OK...I think this issue will stump everyone here. We have an ATT circuit with one copper hand off but there are two vlan's. One is 'private' and one is 'internet'. currently we have the private (vlan1204) vpn tunnel to our main office. I am trying to get the 'internet' (vlan1201) to be the secondary link so when vlan1204 goes down, vlan1201 will build a tunnel and users will be able to work. When I shut vlan1204 I see the route fail over and tries to establish a tunnel. I get some MM_MSG4 and MM_MSG6. I think there is something up with my NAT from the local network to the Internet interface that is preventing the tunnel from coming up. Here is the config below...Good luck!
hostname AAAA0101025505
domain-name ABCDOH.NET
enable password j/k0Hj6QfsuzxJi0 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
no names
name X.X.67.0 hostsville_VLAN67
name X.X.2.0 hostsville_VLAN2
name X.X.7.0 hostsville_VLAN7
name X.X.6.0 hostsville_VLAN6
name X.X.8.0 hostsville_VLAN8
name X.X.5.0 hostsville_VLAN5
name X.X.1.0 hostsville_VLAN1
name X.X.4.0 hostsville_VLAN4
name X.X.32.0 Upperxome_Subnet32
name X.X.75.0 hostsville_Vlan75
!
interface Vlan64
nameif AAAANetwork
security-level 100
ip address X.X.64.251 255.255.255.0
interface Vlan1201
nameif Internet
security-level 0
ip address Y.X.176.182 255.255.255.252
!
interface Vlan1204
nameif AAAA
security-level 0
ip address X.X.99.251 255.255.255.0
!
interface Ethernet0/0
switchport trunk allowed vlan 1200-1204
switchport mode trunk
speed 100
duplex full
!
interface Ethernet0/1
switchport access vlan 64
!
interface Ethernet0/2
switchport access vlan 64
!
interface Ethernet0/3
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
banner exec c UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You MUST have explicit permission to access and configure this device. Violations of this policy will result in disciplinary action, and may be reported to law enforcement. c
banner login c UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You MUST have explicit permission to access and configure this device. Violations of this policy will result in disciplinary action, and may be reported to law enforcement. c
banner motd c UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You MUST have explicit permission to access and configure this device. Violations of this policy will result in disciplinary action, and may be reported to law enforcement. c
boot system disk0:/asa804-k8.bin
ftp mode passive
clock timezone UTC -4
dns server-group DefaultDNS
domain-name ABCDOH.NET
object-group network AAAALocal
description ABCD AAAA Office
network-object X.X.64.0 255.255.255.0
object-group network AAAAgstownRemote
description Remote network list for the ABCD AAAAgstown office.
network-object X.X.2.0 255.255.255.0
network-object X.X.67.0 255.255.255.0
network-object X.X.7.0 255.255.255.0
network-object X.X.1.0 255.255.255.0
network-object X.X.5.0 255.255.255.0
network-object X.X.6.0 255.255.255.0
network-object X.X.8.0 255.255.255.0
network-object X.X.4.0 255.255.255.0
network-object X.X.32.0 255.255.255.0
network-object X.X.75.0 255.255.255.0
access-list crypto10 extended permit ip object-group AAAALocal any
access-list inside_outbound_nat0_acl extended permit ip object-group AAAALocal any
access-list ABCD extended permit icmp any any
access-list ABCD extended permit tcp host X.X.99.3 any eq 50 log
access-list ABCD extended permit tcp host X.X.99.3 any eq 51 log
access-list ABCD extended permit udp host X.X.99.3 any eq isakmp log
access-list ABCD extended permit ip host X.X.99.0 any log
access-list ABCD extended permit icmp X.X.0.0 255.255.0.0 any
access-list ABCD extended deny ip 14.2.6.0 255.255.255.0 any log
access-list ABCD extended deny ip 127.0.0.0 255.255.255.0 any log
access-list ABCD extended deny ip 10.0.0.0 255.255.255.0 any log
access-list ABCD extended deny ip 0.0.0.0 255.0.0.0 any log
access-list ABCD extended deny ip 192.168.0.0 255.255.0.0 any log
access-list ABCD extended deny ip 192.0.2.0 255.255.255.0 any log
