Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IKEV1 Site to Site VPN - Cannot ping Remote Lan

    Scheduled Pinned Locked Moved IPsec
    ipsecikev1site-to-sitecisco asa
    2 Posts 2 Posters 605 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      shahidge4
      last edited by

      Hi
      i configured site to site VPN with ASA Cisco Firewall. Tunnel is created and connected. But not able to ping LAN side of remote firewall.
      i also check post related to this but not fond the solutions.

      TCPDUM
      [2.6.0-RELEASE][admin@pfSense.home.arpa]/root: tcpdump -i vtnet0 host 209.150.154.66
      tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
      listening on vtnet0, link-type EN10MB (Ethernet), capture size 262144 bytes
      10:55:17.037625 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:17.038352 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:27.037675 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:27.038596 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:37.036752 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:37.037134 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:47.036759 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:47.037848 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:57.036351 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:55:57.037630 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:07.036155 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:07.037115 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:17.036014 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:17.036821 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:24.746466 IP static.247.28.216.95.clients.your-server.de > 209.150.154.66: ESP(spi=0xb1a453c1,seq=0xa9), length 132
      10:56:24.924339 IP 209.150.154.66 > static.247.28.216.95.clients.your-server.de: ESP(spi=0xc69126e4,seq=0xa9), length 132
      10:56:25.752597 IP static.247.28.216.95.clients.your-server.de > 209.150.154.66: ESP(spi=0xb1a453c1,seq=0xaa), length 132
      10:56:25.934947 IP 209.150.154.66 > static.247.28.216.95.clients.your-server.de: ESP(spi=0xc69126e4,seq=0xaa), length 132
      10:56:26.756420 IP static.247.28.216.95.clients.your-server.de > 209.150.154.66: ESP(spi=0xb1a453c1,seq=0xab), length 132
      10:56:26.933789 IP 209.150.154.66 > static.247.28.216.95.clients.your-server.de: ESP(spi=0xc69126e4,seq=0xab), length 132
      10:56:26.935119 IP static.247.28.216.95.clients.your-server.de > 209.150.154.66: ESP(spi=0xb1a453c1,seq=0xac), length 132
      10:56:27.112269 IP 209.150.154.66 > static.247.28.216.95.clients.your-server.de: ESP(spi=0xc69126e4,seq=0xac), length 132
      10:56:37.034736 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:37.035141 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:47.035888 IP 209.150.154.66.isakmp > static.247.28.216.95.clients.your-server.de.isakmp: isakmp: phase 2/others ? inf[E]
      10:56:47.036950 IP static.247.28.216.95.clients.your-server.de.isakmp > 209.150.154.66.isakmp: isakmp: phase 2/others ? inf[E]

      Pfsense Firewall
      9e3e31d5-fbfb-4325-ab32-9d417450a84a-image.png
      IPSEC Status

      e38ed93b-63c1-4898-b4ab-9bfb8e6a387b-image.png

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @shahidge4
        last edited by

        @shahidge4
        The tcpdump from WAN is pretty useless, since the connection is established already.

        Your P2 has a single remote IP. So the VPN will only allow access to this one.
        Do a packet capture on the IPSec interface.

        Ensure that the remote host does not block access from the remote network.

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.