Hi all , I have this simple topology :
R1   -   ASA1  - R2 - ASA2 - R4                                 |               
                  R5    

I am making site to site VPN from R4 to ASA1 and R5 to ASA1  which protect the 
traffic from lo 0 4.4.4.4 to lo0 on R1 1.1.1.1 and from 5.5.5.5 to 1.1.1.1 too  
and enable the both in same crypto map with number 10 and 11 on the ASA1 my 
issue  is  the tow vpn Established and I can ping from R5 with the source 
5.5.5.5 to 1.1.1.1 through the tunnel , but when I ping from R4 with source 
4.4.4.4 to 1.1.1.1 I see this message on ASA %ASA-3-713042: IKE Initiator 
unable to find policy: Intf inside, Src: 1.1.1.1, Dst: 4.4.4.4%ASA-3-713042: 
IKE Initiator unable to find policy: Intf inside, Src: 1.1.1.1, Dst: 
4.4.4.4%ASA-3-713042: IKE Initiator unable to find policy: Intf inside, Src: 
1.1.1.1, Dst: 4.4.4.4%ASA-3-713042: IKE Initiator unable to find policy: Intf 
inside, Src: 1.1.1.1, Dst: 4.4.4.4
I have make new loopback on R1 with ip 11.11.11.11 and modify the R4-ASA1 
tunnel to protect the traffic between 11.11.11.11 and 4.4.4.4 and it is work 
fine 
the question is why the traffic not coming back from the tunnel when I have tow 
tunnel protecting same IP ? 

below is the tow ipsec SA 

ASA1# show crypto ipsec sainterface: outside    Crypto map tag: VPN_R4, seq 
num: 11, local addr: 192.168.1.10
      access-list VPN_R4 permit ip host 1.1.1.1 host 4.4.4.4      local ident 
(addr/mask/prot/port): (1.1.1.1/255.255.255.255/0/0)      remote ident 
(addr/mask/prot/port): (4.4.4.4/255.255.255.255/0/0)      current_peer: 
10.1.104.4
      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0      #pkts decaps: 4, 
#pkts decrypt: 4, #pkts verify: 4      #pkts compressed: 0, #pkts decompressed: 
0      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0    
  #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0      
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0      
#send errors: 0, #recv errors: 0
      local crypto endpt.: 192.168.1.10, remote crypto endpt.: 10.1.104.4
      path mtu 1500, ipsec overhead 58, media mtu 1500      current outbound 
spi: 511449F9
    inbound esp sas:      spi: 0x9D888D58 (2642971992)         transform: 
esp-3des esp-md5-hmac none         in use settings ={L2L, Tunnel, }         
slot: 0, conn_id: 106496, crypto-map: VPN_R4         sa timing: remaining key 
lifetime (kB/sec): (4274999/3078)         IV size: 8 bytes         replay 
detection support: Y    outbound esp sas:      spi: 0x511449F9 (1360284153)     
    transform: esp-3des esp-md5-hmac none         in use settings ={L2L, 
Tunnel, }         slot: 0, conn_id: 106496, crypto-map: VPN_R4         sa 
timing: remaining key lifetime (kB/sec): (4275000/3078)         IV size: 8 
bytes         replay detection support: Y
    Crypto map tag: VPN_R5, seq num: 10, local addr: 192.168.1.10
      access-list VPN_R5 permit ip host 1.1.1.1 host 5.5.5.5      local ident 
(addr/mask/prot/port): (1.1.1.1/255.255.255.255/0/0)      remote ident 
(addr/mask/prot/port): (5.5.5.5/255.255.255.255/0/0)      current_peer: 
10.1.105.5
      #pkts encaps: 5, #pkts encrypt: 5, #pkts digest: 5      #pkts decaps: 9, 
#pkts decrypt: 9, #pkts verify: 9      #pkts compressed: 0, #pkts decompressed: 
0      #pkts not compressed: 5, #pkts comp failed: 0, #pkts decomp failed: 0    
  #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0      
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0      
#send errors: 0, #recv errors: 0
      local crypto endpt.: 192.168.1.10, remote crypto endpt.: 10.1.105.5
      path mtu 1500, ipsec overhead 58, media mtu 1500      current outbound 
spi: 252CA7CC
    inbound esp sas:      spi: 0x60F15CBA (1626430650)         transform: 
esp-3des esp-md5-hmac none         in use settings ={L2L, Tunnel, }         
slot: 0, conn_id: 98304, crypto-map: VPN_R5         sa timing: remaining key 
lifetime (kB/sec): (4274999/2871)         IV size: 8 bytes         replay 
detection support: Y    outbound esp sas:      spi: 0x252CA7CC (623683532)      
   transform: esp-3des esp-md5-hmac none         in use settings ={L2L, Tunnel, 
}         slot: 0, conn_id: 98304, crypto-map: VPN_R5         sa timing: 
remaining key lifetime (kB/sec): (4274999/2871)         IV size: 8 bytes        
 replay detection support: Y
                                          
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to