access-list ABCD extended deny ip 169.254.0.0 255.255.0.0 any log
access-list ABCD extended deny ip 224.0.0.0 224.0.0.0 any log
access-list ABCD extended deny ip host 255.255.255.255 any log
access-list ABCD extended deny icmp any any echo log
access-list ABCD extended deny icmp any any redirect log
access-list ABCD extended deny icmp any any mask-request log
access-list ABCD extended permit ip host X.X.75.0 interface AAAANetwork log
access-list nonatInet extended permit ip object-group AAAALocal any
access-list ABCD_Internet extended permit icmp any any
access-list ABCD_Internet extended permit tcp host W.X.Y.7 any eq 50 log
access-list ABCD_Internet extended permit tcp host W.X.Y.7 any eq 51 log
access-list ABCD_Internet extended permit udp host W.X.Y.7 any eq isakmp log
access-list ABCD_Internet extended permit ip host W.X.Y.0 any
access-list ABCD_Internet extended deny ip 14.2.6.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 127.0.0.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 10.0.0.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 0.0.0.0 255.0.0.0 any log
access-list ABCD_Internet extended deny ip 192.168.0.0 255.255.0.0 any log
access-list ABCD_Internet extended deny ip 192.0.2.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 169.254.0.0 255.255.0.0 any log
access-list ABCD_Internet extended deny ip 224.0.0.0 224.0.0.0 any log
access-list ABCD_Internet extended deny ip host 255.255.255.255 any log
access-list ABCD_Internet extended deny icmp any any echo log
access-list ABCD_Internet extended deny icmp any any redirect log
access-list ABCD_Internet extended deny icmp any any mask-request log
access-list ABCD_Internet extended deny udp any any log
pager lines 24
logging console debugging
logging monitor warnings
logging buffered debugging
logging asdm informational
mtu AAAANetwork 1500
mtu Internet 1500
mtu AAAA 1500
ip verify reverse-path interface Internet
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any AAAANetwork
icmp permit any AAAA
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
nat (AAAANetwork) 0 access-list inside_outbound_nat0_acl
access-group ABCD in interface AAAA
route AAAA 0.0.0.0 0.0.0.0 X.X.99.251 1 track 1
route Internet 0.0.0.0 0.0.0.0 Y.X.176.181 254
timeout xlate 0:30:00
timeout conn 0:30:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
no snmp-server location
no snmp-server contact
no snmp-server enable
sla monitor 123
type echo protocol ipIcmpEcho X.X.99.251 interface Internet
num-packets 3
frequency 10
sla monitor schedule 123 life forever start-time now
crypto ipsec transform-set ABCDAAAA esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map AAAA 10 match address crypto10
crypto map AAAA 10 set peer X.X.99.3
crypto map AAAA 10 set transform-set ABCDAAAA
crypto map AAAA 10 set security-association lifetime seconds 28800
crypto map AAAA 10 set security-association lifetime kilobytes 4608000
crypto map AAAA interface AAAA
crypto map Internet 20 match address crypto10
crypto map Internet 20 set peer W.X.Y.7
crypto map Internet 20 set transform-set ABCDAAAA
crypto map Internet 20 set security-association lifetime seconds 28800
crypto map Internet 20 set security-association lifetime kilobytes 4608000
crypto map Internet interface Internet
crypto isakmp enable Internet
crypto isakmp enable AAAA
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto isakmp nat-traversal 120
!
track 1 rtr 123 reachability
telnet timeout 1
ssh X.X.64.0 255.255.255.0 AAAANetwork
ssh X.X.75.0 255.255.255.0 AAAANetwork
ssh timeout 5
ssh version 2
console timeout 5
management-access AAAANetwork
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
username R1t455hadmin password tnHS05OrzbBpUHY2 encrypted
tunnel-group DefaultRAGroup ipsec-attributes
isakmp keepalive threshold 10 retry 2
tunnel-group DefaultWEBVPNGroup ipsec-attributes
isakmp keepalive threshold 10 retry 2
tunnel-group X.X.99.3 type ipsec-l2l
tunnel-group X.X.99.3 ipsec-attributes
pre-shared-key *
tunnel-group W.X.Y.7 type ipsec-l2l
tunnel-group W.X.Y.7 ipsec-attributes
pre-shared-key *
!
