All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
X - ASApedia
All About Static IPSec L2L and ASP Table - ASA 9.X
From ASApedia
(Redirected from All About Static IPSec L2L and ASP Table)
Network Diagram:
DG - Default Gateway
TDG - Tunnel Default Gateway
Contents
1 Configuring Static L2L to ASA-2
2 A Look at the ASP Table before L2L is Established
3 What Occurred to Bring Up the Tunnel on Data
4 What About VPN Filters
5 Troubleshooting Why a L2L is not Establishing on Data
Create Tunnel-Group
asapedia/index.php/All_About_Static_IPSec_L2L_and_ASP_Table 1/7
3/23/2020 All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
Input Table
in id=0xaef866f0, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0
dst ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86cc8, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86db0, priority=70, domain=ipsec-tunnel-flow, deny=false
asapedia/index.php/All_About_Static_IPSec_L2L_and_ASP_Table 2/7
3/23/2020 All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86e98, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86f80, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xae7dd1f0, priority=13, domain=decrypt, deny=true
hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xae7dd678, priority=13, domain=ipsec-tunnel-flow, deny=true
hits=0, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86840, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=::/128, port=0, tag=0
dst ip/id=::/128, port=0, tag=0
input_ifc=outside, output_ifc=any
in id=0xae7de2e0, priority=13, domain=decrypt, deny=true
hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip/id=::/0, port=0, tag=0
dst ip/id=fe80::218:73ff:fe17:c69a/128, port=0, tag=0
input_ifc=outside, output_ifc=any
in id=0xae7de820, priority=13, domain=decrypt, deny=true
hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip/id=::/0, port=0, tag=0
dst ip/id=fd85:5000:3000:2207:85:1:226:1/128, port=0, tag=0
input_ifc=outside, output_ifc=any
in id=0xae7ded60, priority=13, domain=ipsec-tunnel-flow, deny=true
hits=8, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=::/0, port=0, tag=0
dst ip/id=::/0, port=0, tag=0
input_ifc=outside, output_ifc=any
Output Table:
out id=0xadd400f8, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0
dst ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86928, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86a10, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86af8, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86be0, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86798, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=::/128, port=0, tag=0
dst ip/id=::/128, port=0, tag=0
asapedia/index.php/All_About_Static_IPSec_L2L_and_ASP_Table 3/7
3/23/2020 All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
input_ifc=any, output_ifc=outside
L2 - Output Table:
L2 - Input Table:
The above output shows four "cascade delimiter" rules (IPv4/IPv6 and ipsec-tunnel-flow/encrypt domains), four
static ACE ipsec-tunnel-flow rules (one for each ACL entry), and four static ACE encrypt rules (one for each ACL
entry). The "cascade delimiter" encrypt rule is used to define the beginning of a set of static encrypt rules
associated with a crypto map entry. All entries will have the same cascade identifier (cs_id). The cs_id value
contains the address of the crypto map entry to guarantee uniqueness. The user_data field contains the
VPN_CONTEXT ID. The VPN_CONTEXT will contain the crypto information associated to an inbound or
outbound IPsec SA.
All the static rules have a user_data field of NULL indicating that they do not have a VPN_CONTEXT associated
to them.
Let's look at the Crypto data in the ASP table after pinging 65.1.224.10 from 95.1.224.10 (PC on inside of ASA1).
Interface outside:
<snip>
in id=0x4059ee0, priority=70, domain=permit, deny=false
hits=0, user_data=0x8eec, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip=75.1.250.1, mask=255.255.255.255, tag=any
dst ip=85.1.226.1, mask=255.255.255.255, SPI=0xE7A3223. tag=any, dscp=0x0
<snip>
out id=0x3a16a10, priority=70, domain=permit, deny=false
hits=0, user_data=0x612c, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip=85.1.226.1, mask=255.255.255.255, tag=any
dst ip=75.1.250.1, mask=255.255.255.255, SPI=0x2AD5F4C2, tag=any, dscp=0x0
<snip>
Input Table
in id=0xae505750, priority=70, domain=decrypt, deny=false
hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip/id=75.1.227.1, mask=255.255.255.255, tag=any
dst ip/id=85.1.225.1, mask=255.255.255.255, SPI=0xE7A3223, tag=any, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef866f0, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0
dst ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86cc8, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86db0, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86e98, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86f80, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=1, user_data=0x8eec, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
asapedia/index.php/All_About_Static_IPSec_L2L_and_ASP_Table 4/7
3/23/2020 All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
src ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86f80, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=1, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xae7dd1f0, priority=13, domain=decrypt, deny=true
hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xae7dd678, priority=13, domain=ipsec-tunnel-flow, deny=true
hits=0, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
in id=0xaef86840, priority=70, domain=ipsec-tunnel-flow, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=::/128, port=0, tag=0
dst ip/id=::/128, port=0, tag=0
input_ifc=outside, output_ifc=any
in id=0xae7de2e0, priority=13, domain=decrypt, deny=true
hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip/id=::/0, port=0, tag=0
dst ip/id=fe80::218:73ff:fe17:c69a/128, port=0, tag=0
input_ifc=outside, output_ifc=any
in id=0xae7de820, priority=13, domain=decrypt, deny=true
hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=50
src ip/id=::/0, port=0, tag=0
dst ip/id=fd85:5000:3000:2207:85:1:226:1/128, port=0, tag=0
input_ifc=outside, output_ifc=any
in id=0xae7ded60, priority=13, domain=ipsec-tunnel-flow, deny=true
hits=8, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=::/0, port=0, tag=0
dst ip/id=::/0, port=0, tag=0
input_ifc=outside, output_ifc=any
Output Table:
out id=0xadd400f8, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0
dst ip/id=0.0.0.0, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86928, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86a10, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=85.1.226.1, mask=255.255.255.255, port=0, tag=0
dst ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86af8, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=75.1.250.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86be0, priority=70, domain=encrypt, deny=false
hits=1, user_data=0x612c, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86be0, priority=70, domain=encrypt, deny=false
hits=1, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=95.1.224.0, mask=255.255.224.0, port=0, tag=0
dst ip/id=65.1.224.0, mask=255.255.224.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
out id=0xaef86798, priority=70, domain=encrypt, deny=false
hits=0, user_data=0x0, cs_id=0xad408d48, reverse, flags=0x0, protocol=0
src ip/id=::/128, port=0, tag=0
dst ip/id=::/128, port=0, tag=0
input_ifc=any, output_ifc=outside
asapedia/index.php/All_About_Static_IPSec_L2L_and_ASP_Table 5/7
3/23/2020 All About Static IPSec L2L and ASP Table - ASA 9.X - ASApedia
L2 - Output Table:
L2 - Input Table:
NOTE: Hit counts increment on a per flow not on a per packet basis.
asapedia/index.php/All_About_Static_IPSec_L2L_and_ASP_Table 7/7