Hi Raman,
I may have put a lot of redundant words and obscured the gist of my problem.
Again, this is a topology:

BB2---(192.10.1.0)--------SW1 ------------- 
(EIGRP)--------ASA--------(EIGRP)---------R4
                              (loopback-150.1.7.7)

I don't have any problem with routes on SW1 (I'm showing only the routes in 
question and skipping all others for brevity)

SW1#sh ip route
C    192.10.1.0/24 is directly connected, Vlan72
C    150.1.7.0/24 is directly connected, Loopback0

Routes on ASA include route to 150.1.7.0/24 received from SW1 via EIGRP:

ASA1(config-router)# sh route

C    163.1.127.0 255.255.255.0 is directly connected, IN
C    163.1.124.0 255.255.255.0 is directly connected, OUT
D EX 192.10.1.0 255.255.255.0 [170/258816] via 163.1.127.7, 35:42:44, IN
D    150.1.7.0 255.255.255.0 [90/156160] via 163.1.127.7, 11:03:33, IN

Once ASA received routes from SW1 it advertises them to R4. If we don't do any 
route filtering with "distribute-list REDISTR-ACL" command then by default 
everything known from SW1 is passed to R4. If we start doing some fancy 
filtering saying that only routes/hosts defined in the  REDISTR-ACL should be 
passed on the specific interface then the ASA should do likewise. And this is 
what doesn't happen.

Eugene

From: Raman Kalia <[email protected]<mailto:[email protected]>>
Reply-To: Raman Kalia <[email protected]<mailto:[email protected]>>
Date: Tuesday, June 19, 2012 7:27 PM
To: 
"[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>
Subject: Re: [OSL | CCIE_Security] CCIE_Security Digest, Vol 72, Issue 84

Loopback interface is a connected interface and route will show up as connected 
only.  It cannot appear as a route from a routing protocol.  That is the reason 
it does not show up.  Nothing wrong with your ACL here.  It is the way the 
connected routes work.  They will show up as connected only.   Can you try 
"redistribute connected" under eigrp process on ASA?  That should get it across 
to R4 along with the other route (192.10.1.0) in distribute-list.


________________________________
From: 
"[email protected]<mailto:[email protected]>"
 
<[email protected]<mailto:[email protected]>>
To: [email protected]<mailto:[email protected]>
Sent: Tuesday, June 19, 2012 7:56:34 PM
Subject: CCIE_Security Digest, Vol 72, Issue 84

Send CCIE_Security mailing list submissions to
    [email protected]<mailto:[email protected]>

To subscribe or unsubscribe via the World Wide Web, visit
    http://onlinestudylist.com/mailman/listinfo/ccie_security
or, via email, send a message with subject or body 'help' to
    
[email protected]<mailto:[email protected]>

You can reach the person managing the list at
    
[email protected]<mailto:[email protected]>

When replying, please edit your Subject line so it is more specific
than "Re: Contents of CCIE_Security digest..."


Today's Topics:

  1. Re: EIGRP distribute-list on ASA (Eugene Pefti)
  2. Re: aggressive mode with hostname IKE ID (Eugene Pefti)


----------------------------------------------------------------------

Message: 1
Date: Tue, 19 Jun 2012 20:36:33 +0000
From: Eugene Pefti <[email protected]<mailto:[email protected]>>
To: Matt Manire <[email protected]<mailto:[email protected]>>, ccie 
security
    
<[email protected]<mailto:[email protected]>>
Subject: Re: [OSL | CCIE_Security] EIGRP distribute-list on ASA
Message-ID:
    
<8457433e2350ff4db892161102b3cfed23288...@w2k8srv-exch.koiossystems.com<mailto:8457433e2350ff4db892161102b3cfed23288...@w2k8srv-exch.koiossystems.com>>

Content-Type: text/plain; charset="us-ascii"

I can only make a sigh and this is not a sigh of relief unfortunately.
I tried to change the host route in the SW1 EIGRP statement from 150.1.7.7 
0.0.0.0 to be 150.1.7.0 0.0.0.255
And the ASA ACL from
access-list EIGRP-REDIST standard permit host 150.1.7.7
to
access-list EIGRP-REDIST standard permit 150.1.7.0 255.255.255.0
Still no luck, wondering what's the difference between these two ACE from the 
ASA perspective:

access-list EIGRP-REDIST standard permit 192.10.1.0 255.255.255.0
access-list EIGRP-REDIST standard permit 150.1.7.0 255.255.255.0

It receives both routes from the switch but the route to 192.10.1.0/24 is 
passed to the neighboring EIGRP peer but not 150.1.7.0

My sigh of frustration was mostly caused by what I ran into this morning while 
working with our client.
Their ASA firewalls running 8.2.x. code started rebooting after the upgrade 
when SSH traffic was passing it. The client is power generation utility and for 
them it is VERY critical.
Cisco just bluntly provided them with the bug ID saying that all ASA software 
is affected:

===========================================================
ASA may reload with traceback related to SSH, PING, DHCP, or IPSEC
Symptom:
ASA may reload with a traceback in one of the following thread names:

Thread Name: DATAPATH-x-xxxx (Datapath can have different numbers here)
Thread Name: DHCP Client
Thread Name: SSH

Conditions:
Affects all ASA platforms.

