Ask
Reply
Solution
10-08-2010 11:26 PM
06-10-2013 12:16 PM
I am Cisco engineer. In last 4 years, I have made Vodafone SureSignal to work behind Cisco router, Cisco PIX firewall, Draytek, BT Home Hub, regardless the public side is using static or dynamic public IP.
Unfortunately, it failed on behind Cisco ASA running 8.4.x software. I used separate VLAN/Segment for VSS with DHCP pool on to assign 1 available address, in order to ensure the VSS always get the same static IP.
Everything I diagnosed has shown the VSS tunnel is working fine, all LED for VSS v1 (1st, 2nd and 4th light) stay solid but no phone/ipad//iphone/androis can get the call/data service.
I did suspect the issue related the inspection list (just like PPTP pass through, DDNS v2 issue which need putting them into inspection list). Before I try different ASA software, I found bigsy's post, which is great! I am going to test it later today.
Bigsy, could you provide more research founding/link that showed 'inspect ipsec-pass-thru' requirement for VSS (if you have)?
06-10-2013 01:10 PM
This is the link to the relevant page in the ASA 9.1 Configuration Guide:
I found no specific VSS/ASA documentation.
This still works fine in my set up (ASA 5505 currently running v9.1(3) with static IP address; VSS is NAT'd and does not have a fixed IP address).
07-10-2013 12:46 PM
Bigsy,
I have tried this command in 8.4(6) ASA software, but the result is the same.
But I knew this version has lot of bugs like NAT rule need specific order to work well.
I would follow your way to upgrade my one and test later.
Many Thanks!
Stephen
18-12-2013 05:44 PM - edited 18-12-2013 05:45 PM
I have ASA 5510 running 9.1(3) sat behind a BT Openreach modem on an Infinity line. I cannot establish a connection from the Sure Signal box back to the Vodafone servers.
I have added the 'Inspect ipsec-pass-thru' line to the configuration and set the MTU to 1492 (the largest that will work on the outside interface).
From other research I have established that the response packet to IKE_AUTH is 1506 bytes long and is discarded by the ASA. I can see the 'Giants' count on the outside interface increasing after IKE_AUTH is issued.
Bigsy, you mentioned a Cisco 1921 in your setup. Are you establishing the PPPoE connection from the 1921 or direct from the ASA?
18-12-2013 06:02 PM - edited 18-12-2013 06:30 PM
The PPPoE connection is from the 1921 through the modem. The ASA sits behind this router.
19-12-2013 11:29 AM
Thanks Bigsy,
Is the MTU on the Outside interface of your ASA 1500?
I believe the ASA 5505 has no ability to pass Jumbo frames so I am guessing this isn't enabled?
What is the MTU on the interface of the 1921 that connects to the BT Openreach modem is this 1492 or can the 1921 cope with an MTU of 1500?
I think the issue with the 5510 I have is it's inability to pass this one oversize (1506 vs. MTU of 1492) response frame. I cannot set the MTU on the outside interface to larger than 1492 otherwise the PPPoE connection does not work. Looks like I need a new firewall or an intermediate router to form the PPPoE connection.
19-12-2013 05:03 PM
Yes, the MTU on the ASA outside interface is 1500.
On the 1921 I have not needed to reduce the MTU to 1492 on its PPPoE dialer interface.