LAN-to-Lan tunnel between three ASA/PIX

Hi guys,.

I need help to solve a problem I had.

Here is the topology, I hope you can see what it says.

I have lan-to-lan VPN of ASA #1 à #3 of PIX and ASA #2

We now have access to the ASA #2 to PIX n ° 3 network.

How can I fix this in the most simple.

We do not want a tunneln between ASA #2 and #3 of PIX. We already did that, but the connection was horrible.

ASA #1 and #2 of ASA are located in China, and PIX is in Sweden.

the uses of the ISP ASA #2 struggled with their line in Sweden.

Thanks in advance!

It is easy to achieve. You must configure three things:

(1) allow same-security-traffic intra-interface on ASA1

(2) extend the crypto-ACL on all devices:

ASA2 to ASA1:

10.10.30.0 to 10.10.20.0 (already there)

10.10.30.0 to 10.10.10.0

PIX3 to ASA1:

10.10.10.0 to 10.10.20.0 (already there)

10.10.10.0 to 10.10.30.0

ASA1 with the ASA2:

10.10.20.0 to 10.10.30.0 (already there)

10.10.10.0 to 10.10.30.0

ASA1 to PIX3:

10.10.20.0 to 10.10.10.0 (already there)

10.10.30.0 to 10.10.10.0

(3) configure the NAT Excemption on ASA1 that this traffic will be natted as you did for the existing VPN traffic.

--
Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
http://www.Kiva.org/invitedBy/karsteni

Tags: Cisco Security

Similar Questions

  • LAN to Lan tunnel between ASA 5505 and 3030.

    I am unable to build a tunnel vpn site-to-site between an ASA 5505 and our Cisco 3030.  I tried all possible combinations except one that will work.  I am able to ping each peer on the other site.  Someone at - it a config between two tunnels of Lan to Lan to work between a 5505 and 3030 that works.  Thank you

    Hello

    Please visit this link using config:

    http://www.Cisco.com/c/en/us/support/docs/security/VPN-3000-series-conce...

    Kind regards

    Aditya

    Please evaluate the useful messages.

  • LAN-to-LAN tunnel between VPN 3000 and Cisco 1721

    Hello

    I have a current LAN-to-LAN tunnel configuration between VPN 3000 (3.6) and Cisco 1721 (12.2 (11) T).

    When I use the encryption = authentication and Des-56 = ESP\MD5\HMAC-128 for the IPSec Security Association, everything works fine.

    However, I would like to Turn off encryption for some time getting the speed improvements, so I changed

    Encryption = null esp (in 1721) and to "null" in VPN-3000.

    Now the tunnel is setup but I can spend only ICMP traffic. When I pass the traffic UDP\TCP the message below appears the Cisco 1721

    % C1700_EM-1-ERROR: error in packet-rx: pad size error, id 75, hen offset 0

    Has anyone seen this behavior?

    All those put in place an IPSec Tunnel with only the ESP authentication and NO encryption between VPN-3000 and Cisco 1721?

    Thanx------Naman

    Naman,

    Disable you the vpn Accelerator? "no accel crypto engine. Sure that you can't do with a null module vpn.

    Kurtis Durrett

  • VPN tunnel between 2 ASA 5505 with the same default gateway

    Hello

    Is it possible to create a vpn ipsec site to site (laboratory environment) between two 5505 (ASA IOS 8.2 (5) & asdm-645-206) with the same default gateway. That is a VPN tunnel or a back to back-to-one site that I have to deploy a router and hang each 5505 out a different interface? We have a lot of public IP but only one gateway our ISP (Internet). Any suggestions or recommendations are very appeciated!

    d

    Yes - you can even do it with a xover cable and a 30 ip on both external interfaces.

  • Site to Site VPN tunnel between two ASA

    I use the Site Wizard to Site on an ASA 5520, and ASA 5505 of the ADSM. Both are using 8.4 (5). When you create configurations. You follow the wizard configurations with manual what ACL s to allow the traffic of every subnet connected to talk to each other? Or they are automatically generated in the configuration file? Have not been to school yet to understand how to create the CLI VPN tunnels and what to look for.

    Thank you

    Carlos

    Hello

    First, I would like to say that I don't personally use ASDM for the configuration.

    But you should be able to configure all the necessary elements for a connection VPN L2L base through the wizard.

    I guess that typical problems to do so could relate to the lack of configuration NAT exempt or might not choose the setting "Bypass Interface Access List" that would mean you would allow traffic from the remote site in the 'external' ACL of ASA local interface. Like all other traffic coming from behind the 'outer' interface

    If you share format CLI configurations and say what networks must be able to connect via VPN L2L then I could give the required CLI format configurations.