Workaround:
None

ASA 8.4.3.5 traceback async_lock_global_work_queue_service
Symptom: ASA running 8.4.3.9 crashes Conditions: Still under investigation 
Workaround: None

ASA 5505 8.4(3)9 traceback with traceback Thread Name: DHCP Client
Symptom: ASA crashed with traceback in Thread Name: DHCP Client Conditions: ASA 
8.4(3)9 Workaround: None

ASA 8.0.5 Traceback in dispatch unit
Symptom: ASA may reload and produce a crash. Conditions: First seen on ASA 
8.0.5.27
================================================================



From: Matt Manire [mailto:[email protected]<mailto:[email protected]>]
Sent: Tuesday, June 19, 2012 7:45 AM
To: Eugene Pefti; ccie security
Subject: RE: [OSL | CCIE_Security] EIGRP distribute-list on ASA

Eugene,

It may be a bug in the ASA code.  I ran into the same issue in my test lab and 
I seem to recall this being a known bug.  I am running version 8.0(4)32 on an 
old PIX.

Thanks,

Matt Manire
CCSP, CCNP, CCDP, MCSE 2003 & MCSE 2000
Information Systems Security Manager
[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>
t: 817.525.1863
f: 817.525.1903
m: 817.271.9165
First Rate | 1903 Ascension Boulevard | Arlington, TX 76006| 
www.FirstRate.com<http://www.firstrate.com/>


From: 
[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>
 
[mailto:[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>]
 On Behalf Of Eugene Pefti
Sent: Monday, June 18, 2012 10:13 PM
To: ccie security
Subject: [OSL | CCIE_Security] EIGRP distribute-list on ASA

Guys,
What's wrong with my distribute-list that I'm trying to setup on the ASA to 
allow only routes 192.10.1.0/24<http://192.10.1.0/24> and 150.1.7.7 to send to 
R4 ?

The topology is as follows:

BB2---(192.10.1.0)--------SW1 ------------- 
(EIGRP)--------ASA--------(EIGRP)---------R4
                                      (loopback-150.1.7.7)


I create an ACL on the ASA to include the above said networks to be included in 
EIGRP updates:

access-list EIGRP-REDIST standard permit host 150.1.7.7
access-list EIGRP-REDIST standard permit 192.10.1.0 255.255.255.0

and instruct it to send an update to R4 on its OUT interface

router eigrp 100
  distribute-list EIGRP-REDIST out interface OUT
  network 163.1.124.0 255.255.255.0
  network 163.1.127.0 255.255.255.0

Then I verify routes on R4 and see that there's route to 
192.10.1.0/24<http://192.10.1.0/24> network but no route to 150.1.7.7
Removing the distribute-list restores the route to SW1 loopback on R4.

Eugene

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
</archives/ccie_security/attachments/20120619/d2b44c7a/attachment-0001.html>

------------------------------

Message: 2
Date: Tue, 19 Jun 2012 22:56:03 +0000
From: Eugene Pefti <[email protected]<mailto:[email protected]>>
To: Bruno Silva <[email protected]<mailto:[email protected]>>, ccie 
security
    
<[email protected]<mailto:[email protected]>>
Subject: Re: [OSL | CCIE_Security] aggressive mode with hostname IKE
    ID
Message-ID:
    
<8457433e2350ff4db892161102b3cfed23288...@w2k8srv-exch.koiossystems.com<mailto:8457433e2350ff4db892161102b3cfed23288...@w2k8srv-exch.koiossystems.com>>

Content-Type: text/plain; charset="iso-8859-1"

Common, Bruno, you didn't fail. We are all discussing here numerous Cisco 
pitfalls they threw on us. Sometimes the discussion becomes a verification of 
our knowledge and validation of Cisco documentation.
Keep on ;)

From: 
[email protected]<mailto:[email protected]>
 
[mailto:[email protected]<mailto:[email protected]>]
 On Behalf Of Bruno Silva
Sent: Monday, June 18, 2012 10:27 PM
To: ccie security
Subject: Re: [OSL | CCIE_Security] aggressive mode with hostname IKE ID

Hi Eugene,

Sorry if I seemed a little rough on my answer, it was not the intention. This 
is a good question after all.

