Asa 5505 Vpn
Inviato: ven 25 apr , 2008 3:25 pm
Buongiorno a tutti,
Sto cercando di mettere su una site to site vpn tra due asa 5505 con stesso IOS.
Ho utilizzato la procedura wizard per creare le vpn, il problema è che il tunnel non si crea.
Se infatti da un pc della rete A provo a pingare l'asa della rete B, il led vpn lampeggia ma la connessione non si crea.
Guardando il log dell'asa della rete B, ho questi errori:
113019 Group = a.b.c.d, Username = a.b.c.d, IP = a.b.c.d, Session disconnected. Session Type: IPSecLAN2LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: crypto map policy not found
713902 Group = a.b.c.d, IP = a.b.c.d, Removing peer from correlator table failed, no match!
713902 Group = a.b.c.d, IP = a.b.c.d, QM FSM error (P2 struct &0x3af1528, mess id 0x84360cc3)!
713061 Group = a.b.c.d, IP = a.b.c.d, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 192.168.2.0/255.255.255.0/0/0 local proxy e.f.g.h/255.255.255.255/0/0 on interface outside
713119 Group = a.b.c.d, IP = a.b.c.d, PHASE 1 COMPLETED
113009 AAA retrieved default group policy (DfltGrpPolicy) for user = a.b.c.d
Vi posto la configurazione del suddetto asa:
La configurazione dell'altro asa è identica cambiano ovviamente solo gli indirizzi ip.
Dove sbaglio?
Sto cercando di mettere su una site to site vpn tra due asa 5505 con stesso IOS.
Ho utilizzato la procedura wizard per creare le vpn, il problema è che il tunnel non si crea.
Se infatti da un pc della rete A provo a pingare l'asa della rete B, il led vpn lampeggia ma la connessione non si crea.
Guardando il log dell'asa della rete B, ho questi errori:
113019 Group = a.b.c.d, Username = a.b.c.d, IP = a.b.c.d, Session disconnected. Session Type: IPSecLAN2LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: crypto map policy not found
713902 Group = a.b.c.d, IP = a.b.c.d, Removing peer from correlator table failed, no match!
713902 Group = a.b.c.d, IP = a.b.c.d, QM FSM error (P2 struct &0x3af1528, mess id 0x84360cc3)!
713061 Group = a.b.c.d, IP = a.b.c.d, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 192.168.2.0/255.255.255.0/0/0 local proxy e.f.g.h/255.255.255.255/0/0 on interface outside
713119 Group = a.b.c.d, IP = a.b.c.d, PHASE 1 COMPLETED
113009 AAA retrieved default group policy (DfltGrpPolicy) for user = a.b.c.d
Vi posto la configurazione del suddetto asa:
Codice: Seleziona tutto
ASA Version 7.2(3)
!
hostname ciscoasa
domain-name pippo
enable password 7bLfvfolddMpQ6A4 encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan3
shutdown
no forward interface Vlan1
nameif dmz
security-level 50
no ip address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
dns server-group DefaultDNS
domain-name angelini
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list outside_1_cryptomap extended permit ip 192.168.0.0 255.255.255.0 host a.b.c.d
acces-list inside_nat0_outbound extended permit 192.168.0.0 255.255.255.0 host a.b.c.d
acces-list outside_access_in extended permit udp any any eq isakmp
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu dmz 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer a.b.c.d
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.0.2-192.168.0.129 inside
dhcpd dns ipserverdns interface inside
dhcpd enable inside
!
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
tunnel-group a.b.c.d type ipsec-l2l
tunnel-group a.b.c.d ipsec-attributes
pre-shared-key *
prompt hostname context
Cryptochecksum:3daea31163813597fd34bf0621902a83
: end
Dove sbaglio?