    -Jouni

  • Problem with Tunnel VPN L2L between 2 ASA´s

    Hi guys,.

    I have some problems with my VPN Site to site tunnel between 2 ASA (5520/5505).

    I watched a lot of videos on youtube, but I can't find out why the tunnel does not...

    Both devices can ping eachothers WAN IP address (outside interfaces), but I don't see any traffic between the 2 sites. It seems that the tunnel is not open to everyone. When i PING from the local to the Remote LAN (which should be an interesting traffic for the tunnel...), the its IKEv1 remains empty...

    Am I missing something? I can't understand it more why same phase 1 is not engaged.

    You NAT won't. In your config file traffic is NATted initially and then does not match any more crypto ACL. You must move the rule dynamic NAT/PAT until the end of the table on two ASAs NAT:

     no nat (INSIDE,OUTSIDE) source dynamic any interface nat (INSIDE,OUTSIDE) after-auto source dynamic any interface

  • IPSec Tunnel permanent between two ASA

    Hello

    I configured a VPN IPSec tunnel between two ASA 5505 firewall. I want to assure you as the IPSec tunnel (this is why the security association) is permanent and do not drop due to the idle state.

    What should I do?

    Thanks for any help

    Yves

    Disables keepalive IKE processing, which is enabled by default.

    (config) #tunnel - 10.165.205.222 group ipsec-attributes

    KeepAlive (ipsec-tunnel-config) #isakmp disable

    Set a maximum time for VPN connections with the command of vpn-session-timeout in group policy configuration mode or username configuration mode:

    attributes of hostname (config) #-Group Policy DfltGrpPolicy
    hostname (Group Policy-config) #vpn - idle - timeout no

    attributes of hostname (config) #-Group Policy DfltGrpPolicy
    hostname (Group Policy-config) #vpn - session - timeout no

    Thank you

    Ajay

  • IPSec tunnels between duplicate LAN subnets

    Hi all

    Please help to connect three sites with our Central site has all the resources for users, including internet access.

    The three sites will be the ASA 5505 like their WAN device.

    We need to know is - it possible, allowing to configure an IPsec Tunnel between the three ASA with duplicate LAN subnets.

    Central site two networks 192.168.1.x 24, 192.168.100.x 24

    Distance a 24 192.168.1.x subnet

    Two remote a subnet 192.168.100.x 24

    If it is possible we also do hair distance one ping, above two remote to the Central Site to access internet, what sites need are on the Central Site, including e-mail, network, other resource also records.

    We have no other way to make this network, as all security is on our Central Site, website filtering, Application filtering, filtering of network traffic all.

    We understand that we can change two remote sites to a different subnet from the Central Site, but we have so many host devices, it will take weeks or months, so to change the MS AD domain for all users, servers too.

    We really need your expertise to do this in a laboratory and then in production.

    Thank you

    Hello Stephen,

    You can check the following links for the subnets overlap talk to each other:-

    1 LAN-to-LAN IPsec VPN with overlapping networks

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a0080b37d0b.shtml

    2 IPsec between two IOS routers with overlapping of private networks

    http://www.Cisco.com/en/us/products/ps5855/products_configuration_example09186a0080a0ece4.shtml

    Important point is local network must connect to the remote network via the translated addresses.

    for example, you won't be ablt to use real IP of the communication.

    For haripinning or turning U:

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00805734ae.shtml

    Hope that helps.

    Kind regards

    Dinesh Moudgil

  • Help with a VPN tunnel between ASA 5510 and Juniper SSG20

    Hello

    We have a customer wanting to configure a VPN Site to Site tunnel between a new purchased 5510 of ASA located in his direction with its Juniper SSG20 Office, located in the main office. We contacted HP and they send us a Cisco professional to do the job.

    After 2 days from 16:00 to 22:00 and error and countless hours of research online and nunerous calls, we are still unable to get traffic from the network of agencies to enter the tunnel.

    Main branch
    1.1.1.2                                 1.1.1.1
    -----                                               -----------
    192.168.8.0/24 | ASA|-----------------------------------| Juniper |    192.168.1.0/24
    -----                                               -----------
    192.168.8.254 192.168.1.254

    According to Cisco professionals, the tunnel is now in place but no traffic through. We are unable to ping anything on the network on the other side (192.168.1.0/24). We receive timeout ping all the time. The Cisco professional told us it's a routing or NAT problem and he's working on a solution!