I`m just trying to be more active on the forum so I can learn better, I just 
took my first attempt and I failed so it`s always good to see all the 
discussions here because it helps everyone on the path. After all we are on the 
same boat. =)

BR,
Bruno Silva.

Em 19/06/2012, ?s 01:42, Eugene Pefti escreveu:


Well, this was not my question, Bruno ;)
It was Imre who started this thread and I tried to understand what was going on.
Imre, what do you have in your crypto map for the peer? I'm almost positive 
it's an IP address and as he stated there's neither DNS server nor IP host 
mapping configured

Eugene

From: 
[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>
 
[mailto:[email protected]<mailto:[email protected]>]
 On Behalf Of Bruno Silva
Sent: Monday, June 18, 2012 7:15 PM
To: ccie security
Subject: Re: [OSL | CCIE_Security] aggressive mode with hostname IKE ID

Hi Eugene,

Sorry, again, as other times I have put myself ahead of everything. When you 
configure your crypto map to apply in your interface you have to put the "set 
peer" command with the ip address, unless you have a DNS server configured for 
it to resolve the hostname.

So again, there are 2 different sessions here, first you configure the "crypto 
isakmp key [key] host [hostname], the other section is you configuring your 
crypto map:

crypto map l2l 10 ipsec-isakp
            set transform [transform-set]
            match address [acl]
            set peer [peer ip address] --->>> here you can only put a hostname 
if you have a dns configured, this is how the initiator and responder matches 
the ip address with the hostname.

Again, unless I am wrong this is how you configured your VPN, if you did put a 
hostname instead of the ip address then you have a dns server configured on 
your router.

Hopefully this solves your question.

BR,
Bruno Silva.

Em 18/06/2012, ?s 22:04, Eugene Pefti escreveu:



Hi Bruno,
Haven't we seen the debugs where the initiator sends its hostname as an ID not 
the IP address? The main question is how the responder knows the IP address of 
the initiator.

Eugene

From: 
[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>
 
[mailto:[email protected]<mailto:[email protected]>]
 On Behalf Of Bruno Silva
Sent: Sunday, June 17, 2012 11:38 PM
To: ccie security
Subject: Re: [OSL | CCIE_Security] aggressive mode with hostname IKE ID

Hi,

When u have aggressive mode u exchange messages with the ids in cleartext while 
performing dh, i believe that's the main reason why you don't have to have a 
dns server configured in order to make it work.

If it was main mode it would not work because when the isakmp responder 
receives a main mode proposal from initiator it would require knowing the psk 
in advance but in this case the responder do not know the id of the initiator 
yet so it has to select the ip address of the initiator as the id, in this case 
even if u have configured the hostname as the id it would use the ip address 
for the tunnel names, that is not the case with aggressive mode because the 
responder knows the id either if it's the hostname or the ip address.

Br,
Bruno silva

Enviado via iPhone

Em 15/06/2012, ?s 14:54, Imre Oszkar 
<[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>>
 escreveu:
I don't have anything else on the routers..interface config and routing, it's a 
clean setup just to play with the  aggressive mode.
Even if I had a wildcard preshared key,  hostname is used as the  IKE identity 
so should not match on an address based wildcard.
At least this is what I would expect.



On Fri, Jun 15, 2012 at 1:06 AM, Eugene Pefti 
<[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>>
 wrote:
Doesn't make sense to me either.
It's like you mentioned DNS or "ip host" entry that resolves hostname to IP. 
Any leftovers "crypto isakmp peer hostname" by any chance ? Or a wild card 
0.0.0.0 pre-shared key ?
What happens if you remove the part for aggressive mode ? Does R1 authenticate 
R7 ?
I remember there was a trick in one of the labs and even an error in the 
solution guide but in your case it is kind of academic.

From: Imre Oszkar 
<[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>>
Date: Thursday, June 14, 2012 2:57 PM
To: ccie security 
<[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:[email protected]>>>
Subject: [OSL | CCIE_Security] aggressive mode with hostname IKE ID

crypto isakmp peer address

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com<http://www.ipexpert.com<http://www.ipexpert.com/>>

Are you a CCNP or CCIE and looking for a job? Check 
outwww.PlatinumPlacement.com<http://www.PlatinumPlacement.com<http://www.platinumplacement.com/>>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: </archives/ccie_security/attachments/20120619/06e27ff7/attachment.html>

End of CCIE_Security Digest, Vol 72, Issue 84
*********************************************


_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to