work for me. When I try to connect to the profile connection I get the following error:

    "Connection refused, mechanism of connection not allowed, contact your administrator."

    I have not configured any DAP records he is just using the default which allows all connections. I'm not really finding much too much information on this error, anyone know what I can do to fix this? Thank you!

    I just checked our ASA.  Your config is very similar to mine.  I don't have this line:

    anyconnect profiles ikev2-anyconnect_client_profile disk0:/ikev2-anyconnect_client_profile.xml
    I also have a newer version of deployed AnyConnect:
     anyconnect image disk0:/anyconnect-win-4.1.06020-k9.pkg 1 regex "Windows NT"
    I found the customers *. Profile XML can be a little touchy. Here is an example of XML profile that I use:
        "customer name"   "DNS name of device - must match certificate"   "group name"   IPsec  
    		   
  • Several groups of ACS/announcements in NDG

    Hello

    I've been racking my brain on this for a few days, and it's just not coming to me.  I'll try and also be suscinct as possible. I am in the process of transition of my users of IPSEC to SSL VPN client/web.  During this process, I want to limit users to what they need to get to only.

    ASA firewall configured for SSL VPN and IPSEC VPN (8.2.1)

    Cisco ACS for Windows (4.2)

    Active Directory Windows domain

    We have several departments who will each of the different levels of access.  We currently have a group of users who belong to an ad group that is mapped to an ACS group.  Everthing is going fine for the IPSEC VPN and SSL VPN as it is.  The problem that I am running is adding a new group (s) adding to the mix and get the right checks up to join this group.

    Example: If you are in the OWA ad group, you should only have access to OWA when you access SSL VPN.

    Example: If you are in the ad Marketing Group, you should have access to the actions and resources that are predefined.

    There could be up to 10 groups.

    I have added a new group to the ACS server and it mapped to the corresponding group.  But I guess I don't understand how to get the ASA--> ACS to verify membership in this group.  I tried the DAP of ASA with controls against the Radius attributes - but it fails. I feel just like I'm missing something in the ACS server, I need to do first.

    Thanks in advance for the help.

    Hi Chris,

    By checking groups, ASA, GBA package access attribute class only reads accept, depending on the value of class the asa will map like you on a policy of group as your configuration.

    ACS will read the first memberOf value retrieved from the profile AD and map the user to the group, accordingly, so if you have multiple groups on one user it will always match one on the list (don't ask me what is the order that AD sends the group for GBA)

    The first statement, I think you will need that many strategies of groups like the functions you need and based on the value of the class they will be mapped to this group policy and then these features will be enabled. I believe that with the radius authentication plain and RADIUS atts or DAP (dap gives you more customization options), so you can skip ACS and use ASA - ldap - AD) and use memberOf attributes.

    Let me know if this has any sense at all.

  • Management access to an ASA5505 via connection NEM

    Hello

    I work with a configuration ASA5505 NEM.

    Everything works well except the access to content the device across the tunnel. From the ASA local network I can access the device via HTTPS, Telnet and SSH, but it does not work in France via the tunnel. I am running version 7.2 (4).

    No idea what I am doing wrong?

    Thank you

    There is no attachment in your post...

    You can check out asa have access to the administration:

    See the race | Management Inc.

    If no output from the top Configure asa with stated below, then try to access to asa by tunnel.

    management-access inside

    PLS note any useful message

    Rgds

    Jorge

  • SSL VPN WEB cannot connect

    Hello

    I'm deploying an SSL VPN in ASA 8.0, I have access to the public interface and authentication configured radius.

    I have the debug RADIUS in asa and I see authentication is OK, I also checked Ray asa and works for the authentication test button, but

    It does work for approval.

    I've already set up a local user to the radius server.

    Thanks for your help.

    Best regards

    Fran

    You may be hitting a license limit if a few sessions have not stopped correctly and that you have only the default value of 2 licenses SSL... Do 'show worm' to see how much you have licenses webvpn. Also try "vpn-sessiondb disconnection of all" to delete all existing connections.

    -heather

  • Difference between IPSec over TCP and UDP IPsecover

    Hello world

    I'm testing the VPN to the user's PC.

    When I test the PC of the user using IPsecoverTCP it uses protocol 10000.

