cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
301
Views
0
Helpful
2
Replies

lan2lan vpn not working

ghostettler
Level 1
Level 1

Hi Community,

I am struggling for more then 10 days now to make traffic go inside a tunnel established between an RV042 and an ASA 5505.

I am sure I am missing something very easy, but still cannot figure out what it is. I suspect my nat rules are bad.

The tunnel comes up nicely and stays up. I am happy with this. I can ping and even https connect between the two appliances, but nothing goes further to any of the LANs. I have 192.168.10.0/24 on the ASA side and 192.168.20.0/24 on the RV042 side.

Please find attached the ASA config.

Any help greatly appreciated, I am getting seriously frustrated. I wish I could end up with a clear vision of what I am doing wrong. Learning from my mistakes, see...

 

Gregoire

1 Accepted Solution

Accepted Solutions

rizwanr74
Level 7
Level 7

Hi ghostettler,

 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Your no-nat is incorrect, it is missing remote-lan segment, so remove the following line.

 

no nat (inside,any) source static obj-192.168.10.0 obj-192.168.10.0 destination static obj-192.168.10.0 obj-192.168.10.0 no-proxy-arp route-lookup

 

You don't need a default-group policy for lan to lan tunnel, so remove it.

tunnel-group xxx.xxx.xxx.41 general-attributes
 no default-group-policy GroupPolicy_xxx.xxx.xxx.41

 

Please copy this no-nat.

nat (inside,any) source static obj-192.168.10.0 obj-192.168.10.0 destination static lausanne-network lausanne-network no-proxy-arp route-lookup

 

Force the ASA to push the traffic towards the outside interface, so that crypto-engine will catch it.


route outside 192.168.20.0 255.255.255.0 xxx.xxx.xxx.193

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 

Let me know if this helps.

 

thanks

Rizwan Rafeek.

View solution in original post

2 Replies 2

rizwanr74
Level 7
Level 7

Hi ghostettler,

 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Your no-nat is incorrect, it is missing remote-lan segment, so remove the following line.

 

no nat (inside,any) source static obj-192.168.10.0 obj-192.168.10.0 destination static obj-192.168.10.0 obj-192.168.10.0 no-proxy-arp route-lookup

 

You don't need a default-group policy for lan to lan tunnel, so remove it.

tunnel-group xxx.xxx.xxx.41 general-attributes
 no default-group-policy GroupPolicy_xxx.xxx.xxx.41

 

Please copy this no-nat.

nat (inside,any) source static obj-192.168.10.0 obj-192.168.10.0 destination static lausanne-network lausanne-network no-proxy-arp route-lookup

 

Force the ASA to push the traffic towards the outside interface, so that crypto-engine will catch it.


route outside 192.168.20.0 255.255.255.0 xxx.xxx.xxx.193

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 

Let me know if this helps.

 

thanks

Rizwan Rafeek.

Hi Rizwan,

 

Many thanks, yes it works as expected now.

But, i do not like voodoo natting made by the "Wizard". It is obvious that natting to itself is wrong. Your NAT is fine: natting .10.0 to .20.0 makes sense. Silly me I did not see that before...

I wonder why the so-called Wizard does not create the outside route. Obviously without it, the poor ASA does not know where to go with 192.168.20.0/24 pakets.

Once again, many thanks, as I spent too much time on this without looking in the right direction. Next time I will _not_ use the brain-damaged Cisco wizardry.

Cheers,

Gregoire Hostettler

 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card