!
prompt hostname context
Cryptochecksum:33f8e351a984156bde2d4d4bc7dc2872
: end
hostname AAAA0101025505
domain-name ABCDOH.NET
enable password j/k0Hj6QfsuzxJi0 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
no names
name X.X.67.0 hostsville_VLAN67
name X.X.2.0 hostsville_VLAN2
name X.X.7.0 hostsville_VLAN7
name X.X.6.0 hostsville_VLAN6
name X.X.8.0 hostsville_VLAN8
name X.X.5.0 hostsville_VLAN5
name X.X.1.0 hostsville_VLAN1
name X.X.4.0 hostsville_VLAN4
name X.X.32.0 Upperxome_Subnet32
name X.X.75.0 hostsville_Vlan75
!
interface Vlan64
nameif AAAANetwork
security-level 100
ip address X.X.64.251 255.255.255.0
interface Vlan1201
nameif Internet
security-level 0
ip address Y.X.176.182 255.255.255.252
!
interface Vlan1204
nameif AAAA
security-level 0
ip address X.X.99.251 255.255.255.0
!
interface Ethernet0/0
switchport trunk allowed vlan 1200-1204
switchport mode trunk
speed 100
duplex full
!
interface Ethernet0/1
switchport access vlan 64
!
interface Ethernet0/2
switchport access vlan 64
!
interface Ethernet0/3
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
banner exec c UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You MUST have explicit permission to access and configure this device. Violations of this policy will result in disciplinary action, and may be reported to law enforcement. c
banner login c UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You MUST have explicit permission to access and configure this device. Violations of this policy will result in disciplinary action, and may be reported to law enforcement. c
banner motd c UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED. You MUST have explicit permission to access and configure this device. Violations of this policy will result in disciplinary action, and may be reported to law enforcement. c
boot system disk0:/asa804-k8.bin
ftp mode passive
clock timezone UTC -4
dns server-group DefaultDNS
domain-name ABCDOH.NET
object-group network AAAALocal
description ABCD AAAA Office
network-object X.X.64.0 255.255.255.0
object-group network AAAAgstownRemote
description Remote network list for the ABCD AAAAgstown office.
network-object X.X.2.0 255.255.255.0
network-object X.X.67.0 255.255.255.0
network-object X.X.7.0 255.255.255.0
network-object X.X.1.0 255.255.255.0
network-object X.X.5.0 255.255.255.0
network-object X.X.6.0 255.255.255.0
network-object X.X.8.0 255.255.255.0
network-object X.X.4.0 255.255.255.0
network-object X.X.32.0 255.255.255.0
network-object X.X.75.0 255.255.255.0
access-list crypto10 extended permit ip object-group AAAALocal any
access-list inside_outbound_nat0_acl extended permit ip object-group AAAALocal any
access-list ABCD extended permit icmp any any
access-list ABCD extended permit tcp host X.X.99.3 any eq 50 log
access-list ABCD extended permit tcp host X.X.99.3 any eq 51 log
access-list ABCD extended permit udp host X.X.99.3 any eq isakmp log
access-list ABCD extended permit ip host X.X.99.0 any log
access-list ABCD extended permit icmp X.X.0.0 255.255.0.0 any
access-list ABCD extended deny ip 14.2.6.0 255.255.255.0 any log
access-list ABCD extended deny ip 127.0.0.0 255.255.255.0 any log
access-list ABCD extended deny ip 10.0.0.0 255.255.255.0 any log
access-list ABCD extended deny ip 0.0.0.0 255.0.0.0 any log
access-list ABCD extended deny ip 192.168.0.0 255.255.0.0 any log
access-list ABCD extended deny ip 192.0.2.0 255.255.255.0 any log
access-list ABCD extended deny ip 169.254.0.0 255.255.0.0 any log
access-list ABCD extended deny ip 224.0.0.0 224.0.0.0 any log
access-list ABCD extended deny ip host 255.255.255.255 any log
access-list ABCD extended deny icmp any any echo log
access-list ABCD extended deny icmp any any redirect log
access-list ABCD extended deny icmp any any mask-request log