    When I check on ASA - ASDM under connection details

    ike1 - UDP Destination Port 500

    IPsecOverTCP TCP Dst Port 10000

    using Ipsecover UDP

    IKEv1 - Destination UDP 500 Port

    IPsecOverUDP - Port of Destination UDP Tunnel 10000

    Therefore when using TCP or UDP uses the same port 500 and 10000.

    Is need to know what is the major difference between these two connections just TCP or UDP?

    Concerning

    MAhesh

    IPSec over TCP is used in scenarios where:

    1 UDP port 500 is blocked, resulting in incomplete IKE negotiations

    2 ESP is not allowed to cross and encrypted traffic thus do not cross.

    3. network administrator prefers to use a connection oriented protocol.

    4. IPSec over TCP may be necessary when the intermediate NAT or PAT device is stateful firewall.

    As there are IPSec over UDP with IPSec over TCP, there is no room for negotiation. IPSec on the TCP packets are encapsulated from the beginning of the cycle of implementation of the tunnel. This feature is available only for remote access VPN not for tunnel L2L. Also does not work with proxy firewall.

    While IPSec via UDP, similar to NAT - T, is used to encapsulate ESP packets using a UDP wrapper. Useful in scenarios where the VPN clients don't support NAT - T and are behind a firewall that does not allow the ESP packets to pass through. IN IPSec over UDP, the IKE negotiations has always use port UDP 500.

  • DNS TTL in ASDM

    Hi guys,.

    In Cisco ASA 5505 ASDM, is there a way to see the remaining LIFE expectancy for DNS entries. With the CLI, you can use the dns #show command and shows the remaining LIFE. How I see with ASDM?

    (Background: I use FQDN based ACL and therefore I would not like to see TTL in ASDM)

    Thank you and best regards,

    Rahul

    HI -.

    I checked my ASA and that information does not appear to be exposed in ASDM.  I am running version 7.4 ASDM (2).

    PSC

  • ASA 8.4 (6) "cannot retrieve or check the CRL.

    Hello

    I have configured our ASA to retrieve a list of Revocation provided through our Linux certification authority. The LCR is exported via Tinyca as a crl file and served by Apache.

    The file is accessible by the SAA and to date, I see an http 200 (OK). Despite this, I get an "impossible to extract or to check the Revocation list.

    The ASA is configured as follows:

    crypto ca trustpoint LINUX-CA-TP
    revocation-check crl none
    enrollment terminal
    crl configure
      policy static
      url 1 http:///issuingca.crl
      no protocol ldap
      no protocol scep

    Which allows to debug and try a "request for LRC crypto ca LINUX-CA-TP:

    ASA (config)# crypto ca crl request LINUX-CA-TP

    CRYPTO_PKI: CRL is being polled from CDP http:///issuingca.crl.

    Unable to retrieve or verify CRL
    vpn015pi(config)#
    CRYPTO_PKI: HTTP response header:
    HTTP/1.1 200 OK
    Date: Wed, 18 Dec 2013 12:49:01 GMT
    Server: Apache/2.2.22 (Ubuntu)
    Last-Modified: Wed, 18 Dec 2013 09:50:20 GMT
    ETag: ...
    Accept-Ranges: bytes
    Content-Length: 1170
    Connection: close
    Content-Type: application/x-pkcs7-crl

    CRYPTO_PKI: transaction HTTPGetCRL completed

    I'm a little puzzled. The error is not really tell where the ASA is exactly a failure!

    Thank you

    Hello.

    I know this is a late response, but I found the solution.

    My CA was created through openssl commands and LCR was coppied to the www server. I installed the CA ASA certificate and I tried to check the Revocation list. But he has failed. It's the debug output:

    CRYPTO_PKI: CRL is being polled from CDP http://x.x.x.x/ca/root-ca/root-ca.crl.crypto_pki_req(0x00007fff2b9e3900, 24, ...)CRYPTO_PKI: Crypto CA req queue size = 1.Crypto CA thread wakes up!CRYPTO_PKI: http connection openedCRYPTO_PKI: content dump count 81----------CRYPTO_PKI: For function crypto_http_sendGET /ca/root-ca/root-ca.crl HTTP/1.0Host: x.x.x.x
    
    CRYPTO_PKI: For function crypto_http_sendCRYPTO_PKI: content dump-------------------
    
