cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
684
Views
0
Helpful
7
Replies

Multisite VPN routing issue

zharin
Level 1
Level 1

I have a client with several sites and have an interesting routing issue. At Site B, the subnet is 10.0.0.0/16, with an ASA 5505. Site A is 192.168.0.0/16, with an ASA5510, as well as a 2810 series router (managed by someone else). There is one vpn tunnel between the two ASA's that is working just fine, site A to site B communication is working perfectly. There is a second VPN at Site A from the 2810 router to a service provider (we'll call their site SiteC). I've been able to hairpin the 5510 at site A so it redirects traffic for SiteC to the 2810. However, at Site B, I can't seem to get the 5505 to take traffic destined for SiteC to get pushed through the VPN tunnel to Site A, and then on to the 2810.

So, from Site A, I can ping anything on Site B, and anything on Site C. From Site B, I can ping anything on SiteA, including the inside interface of the 2810 router. I cannot ping from Site B to Site C, and vice versa.

I really hope that makes sense to you guys. Ideas?

7 Replies 7

Farrukh Haroon
VIP Alumni
VIP Alumni

Does your ISP know how to get to 10.0.0.0/16?

Regards

Farrukh

Please forgive me if I am being dense, but I don't understand the relevance of whether the ISP knows how to route to my private subnet. The ASA's should be doing the routing through the VPN tunnel, not the ISP.

On Site 'B', when you ping Site 'C', what do you see in the encrypted/decrypt?

show crypto ipsec sa

How many VPN peer's do you have at Site "B"?

You need to tell more detail about your setup. Is the ASA5510 the hub or the 2810? Spokes are SiteBASA,SiteC Isp Device AND?

Regards

Farrukh

I'll check the encrypt/decrypt next time I'm onsite. The ASA5510 is the primary router at Site A. The 2810 belongs to another company hosting a timeclock app, and is only used for the vpn connection to said company. Site B's only VPN peer is to Site A.

Other spokes are not in place yet. Once we figure out how to make Site B talk to Site C, we'll be adding another 30 or so spokes at remote locations, with VPN connections back to Site A so the remote sites can communicate to Site C.

Encrypt/Decrypt doesn't change. The 5505 doesn't appear to be directing the packets through the VPN tunnel.

You need to add the interesting traffic to both ASA's at site A and B.

What is the network you are trying to reach on the other end of the vpn on the 2810? You need to add this network to the vpn between the ASA's. Let's say it's a.b.c.d/24.

Site B

access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.0.0 a.b.c.d 255.255.255.0

access-list outside_cryptomap extended permit ip 10.0.0.0 255.255.0.0 a.b.c.d 255.255.255.0

Site A

access-list Outside_1_cryptomap extended permit ip a.b.c.d 255.255.255.0 10.0.0.0 255.255.0.0

access-list inside_nat0_outbound extended permit ip a.b.c.d 255.255.255.0 10.0.0.0 255.255.0.0(assuming 2810 is inside asa)

Also need to know where the 2810 is in relation to Site A 5510.

Assuming the 2810 is inside the ASA it would require the following route.

ip route 10.0.0.0 255.255.0.0 192.168.0.1

Lastly, you would need to add the 10.0.0.0 network to the vpn traffic for the tunnel between 2810 and site c. Hope that helps.

This ended up being a twofold issue. First, the interesting traffic needed to be defined on the ASA's as acomisky suggested, tyvm :). Second, the 2810 router managed by the ASP had their ACL's configured incorrectly, and were not permitting traffic to the 10.0.0.0/16 subnet.

Thanks all for your help.

Review Cisco Networking products for a $25 gift card