ASA to 1760 VPN problem, route missing on ASA

Unanswered Question
Jun 25th, 2010
User Badges:

I hae a L2L IPSec tunnel between sites, and the networks encrypted are 10.100.103.16/28 to a group of single host addresses, 10.4.1.2 - 10.4.1.11.


Tunnel works, ACL's match 100%, Even getting ipsec SA for the individual IPs. Here is what is stumping me. 2 of the IP;s are not in the ASA route table. 10.4.1.4 and 10.4.1.6, all the rest are in the table. One other thing, if I try to ping eithe rof the IP's from the ASA side, it will not attempt to create the tunnel, but if the other side pings from eith er IP the tunnel is built and I can see the PING attempt come through, but no respose back. The route is in the network, and I can ping 10.4.1.2, 3, 5, 7,8,9,10,and 11. All of them have a statement in the ASA route.  So everything is in place Except for the route on the ASA.


/* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";}

      access-list Remote-VPN permit ip 10.100.103.16 255.255.255.240 host 10.4.1.2

      remote ident (addr/mask/prot/port): (10.4.1.2/255.255.255.255/0/0)

      access-list Remote-VPN permit ip 10.100.103.16 255.255.255.240 host 10.4.1.6

      remote ident (addr/mask/prot/port): (10.4.1.6/255.255.255.255/0/0)


object-group network Remote-IP
network-object host 10.4.1.2
network-object host 10.4.1.3
network-object host 10.4.1.4
network-object host 10.4.1.5
network-object host 10.4.1.6
network-object host 10.4.1.7
network-object host 10.4.1.8
network-object host 10.4.1.9
network-object host 10.4.1.10
network-object host 10.4.1.11




access-list Remote-VPN extended permit ip 172.16.200.0 255.255.255.0 object-group Remote-IP
access-list Remote-VPN extended permit ip 10.100.103.16 255.255.255.240 object-group Remote-IP

access-list NoNat extended permit ip 10.100.103.16 255.255.255.240 object-group Remote-IP
access-list NoNat extended permit ip 172.16.200.0 255.255.255.0 object-group Remote-IP


nat (inside) 0 access-list NoNat


S    10.4.1.11 255.255.255.255 [1/0] via x.x.x.x, outside
S    10.4.1.10 255.255.255.255 [1/0] via, outside
S    10.4.1.9 255.255.255.255 [1/0] via , outside
S    10.4.1.8 255.255.255.255 [1/0] via , outside
S    10.4.1.7 255.255.255.255 [1/0] via , outside
S    10.4.1.5 255.255.255.255 [1/0] via , outside
S    10.4.1.3 255.255.255.255 [1/0] via , outside
S    10.4.1.2 255.255.255.255 [1/0] via , outside



Remote side ACL


/* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";}

ip access-list extended Westerkamp

remark SDM_ACL Category=4

permit ip host 10.4.1.2 172.16.200.0 0.0.0.255

permit ip host 10.4.1.3 172.16.200.0 0.0.0.255

permit ip host 10.4.1.4 172.16.200.0 0.0.0.255

permit ip host 10.4.1.5 172.16.200.0 0.0.0.255

permit ip host 10.4.1.6 172.16.200.0 0.0.0.255

permit ip host 10.4.1.7 172.16.200.0 0.0.0.255

permit ip host 10.4.1.8 172.16.200.0 0.0.0.255

permit ip host 10.4.1.9 172.16.200.0 0.0.0.255

permit ip host 10.4.1.10 172.16.200.0 0.0.0.255

permit ip host 10.4.1.11 172.16.200.0 0.0.0.255

permit ip host 10.4.1.11 10.100.103.16 0.0.0.15

permit ip host 10.4.1.10 10.100.103.16 0.0.0.15

permit ip host 10.4.1.9 10.100.103.16 0.0.0.15

permit ip host 10.4.1.8 10.100.103.16 0.0.0.15

permit ip host 10.4.1.7 10.100.103.16 0.0.0.15

permit ip host 10.4.1.6 10.100.103.16 0.0.0.15

permit ip host 10.4.1.5 10.100.103.16 0.0.0.15

permit ip host 10.4.1.4 10.100.103.16 0.0.0.15

permit ip host 10.4.1.3 10.100.103.16 0.0.0.15

permit ip host 10.4.1.2 10.100.103.16 0.0.0.15





What is keeping the 2 IP's out of the routing table?

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
Federico Coto F... Fri, 06/25/2010 - 13:54
User Badges:
  • Green, 3000 points or more

Hi,


Those static routes were assigned manually in the routing table or by the ASA when the VPN client connected?


What if you manually add the route to those IPs?


Federico.

tahequivoice Mon, 06/28/2010 - 06:24
User Badges:

They are "supposed" to be added when an IPSec SA is established, but for some odd reason, 10.4.1.4 and 10.1.4.6 do not get added. I found a workaround that isnt pretty. Instead of a global 10.0.0.0/8 route, I broke it down into the actual networks that I need routed back into the network so the default route 0.0.0.0 would force the 10.1.4 & 6 to use the outside interface, so they are working now, just not how they are supposed to.

Actions

This Discussion