We use Cisco ASA for our IPSEC VPNs, using the EZVPN method. From time to time we encounter problems where an ISP has made a change to their network and our VPN stops working. Nine times out of ten the ISP denies that their change could have stopped this working - I suspect because they don't understand exactly what might have caused the problem. Rather than just bashing heads with them I want to try and point them in a direction that might get a speedier resolution.
In my current incident, I can ssh onto the external interface of the ASA and do a little poking around:
sh crypto isakmp sa
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
1 IKE Peer: {Public IP address of London ASA}
Type : user Role : initiator
Rekey : no State : AM_TM_INIT_XAUTH_V6C
At the other end of the link I see the following:
Active SA: 26
<snip>
25 IKE Peer: {public IP address of Port-Au-Prince-ASA}
Type : user Role : responder
Rekey : no State : AM_TM_INIT_MODECFG_V6H
I can't find any documentation for what AM_TM_INIT_XAUTH_V6C
or AM_TM_INIT_MODECFG_V6H
, but I'm pretty sure it means that the IKE handshake has failed for some reason.
Can anyone suggest any likely things that might be preventing IKE from succeeding, or specific details of what AM_TM_INIT_XAUTH_V6C
means?
Update: We connected the ASA at the site of a customer of another ISP. The VPN connection came up immediately. This confirms that the problem is not configuration related. The ISP is now accepting responsibility and investigating further.
Update: The connection suddenly came back online last week. I have notified the ISP to see if they changed anything, but not heard back yet. Frustratingly I am now seeing a similar issue on another site. I found a Cisco doc on the effects of fragmentation on VPN. I am starting to think that this may be the cause of the issues I am seeing.