    Through research, I came across a post on Experts-Exchange (here) [the 1st comment on the original post] which States "...". that both sides of the VPN must have a different class of LAN for the VPN to work... " Would that be our problem?

    It has become a critical issue to the point that he had to replace the Cisco ASA with a temporary Juniper SSG5 on another subnet (192.168.7.0/24) to get the tunnel upward and through traffic until the ASA VPN issue is resolved and I didn't need to say that the client is killing us!

    Help is very appreciated.

    Thank you

    1. Yes, ping package from the interface of the ASA is considered valuable traffic to the LAN of Juniper.

    SAA, need you traffic from the interface source ASA's private, because interesting to determine by crypto ACL MYLIST traffic between 192.168.8.0/24 and 192.168.1.0/24.

    You will also need to add the following configuration to be able to get the ping of the interface of the ASA:

    management-private access

    To initiate the ping of the private interface ASA:

    ping 192.168.1.254 private

    2. the default time before the next generation of new key is normally 28800 seconds, and if there is no interesting traffic flowing between 2 subnets, he'll tear the VPN tunnel down. As soon as there is interesting traffic, the VPN tunnel will be built automatically into the next generation of new key. However, if there is traffic before generating a new key, the new tunnel will be established, and VPN tunnel will remain standing and continue encrypt and decrypt traffic.

    Currently, your configuration has been defined with ITS lifetime of 3600 seconds GOLD / 4608000 kilobytes of traffic before the next generate a new key (it will be either 3600 seconds, or 4608000 kilobytes period expires first). You can certainly change it by default to 28800 seconds without configuring kilobytes. SA life is negotiated between the ASA and Juniper, and whatever is the lowest value will be used.

    Hope that helps.

  • How can I request an ACL to a LAN-to-LAN tunnel?

    I have an ASA with an active IPSec LAN-to-LAN tunnel and I'm wanting to limit which ports and IPs my extranet partner is able to reach. How can I apply an ACL to a tunnel of LAN-to-LAN to restrict entry and exit through the tunnel?

    Thanks in advance!

    It will work the same way. You must use VPN filters. If you use 8.0, you can use the following doc:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a00808c9a87.shtml

  • Use the client VPN tunnel to cross the LAN-to-LAN tunnel

    I have been troubleshooting an issue and cannot cross an obstacle. The ASA is running ASA running 1,0000 code 24. I am using a client VPN tunnel to connect to the ASA. The ASA has already a LAN-to-LAN tunnel, set up and operating and I need the VPN client to access the remote site over the LAN-to-LAN tunnel.

    The internal IP address of the local part is 192.168.0.0/24 and the IP address of the Remote LAN-to-LAN tunnel is 172.20.1.0/24. The clients are distributed 192.168.200.0/24 IPs. I have attached the relevant configuration for the SAA.

    When the VPN client on the network, I can access resources on the ASA network internal. On the internal network of the SAA, users can access resources through the LAN-to-LAN tunnel. Client VPN cannot access resources on the LAN-to-LAN tunnel. For the latter, there are no hits on the C-TEST access list.

    Thank you for your help.

    try adding...

    permit same-security-traffic intra-interface

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_guide_chapter09186a00806370f2.html#wp1042114

  • IKE Dead Peer Detection between Cisco ASA and Cisco PIX

    I have a network environment in Star with about 30 offices of satellite remote using VPN Site to Site connectivity.  The majority of remote satellite offices have the features of Cisco PIX 501 running PIX Version 6.3.  The hub office runs a version 8.2 (1) Cisco ASA.

    I configured Dead Peer Detection on the Cisco ASA device at the office hub with the default settings of the following-

    Confidence interval - 10 seconds

    Retry interval - 2 seconds

    I think I'm right assuming that raises are limited to 3 before the tunnel is completely demolished.  Basically, the problem that I am facing is with several remote satellite offices.  What seems to be the case, the tunnel between the remote offices and the hub is demolished (probably because of the length of IKE, always 86400 seconds) and the tunnel then fails to renegotiate unless traffic is physically forced from the hub office.  The tunnel NOT to renegotiate after satellite office, ONLY the end of the hub; so that means sending traffic to the satellite when the VPN tunnel is out of service, not to renegotiate the tunnel.  The Hub office is a colo and therefore traffic rarely comes to that end, the tunnel remains so down until manual intervention occurs and the ICMP traffic is forced into the tunnel.

    Should the KeepAlive and retry interval settings corresponds to both ends, for example if the two devices be configured for DPD?