    CRYPTO_PKI: HTTP response header: HTTP/1.1 200 OKDate: Wed, 13 Jan 2016 08:10:01 GMTServer: Apache/2.4.7 (Ubuntu)Last-Modified: Tue, 12 Jan 2016 10:12:50 GMTETag: "31c-529204bc05097"Accept-Ranges: bytesContent-Length: 796Connection: closeContent-Type: application/x-pkcs7-crl
    
    CRYPTO_PKI: CRL data2d 2d 2d 2d 2d 42 45 47 49 4e 20 58 35 30 39 20 | -----BEGIN X509 ...
    
    CRYPTO_PKI: transaction HTTPGetCRL completedCrypto CA thread sleeps!CRYPTO_PKI: Failed to retrieve CRL for trustpoint: ASDM_TrustPoint3. Retrying with next CRL DP...
    Because the CRL file has been downloaded, I check my LCR with the command openssl on my linux server:
    openssl crl -inform PEM -text -in crl/root-ca/root-ca.crl Certificate Revocation List (CRL): Version 2 (0x1) Signature Algorithm: sha256WithRSAEncryption Issuer:  Last Update: Jan 12 10:09:33 2016 GMT Next Update: Jan 11 10:09:33 2017 GMT CRL extensions: X509v3 Authority Key Identifier:  keyid:E9:5E:25:61:EB:5D:9D:7E:2E:1A:3A:DA:71:B3:7B:C2:55:8D:59:66
    
     Authority Information Access:  CA Issuers - URI:http://x.x.x.x/ca/root-ca/root-ca.cer
    
     X509v3 CRL Number:  1No Revoked Certificates. Signature Algorithm: sha256WithRSAEncryption...
    
    -----BEGIN X509 CRL-----...-----END X509 CRL-----
    I founded CRL file is in PEM format. And because another available in LRC format is DER format I have converted to DER format and copied to the www server.
    openssl crl -inform PEM -outform DER -in crl/root-ca/root-ca.crl -out crl/root-ca/root-ca-der.crl
    After that I tried to download file CRL my ASA again and he succeeded.
     CRYPTO_PKI: CRL is being polled from CDP http://x.x.x.x/ca/root-ca/root-ca.crl.crypto_pki_req(0x00007fff2b9e3900, 24, ...)CRYPTO_PKI: Crypto CA req queue size = 1.Crypto CA thread wakes up!CRYPTO_PKI: http connection openedCRYPTO_PKI: content dump count 81----------CRYPTO_PKI: For function crypto_http_sendGET /ca/root-ca/root-ca.crl HTTP/1.0Host: x.x.x.x
    
    CRYPTO_PKI: For function crypto_http_sendCRYPTO_PKI: content dump-------------------
    
    CRYPTO_PKI: HTTP response header: HTTP/1.1 200 OKDate: Wed, 13 Jan 2016 08:28:08 GMTServer: Apache/2.4.7 (Ubuntu)Last-Modified: Wed, 13 Jan 2016 08:25:54 GMTETag: "227-52932eb2c1926"Accept-Ranges: bytesContent-Length: 551Connection: closeContent-Type: application/x-pkcs7-crl
    
    CRYPTO_PKI: CRL data30 ...
    
    CRYPTO_PKI: Found suitable tpCRYPTO_PKI: Found suitable tpCRYPTO_PKI: Failed to create name objects to compare DNs. status = 1795CRYPTO_PKI(select cert) subject = ...CRYPTO_PKI: Found a subject match - inserting the following cert record into certListCRYPTO_PKI: Storage context locked by thread Crypto CA
    
    CRYPTO_PKI: inserting CRLCRYPTO_PKI: set CRL update timer with delay: 31455520CRYPTO_PKI: the current device time: 08:30:53 UTC Jan 13 2016
    
    CRYPTO_PKI: the last CRL update time: 10:09:33 UTC Jan 12 2016CRYPTO_PKI: the next CRL update time: 10:09:33 UTC Jan 11 2017CRYPTO_PKI: CRL cache delay being set to: 3600000CRYPTO_PKI: Storage context released by thread Crypto CA
    
    CRYPTO_PKI: transaction HTTPGetCRL completedCrypto CA thread sleeps!
  • EzVPN between Cisco ASA 5505 (with NEM mode) and Ciscoo 881 Roure

    Hi friends,

    I configured the Cisco ASA 5505 and Cisco router with DMVPN 881. 3 offices works very well but one office remains failure. I did the same configuration for all facilities but this router does not work. Any ideas?

