HI, I have a tunnel between the above mentioned technologies. We have strange behavior that servers stop being able to access some servers on the remote tunnel (ASA side) It only impacts a few subnets. While this issue is present I can see data travelling across for other interesting traffic. the only way to get things working again is to clear the association, however this does not always work and either requires multiple attempts at clearing the association or restarting the ASA altogether. I think the issue is triggered when the association expires (which is set by time alone).
I created a script to ping to one of the impacted subnets and log and alert me when data flow stops. I was trying to 100% prove that it was stopping when the association expired however found something interesting. see the following config excerpt:
rypto ipsec security-association lifetime seconds 86400
crypto ipsec security-association pmtu-aging infinite
crypto map VPN 1 match address VPN-UK-CP
crypto map VPN 1 set peer X.X.X.X
crypto map VPN 1 set ikev1 transform-set VPN-TS
crypto map VPN 1 set security-association lifetime seconds 28800
crypto map VPN 1 set security-association lifetime kilobytes unlimited
I was expecting the SA to expire after 8 hours (28800 Seconds) however it didn’t and when i checked the SA status noticed it had plenty of time remaining, in fact more than 28,800 seconds. It seems the config is not taking on the crypto map specific setting and is using the global 86400 setting. According to Cisco docs this should be the other way around which makes more sense
IKE Peer: X.X.X.X
Type : L2L Role : responder
Rekey : no State : MM_ACTIVE
Encrypt : aes-256 Hash : SHA
Auth : preshared Lifetime: 86400
Lifetime Remaining: 57524
Although the reassociation may be the trigger for the data stopping, i would like to get to the root cause.
Some other info that may help
Originally we had exact matching rule set on both sides of the Tunnel, however in attempt to simplify the issue from the ASA end I simply allowed all traffic to flow between the two subnets. Checkpoint still has specific IPs and port selectors defined
Config example
object-group network KL-LAN
Network object 172.27.1.0 255.255.255.0
Network object 172.27.2.0 255.255.254.0
object-group network UK-LAN
Network object 10.1.1.0 255.255.255.0
Network object 10.1.10.0 255.255.255.0
Network object 10.32.2.0 255.255.254.0
access-list VPN-UK-CP extended permit ip object-group UK-LAN object-group KL-LAN
access-list VPN-UK-CP extended permit ip object-group KL-LAN object-group UK-LAN
Below are the failures encountered:
All IP traffic stops that originates from AD server 10.1.1.8 with destination of AD Server 172.27.1.10, however 172.27.1.10 can still ping and communicate with 10.1.18
While in this failure mode users from 10.32.2.0/23 can ping 172.27.1.10 which is allowed by the same rulebase.
Any thoughts appreciated.