[c-nsp] ASA to Netscreen VPN?
ChrisSerafin
chris at chrisserafin.com
Mon Jun 25 16:22:46 EDT 2007
I'm trying to set up a L2L VPN with a Cisco ASA 5510 and a Juniper
Netscreen Firewall. I can't find any recent
documentation regarding this setup. I'm receiving some error messages
from the ASDM which are below:
4 Jun 25 2007 14:32:54 713903 Group = 2.2.155.253,
IP = 2.2.155.253, Freeing
previously allocated memory for authorization-dn-attributes
3 Jun 25 2007 14:32:54 713119 Group = 2.2.155.253,
IP = 2.2.155.253, PHASE 1
COMPLETED
3 Jun 25 2007 14:32:54 713122 IP = 2.2.155.253,
Keep-alives configured on but
peer does not support keep-alives (type = None)
5 Jun 25 2007 14:32:54 713904 Group = 2.2.155.253,
IP = 2.2.155.253, All IPSec SA
proposals found unacceptable!
3 Jun 25 2007 14:32:54 713902 Group = 2.2.155.253,
IP = 2.2.155.253, QM FSM error
(P2 struct &0x4274390, mess id 0x10055b4)!
3 Jun 25 2007 14:32:54 713902 Group = 2.2.155.253,
IP = 2.2.155.253, Removing
peer from correlator table failed, no match!
The VPN config is provided below. Anything stand out? or anyone else get
this to work? Any comments welcome.
interface Ethernet0/0
speed 100
duplex full
nameif outside
security-level 0
ip address 1.1.131.196 255.255.255.192 standby 1.1.131.197
!
interface Ethernet0/1
speed 100
duplex full
nameif inside
security-level 100
ip address 10.254.0.253 255.255.255.0 standby 10.254.0.254
!
interface Ethernet0/3
description LAN/STATE Failover Interface
!
interface Management0/0
speed 100
duplex full
nameif management
security-level 100
ip address 10.1.254.1 255.255.255.0 standby 10.1.254.2
!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network Inside-Nets
network-object 10.254.0.0 255.255.255.0
network-object 192.168.1.0 255.255.255.0
network-object 10.1.254.0 255.255.255.0
network-object 192.168.2.0 255.255.255.0
object-group service Management-Access-Group tcp
description Management Access Service Group
port-object eq ssh
port-object eq telnet
access-list management_access_in extended permit icmp any any
access-list management_access_in extended permit ip any any
access-list management_access_in extended permit tcp any any
access-list inside_access_in extended permit icmp any any log debugging
access-list inside_access_in extended permit ip any any
access-list inside_access_in extended permit tcp object-group
Corp-Office-Networks any
access-list outside_access_in remark Allow xxxx MSSP SNMP Monitoring
access-list outside_access_in extended permit udp 205.234.155.0
255.255.255.0 interface outside eq snmp
access-list outside_access_in remark Allow xxxx MSSP SNMP Monitoring
access-list outside_access_in extended permit udp 205.234.155.0
255.255.255.0 interface outside eq snmptrap
access-list outside_access_in remark Allow ICMP from xxxx
access-list outside_access_in extended permit icmp 205.234.155.0
255.255.255.0 interface outside
access-list outside_access_in remark xxxx MSSP VPN Ztunnel
access-list outside_access_in extended permit ip host 205.234.155.253
interface outside
access-list outside_access_in remark SSH Access for xxxx Office
access-list outside_access_in extended permit ip host 206.81.53.50
interface outside
access-list outside_20_cryptomap extended permit ip 10.1.254.0
255.255.255.0 172.25.101.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip object-group
Inside-Nets 172.25.101.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 10.1.254.0
255.255.255.0 172.25.101.0 255.255.255.0
nat (inside) 0 access-list inside_nat0_outbound
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
access-group management_access_in in interface management
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto map outside_map 20 match address outside_20_cryptomap
crypto map outside_map 20 set pfs
crypto map outside_map 20 set peer 2.2.155.253
crypto map outside_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto isakmp nat-traversal 20
tunnel-group 2.2.155.253 type ipsec-l2l
tunnel-group 2.2.155.253 ipsec-attributes
pre-shared-key *
Thanks for anything,
Chris Serafin
Security Engineer
chris at chrisserafin.com
More information about the cisco-nsp
mailing list