    Please find below the exit of 881 router Cisco:

    YF2_Tbilisi_router #.
    * 4 August 09:31:26.793: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:31:26.793 4 August: ISAKMP (0): increment the count of errors on his, try 4 out 5: retransmit the phase 1
    * 4 August 09:31:26.793: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:31:26.793: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:31:26.793 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:31:36.793: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:31:36.793 4 August: ISAKMP (0): increment the count of errors on his, try 5 of 5: retransmit the phase 1
    * 4 August 09:31:36.793: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:31:36.793: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:31:36.793 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 09:31:44.929 4 August: ISAKMP: (0): serving SA., its is 88961 B 34, delme is 88961 B 34
    * 4 August 09:31:46.793: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:31:46.793 4 August: ISAKMP: (0): the peer is not paranoid KeepAlive.

    * 09:31:46.793 4 August: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) AG_INIT_EXCH (peer 1.1.1.1)
    * 09:31:46.793 4 August: % CRYPTO-6-EZVPN_CONNECTION_DOWN: user (customer) = group = Youth_Facility_2 Server_public_addr = 1.1.1.1
    * 4 August 09:31:46.793: ISAKMP:isadb_key_addr_delete: no key for address 1.1.1.1 (root NULL)
    * 09:31:46.793 4 August: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) AG_INIT_EXCH (peer 1.1.1.1)
    * 09:31:46.793 4 August: ISAKMP: Unlocking counterpart struct 0x8AA90C50 for isadb_mark_sa_deleted(), count 0
    * 09:31:46.793 4 August: ISAKMP: delete peer node by peer_reap for 1.1.1.1: 8AA90C50
    * 09:31:46.793 4 August: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
    * 09:31:46.793 4 August: ISAKMP: (0): former State = new State IKE_I_AM1 = IKE_DEST_SA

    * 4 August 09:31:47.805: del_node 2.2.2.2 src dst 1.1.1.1:500 fvrf 0 x 0, ivrf 0 x 0
    * 09:31:47.805 4 August: ISAKMP: (0): the peer is not paranoid KeepAlive.

    * 4 August 09:31:47.805: ISAKMP: (0): profile of THE request is (NULL)
    * 09:31:47.805 4 August: ISAKMP: created a struct peer 1.1.1.1, peer port 500
    * 09:31:47.805 4 August: ISAKMP: new created position = 0x8AA90C50 peer_handle = 0 x 80004819
    * 09:31:47.805 4 August: ISAKMP: lock struct 0x8AA90C50, refcount 1 to peer isakmp_initiator
    * 09:31:47.805 4 August: ISAKMP: (0): client configuration parameters 87531228 adjustment
    * 09:31:47.805 4 August: ISAKMP: 500 local port, remote port 500
    * 09:31:47.805 4 August: ISAKMP: find a dup her to the tree during his B 88961, 34 = isadb_insert call BVA
    * 4 August 09:31:47.805: ISAKMP: (0): set up client mode.
    * 4 August 09:31:47.805: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
    * 4 August 09:31:47.805: ISAKMP: (0): built the seller-07 ID NAT - t
    * 4 August 09:31:47.805: ISAKMP: (0): built of NAT - T of the seller-03 ID
    * 4 August 09:31:47.805: ISAKMP: (0): built the seller-02 ID NAT - t
    * 4 August 09:31:47.805: ISKAMP: more send buffer from 1024 to 3072
    * 09:31:47.805 4 August: ISAKMP: (0): ITS been pre-shared key and XAUTH authentication using id ID_KEY_ID type
    * 09:31:47.805 4 August: ISAKMP (0): payload ID
    next payload: 13
    type: 11
    Group ID: Youth_Facility_2
    Protocol: 17
    Port: 0
    Length: 24
    * 09:31:47.805 4 August: ISAKMP: (0): the total payload length: 24
    * 09:31:47.809 4 August: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_AM
    * 09:31:47.809 4 August: ISAKMP: (0): former State = new State IKE_READY = IKE_I_AM1