    What are the potential pitfalls to the extension of the life of IKE, and this will help or even hinder the problem?

    Thank you in advance for helping out with this.

    Hi Nicolas,.

    I think that the two DPD settings must match on both ends, if these do not match then problems like yours might arise which seems to happen here, is that one end shows a tunnel down, but the other end may not detect it down, we could have to watch debugs, or record two ends to see if this is the case , setting in the meantime ike DPD for same timers could hetlp on.

    In regard to the increase in the life expectancy of IKE, well you just need to be aware that this could allow keys to be discovered since these are not renegotiated unless the tunnel is down on the level of IKE. Other than that I don't see why this would affect you.

  • Transfer between Cisco ASA VPN Tunnels

    Hi Experts,

    I have a situation where I need to set up the transfer between two VPN Tunnels completed in the same box ASA. A VPN Tunnel will incoming traffic and that traffic should be sent to the bottom of the other VPN Tunnel to the ASA. The two VPN Tunnels are from the Internet and speak with the same IP address of the ASA peers.

    Retail

    Tunnel A

    Source: 192.168.1.0/25

    Destination: 10.1.1.0/25

    Local counterpart: 170.252.100.20 (ASA in question)

    Remote peer: 144.36.255.254

    Tunnel B

    Source: 192.168.1.0/25

    Destination: 10.1.1.0/25

    Local peer IP: 170.252.100.20 (box of ASA in question)

    Distance from peer IP: 195.75.75.1

    Can this be achieved? what configurations are needed in the ASA apart cryptographic ACL entries?

    Thanks in advance for your time.

    Believed that, in this case your config is good, and you can avoid using routes on your asa since it must route based on its default gateway, make sure you have good sheep in place rules and the inter-to interface same-security-interface allowed return you will need.

  • Established but LAN-to-Lan tunnel can not ping to a host on the inside

    We have two cisco vpn concentrator (3005).

    Behind, we use 172.20.167.0/24 (Headquarters)

    Behind, we use 172.20.184.0/24 (remote desktop)

    We are starting to do a lan-to-lan tunnel, the tunnel establishes no problem.

    the only problem is that I can ping only the inside interface of the

    hub of central administration. I can't ping (or other

    communicate to) hosts

    on each subnet.

    On each side, you must make sure that all your hosts know that the road to the other network is by the local hub or using static routes on each host, or adding routing appropriate on any device is your default gateway.

    HTH

  • Tunnel of the phase 2's not going up between Watchguard and PIX 525

    Hi people,

    Can you please help me to know where is the problem liying, currently I am trying to establish a VPN tunnel between the PIX firewall and Watchguard, all settings of the two devices are the same, but tunnel Phase two is not coming.

    Here is the fix:

    crypto_isakmp_process_block:src:212.37.17.43, dest:212.118.128.233 spt:500 dpt:500

    Exchange OAK_MM

    ISAKMP (0): processing KE payload. Message ID = 0

    ISAKMP (0): processing NONCE payload. Message ID = 0

    ISAKMP (0:0): payload detected NAT - D

    ISAKMP (0:0): NAT does not match hash MINE

    received hash: b3 8f bb 0 93 3 b 65 e8 35 54 6 c4 cc 59 6f 6f

    My nat hash: dd 9 70 35 58 40 ac da 3 b 5 b 1 b 4 c 87 d2 11 fc

    ISAKMP (0:0): payload detected NAT - D

    ISAKMP (0:0): NAT does not match THE hash

    received hash: ba 72 c5 e 5 b fb 88 f0 1e ba c9 c6 c1 cc 8A f7

    its nat hash: c 4 c 89 a5 66 dd 80 76 48 3f f0 56 ed b0 a5 c1

    ISAKMP (0:0): built HIS NAT - D

    ISAKMP (0:0): built MINE NAT - D

    to return to the State is IKMP_NO_ERROR

    crypto_isakmp_process_block:src:212.37.17.43, dest:212.118.128.233 spt:4500 dpt:4500

    Exchange OAK_MM

    ISAKMP (0): processing ID payload. Message ID = 0

    ISAKMP (0): HASH payload processing. Message ID = 0

    ISAKMP (0): SA has been authenticated.

