Re: ASA FW site-to-site vpn setup with Netscreen FW

From: kawaii mak <kawaii00mak_at_gmail.com>
Date: Wed, 16 Mar 2011 17:40:42 +0800

Dear Expert,

The command output for the compare as follow but don't know how to find the
issue.
BTW, seems no hit on pkts encaps counter. P'se help. Thanks.

ASA5520
================
ASAFW/pri/act# show crypto ipsec sa peer 210.x.x.x
peer address: 210.x.x.x
    Crypto map tag: outside_map2, seq num: 1, local addr: 203.x.x.x
      access-list outside_cryptomap extended permit ip host 10.194.0.56 host
192.168.1.100
      local ident (addr/mask/prot/port): (10.194.0.56/255.255.255.255/0/0)
      remote ident (addr/mask/prot/port): (192.168.1.100/255.255.255.255/0/0
)
      current_peer: 210.x.x.x
      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
      #pkts decaps: 14, #pkts decrypt: 14, #pkts verify: 14
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly:
0
      #send errors: 0, #recv errors: 0
      local crypto endpt.: 203.x.x.x, remote crypto endpt.: 210.x.x.x
      path mtu 1500, ipsec overhead 58, media mtu 1500
      current outbound spi: F2095F3A
      current inbound spi : 79A909B7
    inbound esp sas:
      spi: 0x79A909B7 (2041121207)
         transform: esp-3des esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, PFS Group 2, }
         slot: 0, conn_id: 85442560, crypto-map: outside_map2
         sa timing: remaining key lifetime (sec): 3459
         IV size: 8 bytes
         replay detection support: Y
         Anti replay bitmap:
          0x00000000 0x00007FFF
    outbound esp sas:
      spi: 0xF2095F3A (4060700474)
         transform: esp-3des esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, PFS Group 2, }
         slot: 0, conn_id: 85442560, crypto-map: outside_map2
         sa timing: remaining key lifetime (sec): 3459
         IV size: 8 bytes
         replay detection support: Y
         Anti replay bitmap:
          0x00000000 0x00000001
ASAFW/pri/act#

Netscreen:
================
ssg5-serial-wlan-> get sa
total configured sa: 1
HEX ID Gateway Port Algorithm SPI Life:sec kb Sta PID
vsys
00000003< 203.x.x.x 500 esp:3des/sha1 f2095f3a 3571 4095M A/U 2 0
00000003> 203.x.x.x 500 esp:3des/sha1 79a909b7 3571 4095M A/U 3 0
ssg5-serial-wlan-> get sa id 3
index 0, name vpn to now360, peer gateway ip 203.x.x.x. vsys<Root>
auto key. policy node, tunnel mode, policy id in:<2> out:<3> vpngrp:<-1>.
sa_list_nxt:<0xffffffff>.
tunnel id 3, peer id 0, NSRP Local. site-to-site. Local interface is
ethernet0/0 <210.x.x.x>.
  esp, group 2, 3des encryption, sha1 authentication
  autokey, IN active, OUT active
  monitor<1>, latency: 0, availability: 0
  DF bit: clear
  app_sa_flags: 0x4001a7
  proxy id: local 192.168.1.100/255.255.255.255, remote
10.194.0.56/255.255.255.255, proto 0, port 0
  ike activity timestamp: 11786166
nat-traversal map not available
incoming: SPI f2095f3a, flag 00004000, tunnel info 40000003, pipeline
  life 3600 sec, 3562 remain, 4194303 kb, -1280 bytes remain
  anti-replay on, last 0x0, window 0x0, idle timeout value <0>, idled 38
seconds
  next pak sequence number: 0x0
outgoing: SPI 79a909b7, flag 00000000, tunnel info 40000003, pipeline
  life 3600 sec, 3562 remain, 4194303 kb, -1280 bytes remain
  anti-replay on, last 0x0, window 0x0, idle timeout value <0>, idled 3
seconds
  next pak sequence number: 0x4
ssg5-serial-wlan->

2011/3/16 Mad_Prof <dr3d3m3nt0_at_gmail.com>

> Compare the output of these commands :
>
> Netscreen
> get sa
> get sa id xxx
>
>
> ASA
> show crypto ipsec sa peer x.x.x.x
>
>
> This should be enough if Phase 2 is formed.
>
>
>
>
> On Wed, Mar 16, 2011 at 1:25 AM, kawaii mak <kawaii00mak_at_gmail.com>wrote:
>
>> Dear Expert,
>> I have a question about a Cisco FW (ASA5520+ with v8.2(2)) setup to
>> connect
>> a Netscreen SSG20 for Site-to-Site VPN tunnel.
>> Tunnel negotiation was completed Phase1 & Phase2. Private traffic
>> initiated
>> from ASA side(10.194.x.x) to Netscreen side(192.168.x.x) but seems there
>> is
>> unreachable. And some of message occurs in ASA while packet return back
>> from
>> Netscreen side as follow. Is anything wrong in configuration to triggle
>> for
>> these message????
>> P'se help!!! Thank.
>>
>> firewall log
>> ==============
>> 4|Mar 15 2011 12:26:53|402116: IPSEC: Received an ESP packet (SPI=
>> 0x24F592BC, sequence number= 0x1) from 210.x.x.x (user= 210.x.x.x) to
>> 203.x.x.x. The decapsulated inner packet doesn't match the negotiated
>> policy in the SA. The packet specifies its destination as 203.x.x.x, its
>> source as 210.x.x.x, and its protocol as 1. The SA specifies its local
>> proxy as 10.194.x.x/255.255.255.255/0/0 and its remote_proxy as
>> 192.168.x.x/
>> 255.255.255.255/0/0.
>>
>> Regards,
>> Kawaii
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
>>
>>
>>
>>
>>
>>
>>
>>
>
>
> --
> It is said that if you know your enemies and know yourself, you will not be
> imperiled in a hundred battles; if you do not know your enemies but do know
> yourself, you will win one and lose one; if you do not know your enemies nor
> yourself, you will be imperiled in every single battle.

Blogs and organic groups at http://www.ccie.net
Received on Wed Mar 16 2011 - 17:40:42 ART

This archive was generated by hypermail 2.2.0 : Fri Apr 01 2011 - 06:35:41 ART