    * 4 August 09:31:47.809: ISAKMP: (0): Beginner aggressive Mode Exchange
    * 4 August 09:31:47.809: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:31:47.809 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:31:57.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:31:57.809 4 August: ISAKMP (0): increment the count of errors on his, try 1 5: retransmit the phase 1
    * 4 August 09:31:57.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:31:57.809: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:31:57.809 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:32:07.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:32:07.809 4 August: ISAKMP (0): increment the count of errors on his, try 2 of 5: retransmit the phase 1
    * 4 August 09:32:07.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:32:07.809: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:32:07.809 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:32:17.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:32:17.809 4 August: ISAKMP (0): increment the count of errors on his, try 3 of 5: retransmit the phase 1
    * 4 August 09:32:17.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:32:17.809: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:32:17.809 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:32:27.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:32:27.809 4 August: ISAKMP (0): increment the count of errors on his, try 4 out 5: retransmit the phase 1
    * 4 August 09:32:27.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:32:27.809: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:32:27.809 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:32:37.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:32:37.809 4 August: ISAKMP (0): increment the count of errors on his, try 5 of 5: retransmit the phase 1
    * 4 August 09:32:37.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:32:37.809: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:32:37.809 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 09:32:46.793 4 August: ISAKMP: (0): serving SA., his is 872E1504, delme is 872E1504
    * 4 August 09:32:47.809: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:32:47.809 4 August: ISAKMP: (0): the peer is not paranoid KeepAlive.

    * 09:32:47.809 4 August: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) AG_INIT_EXCH (peer 1.1.1.1)
    * 09:32:47.809 4 August: % CRYPTO-6-EZVPN_CONNECTION_DOWN: user (customer) = group = Youth_Facility_2 Server_public_addr = 1.1.1.1
    * 4 August 09:32:47.809: ISAKMP:isadb_key_addr_delete: no key for address 1.1.1.1 (root NULL)
    * 09:32:47.809 4 August: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) AG_INIT_EXCH (peer 1.1.1.1)
    * 09:32:47.809 4 August: ISAKMP: Unlocking counterpart struct 0x8AA90C50 for isadb_mark_sa_deleted(), count 0
    * 09:32:47.809 4 August: ISAKMP: delete peer node by peer_reap for 1.1.1.1: 8AA90C50
    * 09:32:47.809 4 August: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
    * 09:32:47.809 4 August: ISAKMP: (0): former State = new State IKE_I_AM1 = IKE_DEST_SA

    * 4 August 09:32:48.909: del_node src 2.2.2.2:500 dst 1.1.1.1:500 fvrf 0 x 0, ivrf 0 x 0
    * 09:32:48.909 4 August: ISAKMP: (0): the peer is not paranoid KeepAlive.

    * 4 August 09:32:48.909: ISAKMP: (0): profile of THE request is (NULL)
    * 09:32:48.909 4 August: ISAKMP: created a struct peer 1.1.1.1, peer port 500
    * 09:32:48.909 4 August: ISAKMP: new created position = 0x8AA90C50 peer_handle = 0 x 80004818
    * 09:32:48.909 4 August: ISAKMP: lock struct 0x8AA90C50, refcount 1 to peer isakmp_initiator
    * 09:32:48.909 4 August: ISAKMP: (0): client setting Configuration parameters 88C05A48
    * 09:32:48.909 4 August: ISAKMP: 500 local port, remote port 500
    * 09:32:48.909 4 August: ISAKMP: find a dup her to the tree during the isadb_insert his 87B57D38 = call BVA
    * 4 August 09:32:48.909: ISAKMP: (0): set up client mode.
    * 4 August 09:32:48.909: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
    * 4 August 09:32:48.909: ISAKMP: (0): built the seller-07 ID NAT - t
    * 4 August 09:32:48.909: ISAKMP: (0): built of NAT - T of the seller-03 ID
    * 4 August 09:32:48.909: ISAKMP: (0): built the seller-02 ID NAT - t
    * 4 August 09:32:48.909: ISKAMP: more send buffer from 1024 to 3072
    * 09:32:48.913 4 August: ISAKMP: (0): ITS been pre-shared key and XAUTH authentication using id ID_KEY_ID type
    * 09:32:48.913 4 August: ISAKMP (0): payload ID
    next payload: 13
    type: 11
    Group ID: Youth_Facility_2
    Protocol: 17
    Port: 0
    Length: 24
    * 09:32:48.913 4 August: ISAKMP: (0): the total payload length: 24
    * 09:32:48.913 4 August: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_AM
    * 09:32:48.913 4 August: ISAKMP: (0): former State = new State IKE_READY = IKE_I_AM1

