Re: OT:VPN Connection

From: Piotr Matusiak <pitt2k_at_gmail.com>
Date: Sun, 2 Oct 2011 08:14:33 +0200

If this works when you put the server directly behind the router (with the
same IP address) the issue must be related to tha ASA. That's why I wanted
to know how you test it. Can you elaborate more what's your test procedure?
Also try to run 'deb icmp trace' on the ASA to see what's happening.

Regards,

--
Piotr Matusiak
CCIE #19860 (R&S, Security), CCSI #33705
Technical Instructor
website: www.MicronicsTraining.com <http://www.micronicstraining.com/>
blog: www.ccie1.com
If you can't explain it simply, you don't understand it well enough -
Albert Einstein
2011/10/1 Solomon Awosina <solomonawosina_at_gmail.com>
> Yes, ICMP is allowed.
>
>
> On Sat, Oct 1, 2011 at 9:31 PM, Piotr Matusiak <pitt2k_at_gmail.com> wrote:
>
>> Hi,
>>
>> Can you tell me how are you verifying it? Is it ICMP traffic between
>> servers or what?
>>
>> Regards,
>> --
>> Piotr Matusiak
>> CCIE #19860 (R&S, Security), CCSI #33705
>> Technical Instructor
>> website: www.MicronicsTraining.com <http://www.micronicstraining.com/>
>> blog: www.ccie1.com
>>
>> If you can't explain it simply, you don't understand it well enough -
>> Albert Einstein
>>
>>
>> 2011/10/1 Solomon Awosina <solomonawosina_at_gmail.com>
>>
>>> Dear Expert,
>>> >
>>> > I have an issue on my network that I require your help.
>>> >
>>> > I have a server (192.168.1.29) that needs to connect to another host
>>> > (10.13.2.19) over internet thru a VPN but it is not connecting.
>>> >
>>> > My Architecture
>>> >
>>> > My Server is connected behind a Cisco ASA which is connected to a Cisco
>>> > Router. It is on the router that the VPN is setup.
>>> >
>>> > My_Server(192.168.1.29) ==> Cisco ASA(192.168.1.17) ==> Cisco
>>> > Router(192.168.1.46)  <=====>  Cisco ASA(196.200.119.100) ==>
>>> > Other_host(10.13.2.19)
>>> >
>>> >                                                         internet
>>> >
>>> > If I put my server behind the Cisco Router, I connect successfully.
>>> Like
>>> > this
>>> > My_Server(192.168.1.40) ==>Cisco Router(192.168.1.46)  <=====>   Cisco
>>> > ASA(196.200.119.100) ==> Other_host(10.13.2.19)
>>> >
>>> >           internet
>>> >
>>> > Below are my config,
>>> >
>>> > *Cisco ASA*
>>>
>>> >
>>> >
>>> > ASA Version 7.0(7)
>>> > !
>>> >
>>> > !
>>> > interface Ethernet0/0
>>> >  nameif outside
>>> >  security-level 0
>>> >  ip address 192.168.1.33 255.255.255.240
>>> > !
>>> > interface Ethernet0/1
>>> >  nameif inside
>>> >  security-level 100
>>> >  ip address 172.16.1.1 255.255.255.0
>>> > !
>>> > interface Ethernet0/2
>>> >  nameif dmz1
>>> >  security-level 60
>>> >  ip address 192.168.1.17 255.255.255.240
>>> >
>>> >
>>> > access-list outside_in extended permit icmp any any echo-reply
>>> > access-list outside_in extended permit ip host 10.13.2.19 host
>>> > 192.168.1.40
>>> > access-list dmz1_in extended permit ip host 192.168.1.29 any
>>> >
>>> > static (dmz1,outside) 192.168.1.40 192.168.1.29 netmask 255.255.255.255
>>> > access-group outside_in in interface outside
>>> > access-group dmz1_in in interface dmz1
>>> > route outside 0.0.0.0 0.0.0.0 192.168.1.46
>>> >
>>> >
>>> > *Cisco ROUTER*
>>>
>>> >
>>> >
>>> > crypto isakmp policy 9
>>> >  encr aes 256
>>> >  authentication pre-share
>>> >  group 2
>>> >
>>> > crypto isakmp key XXXXXXXXXXXXX address 196.200.119.100
>>> > !
>>> > crypto ipsec security-association lifetime seconds 86400
>>> > !
>>> > crypto ipsec transform-set CLICKATELL esp-aes 256 esp-sha-hmac
>>> > !
>>> > crypto map CLICK 9 ipsec-isakmp
>>> >  set peer 196.200.119.100
>>> >  set transform-set CLICKATELL
>>> >  match address 198
>>> > !
>>> > interface GigabitEthernet0/0
>>> >  description VGC Internet WAN link
>>> >  ip address 41.220.72.126 255.255.255.248
>>> >  ip nbar protocol-discovery
>>> >  ip nat outside
>>> >  ip virtual-reassembly
>>> >  duplex auto
>>> >  speed auto
>>> >  crypto map CLICK
>>> > !
>>> > interface GigabitEthernet0/1
>>> >  description 21CTL Internet WAN link
>>> >  ip address 80.248.9.142 255.255.255.128
>>> >  ip nat outside
>>> >  ip virtual-reassembly
>>> >  duplex auto
>>> >  speed auto
>>> > !
>>> > interface FastEthernet0/0/0
>>> >  description LAN Interface
>>> >  switchport access vlan 10
>>> > !
>>> > interface Vlan10
>>> >  description LAN
>>> >  ip address 192.168.1.46 255.255.255.240
>>> >  ip verify unicast source reachable-via rx
>>> >  ip nat inside
>>> >  ip virtual-reassembly
>>> > !
>>> > ip route 10.13.2.19 255.255.255.255 41.220.72.121
>>> > ip route 196.200.119.100 255.255.255.255 41.220.72.121
>>> > !
>>> > access-list 110 deny   ip host 192.168.1.40 host 10.13.2.19
>>> > access-list 110 permit ip host 192.168.1.40 any
>>> > access-list 198 permit ip host 192.168.1.40 host 10.13.2.19
>>> >
>>> >
>>> >
>>> > WHAT ARE AM I MISSING?
>>> >
>>> > Kindly assist.
>>>
>>>
>>> Blogs and organic groups at http://www.ccie.net
>>>
>>> _______________________________________________________________________
>>> Subscription information may be found at:
>>> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Sun Oct 02 2011 - 08:14:33 ART

This archive was generated by hypermail 2.2.0 : Tue Nov 15 2011 - 13:10:29 ART