access-list ABCD extended permit ip host X.X.75.0 interface AAAANetwork log
access-list nonatInet extended permit ip object-group AAAALocal any
access-list ABCD_Internet extended permit icmp any any
access-list ABCD_Internet extended permit tcp host W.X.Y.7 any eq 50 log
access-list ABCD_Internet extended permit tcp host W.X.Y.7 any eq 51 log
access-list ABCD_Internet extended permit udp host W.X.Y.7 any eq isakmp log
access-list ABCD_Internet extended permit ip host W.X.Y.0 any
access-list ABCD_Internet extended deny ip 14.2.6.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 127.0.0.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 10.0.0.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 0.0.0.0 255.0.0.0 any log
access-list ABCD_Internet extended deny ip 192.168.0.0 255.255.0.0 any log
access-list ABCD_Internet extended deny ip 192.0.2.0 255.255.255.0 any log
access-list ABCD_Internet extended deny ip 169.254.0.0 255.255.0.0 any log
access-list ABCD_Internet extended deny ip 224.0.0.0 224.0.0.0 any log
access-list ABCD_Internet extended deny ip host 255.255.255.255 any log
access-list ABCD_Internet extended deny icmp any any echo log
access-list ABCD_Internet extended deny icmp any any redirect log
access-list ABCD_Internet extended deny icmp any any mask-request log
access-list ABCD_Internet extended deny udp any any log
pager lines 24
logging console debugging
logging monitor warnings
logging buffered debugging
logging asdm informational
mtu AAAANetwork 1500
mtu Internet 1500
mtu AAAA 1500
ip verify reverse-path interface Internet
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any AAAANetwork
icmp permit any AAAA
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
nat (AAAANetwork) 0 access-list inside_outbound_nat0_acl
access-group ABCD in interface AAAA
route AAAA 0.0.0.0 0.0.0.0 X.X.99.251 1 track 1
route Internet 0.0.0.0 0.0.0.0 Y.X.176.181 254
timeout xlate 0:30:00
timeout conn 0:30:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
no snmp-server location
no snmp-server contact
no snmp-server enable
sla monitor 123
type echo protocol ipIcmpEcho X.X.99.251 interface Internet
num-packets 3
frequency 10
sla monitor schedule 123 life forever start-time now
crypto ipsec transform-set ABCDAAAA esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map AAAA 10 match address crypto10
crypto map AAAA 10 set peer X.X.99.3
crypto map AAAA 10 set transform-set ABCDAAAA
crypto map AAAA 10 set security-association lifetime seconds 28800
crypto map AAAA 10 set security-association lifetime kilobytes 4608000
crypto map AAAA interface AAAA
crypto map Internet 20 match address crypto10
crypto map Internet 20 set peer W.X.Y.7
crypto map Internet 20 set transform-set ABCDAAAA
crypto map Internet 20 set security-association lifetime seconds 28800
crypto map Internet 20 set security-association lifetime kilobytes 4608000
crypto map Internet interface Internet
crypto isakmp enable Internet
crypto isakmp enable AAAA
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto isakmp nat-traversal 120
!
track 1 rtr 123 reachability
telnet timeout 1
ssh X.X.64.0 255.255.255.0 AAAANetwork
ssh X.X.75.0 255.255.255.0 AAAANetwork
ssh timeout 5
ssh version 2
console timeout 5
management-access AAAANetwork
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
username R1t455hadmin password tnHS05OrzbBpUHY2 encrypted
tunnel-group DefaultRAGroup ipsec-attributes
isakmp keepalive threshold 10 retry 2
tunnel-group DefaultWEBVPNGroup ipsec-attributes
isakmp keepalive threshold 10 retry 2
tunnel-group X.X.99.3 type ipsec-l2l
tunnel-group X.X.99.3 ipsec-attributes
pre-shared-key *
tunnel-group W.X.Y.7 type ipsec-l2l
tunnel-group W.X.Y.7 ipsec-attributes
pre-shared-key *
!
!
prompt hostname context
Cryptochecksum:33f8e351a984156bde2d4d4bc7dc2872
: end