- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-25-2016 07:21 AM
Greetings all.
We're in pre-deployment for our firewall and I'm attempting to get an Site-To-Site VPN tunnel set up to our VShield Edge setup in the cloud. I have a tunnel established but we can't seem to get anything across it.
Troubleshooting so far:
We have a connection from our existing Cisco ASA to the VShield Edge setup that works and we're able to ping and pass traffic. That setup has Reverse Route Injection configured. The VShield Edge has no static routes configured (for the ASA VPN either) and it's interface is rather limited... apparently we don't have the Advanced Networking license.
Anyone have any ideas or have any experience with this?
Thanks!
05-27-2016 02:23 PM
The issue ended up being with the Tunnel Monitor I had set up. One of the PA techs got me a link to this article:
I hadn't realized the monitoring packets are sent out every SA and not only the one that the target host falls in. If any of those don't receive a response back (I'm assuming a "Host not reachable" would even suffice) due to a packet drop, then the tunnel monitor fails and starts trying to re-key constantly.
If tunnel monitors could be configured per SA or an SA selected to use for the one tunnel monitor then this could still work the way I was thinking but, the current software only has the one tunnel monitor that sends packets to the destination IP over every SA.
Our solution is going to be just to use the Dead Peer Detection with the IKE Gateway since the tunnel doesn't require any extrodinary measures to make sure it is up 100% of the time.
05-25-2016 08:10 AM
Halo,
Article below will help you to troubleshoot:
Cheers
05-27-2016 02:23 PM
The issue ended up being with the Tunnel Monitor I had set up. One of the PA techs got me a link to this article:
I hadn't realized the monitoring packets are sent out every SA and not only the one that the target host falls in. If any of those don't receive a response back (I'm assuming a "Host not reachable" would even suffice) due to a packet drop, then the tunnel monitor fails and starts trying to re-key constantly.
If tunnel monitors could be configured per SA or an SA selected to use for the one tunnel monitor then this could still work the way I was thinking but, the current software only has the one tunnel monitor that sends packets to the destination IP over every SA.
Our solution is going to be just to use the Dead Peer Detection with the IKE Gateway since the tunnel doesn't require any extrodinary measures to make sure it is up 100% of the time.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!