    ISAKMP: Created a struct 212.37.17.43, peer port 37905 peer

    ISAKMP: Lock struct UDP_ENC crypto_ikmp_udp_enc_ike_init 0x3cbb634, 1

    ISAKMP (0): ID payload

    next payload: 8

    type: 2

    Protocol: 17

    Port: 0

    Length: 23

    ISAKMP (0): the total payload length: 27

    to return to the State is IKMP_NO_ERROR

    ISAKMP (0): send to notify INITIAL_CONTACT

    ISAKMP (0): sending message 24578 NOTIFY 1 protocol

    Peer VPN: ISAKMP: approved new addition: ip:212.37.17.43/4500 Total VPN peer: 16

    Peer VPN: ISAKMP: ip:212.37.17.43/4500 Ref cnt is incremented to peers: 1 Total VPN peer: 16

    crypto_isakmp_process_block:src:212.37.17.43, dest:212.118.128.233 spt:4500 dpt:4500

    ISAKMP (0): processing NOTIFY payload Protocol 24578 1

    SPI 0, message ID = 3168983470

    ISAKMP (0): treatment notify INITIAL_CONTACT

    to return to the State is IKMP_NO_ERR_NO_TRANS

    crypto_isakmp_process_block:src:212.37.17.43, dest:212.118.128.233 spt:4500 dpt:4500

    Exchange OAK_QM

    oakley_process_quick_mode:

    OAK_QM_IDLE

    ISAKMP (0): treatment ITS payload. Message ID = 484086886

    ISAKMP: Check IPSec proposal 1

    ISAKMP: turn 1, ESP_3DES

    ISAKMP: attributes of transformation:

    ISAKMP: Life Type SA in seconds

    ISAKMP: Lifetime of HIS (basic) of 28800

    ISAKMP: Type of life HIS enKo

    ISAKMP: Lifetime of HIS (basic) 32000

    ISAKMP: program is 61433

    ISAKMP: authenticator is HMAC-MD5

    ISAKMP (0): atts are not acceptable. Next payload is 0

    ISAKMP (0): Security Association is not acceptable!

    ISAKMP (0): 14 NOTIFY message protocol sending 0

    to return to the State is IKMP_ERR_NO_RETRANS

    crypto_isakmp_process_block:src:212.37.17.43, dest:212.118.128.233 spt:4500 dpt:4500

    ISAKMP: phase 2 package is a duplicate of a previous package

    ISAKMP: last reply reference

    ISAKMP (0:0): sending of NAT - T vendor ID - rev 2 & 3

    crypto_isakmp_process_block:src:212.37.17.43, dest:212.118.128.233 spt:4500 dpt:4500

    ISAKMP: phase 2 package is a duplicate of a previous package

    ISAKMP: last reply reference

    crypto_isakmp_process_block:src:213.210.211.82, dest:212.118.128.233 spt:500 dpt:500

    ISAKMP (0): processing NOTIFY payload Protocol 36136 1

    SPI 0, message ID = 287560609

    ISAMKP (0): DPD_R_U_THERE received from the peer 213.210.211.82

    ISAKMP (0): sending message 36137 NOTIFY 1 protocol

    to return to the State is IKMP_NO_ERR_NO_TRANSdebug

    ISAKMP (0): retransmission of the phase 1 (0)...

    Thank you

    Ismail

    Hello

    The debug version, it seems that the parameters are not same on devices:

    ISAKMP (0): atts are not acceptable. Next payload is 0

    Please check the settings of the Phase 2 and also make sure that you have PFS disabled Watchguard.

    * Please rate if helped.

    -Kanishka

Maybe you are looking for

  • The webcam does not work on my Satellite L50 - A - 1 6

    Hi, given that the webcam of my new Satellite L50 - A - 1 6 does not work (I tried with Skype) I want to update the driver but I can't find a specific in the list of drivers that can be downloaded. Could someone help me to find the right one?Thanks i

  • Folders still empty display of the file, but in opening any file is shown

    I've removed loads files in the folders, leaving just an empty folder showing their location in archive.  On some of the issues that they are always on display is shown a size (not all, most say 0 bytes), but when I opened, apart from the empty folde

  • LaserJet 3200: laserjet 3200 on Windows 10

    My LaserJet 3200 stop working after the latest version of the Windows updated at the beginning of December 10.  I tried to watch several forums, downloaded all kinds of different drivers, HP, HP help desk software support and nothing worked. Then I f

  • Is the Cybershot DSC-HX200V compatible with an IR remote shutter release?

    The seller told me it was compatible with the IR remote control, but just read an article that made it seem like it is not.

  • Problem Dell XPS l321x display distortion

    Hello I have problem with the display of the mentioned system. When I use it sometimes it gets distorted and after a reboot it again OK. Sometimes 2 - 3 times per day 1-2 times a week. You can see what it looks like here: https://www.Flickr.com/photo