    * 4 August 09:32:48.913: ISAKMP: (0): Beginner aggressive Mode Exchange
    * 4 August 09:32:48.913: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:32:48.913 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:32:58.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:32:58.913 4 August: ISAKMP (0): increment the count of errors on his, try 1 5: retransmit the phase 1
    * 4 August 09:32:58.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:32:58.913: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:32:58.913 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:33:08.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:33:08.913 4 August: ISAKMP (0): increment the count of errors on his, try 2 of 5: retransmit the phase 1
    * 4 August 09:33:08.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:33:08.913: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:33:08.913 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:33:18.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:33:18.913 4 August: ISAKMP (0): increment the count of errors on his, try 3 of 5: retransmit the phase 1
    * 4 August 09:33:18.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:33:18.913: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:33:18.913 4 August: ISAKMP: (0): sending a packet IPv4 IKE.
    * 4 August 09:33:28.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH...
    * 09:33:28.913 4 August: ISAKMP (0): increment the count of errors on his, try 4 out 5: retransmit the phase 1
    * 4 August 09:33:28.913: ISAKMP: (0): transmit phase 1 AG_INIT_EXCH
    * 4 August 09:33:28.913: ISAKMP: (0): 1.1.1.1 package sending 500 peer_port 500 (I) my_port AG_INIT_EXCH
    * 09:33:28.913 4 August: ISAKMP: (0): sending a packet IPv4 IKE.

    There is no DMVPN on the SAA. All that you have configured, is not compatible with the ASA or something another DMVPN then. At least debugging shows that there are some EzVPN involved.

    The debug version, it seems that there is no communication on UDP/500 possible between devices. Maybe something is blocking who?

  • ASA EzVPN with several remote subnets

    Hello world

    I'll have the challenge of EasyVPN installation based on ASA 5520, and ASA 5505 (with the ASA5505 as the vpnclient) with several networks behind the ASA 5505.

    Access by the network directly connected on the 5505 to the central site works very well.

    But the second network segment (which is behind a router on the directly connected network) cannot connect to the central site.

    I guess I need to specify that some sort of acl's to be able to do that.

    BTW we do not use tunneling split, because all traffic moves through the tunnel (no local internet access).

    The layout looks like this

    (--LAN--)-5520---5505-(--LAN1--)-ROUTER-(--LAN2--)-(WAN)-

    LAN1 and LAN connection works great through the EZVPN Tunnel.

    LAN2 connection to the LAN does not work through the Tunnel of EZVPN.

    Here is the configuration used so far (outside the normal SHEEP, groups of objects and stuff ISAKMP crypto):

    Client:

    vpnclient Server 10.x.x.x

    extension-mode network mode vpnclient

    EzVPN vpngroup vpnclient password *.

    vpnclient username user1 password *.

    vpnclient enable

    Crypto ipsec df - bit clear-df outdoors

    Server:

    internal EzVPN group strategy

    Group Policy attributes EzVPN

    allow to NEM

    allow password-storage

    tunnel-group EzVPN type ipsec-ra

    General characteristics of tunnel-group EzVPN

    Group Policy - by default-EzVPN

    IPSec-attributes tunnel-group EzVPN

    pre-shared key *.

    user user1 password *.

    I hope you can help

    Best regards

    Jarle

    Unfortunately, it is not supported on the platform of the SAA. With EasyVPN on the SAA, only the connected networks can be advertised. To accomplish what you want to do, you need to configure a static IPSec tunnel and announce local networks via ACL interesting traffic. You can also use an IOS device that does not have the capabilities of "multiple subnet" with EasyVPN.

    http://www.Cisco.com/en/us/docs/iOS/sec_secure_connectivity/configuration/guide/sec_easy_vpn_rem.html#wp1098057

Maybe you are looking for