Having an issue with a meraki and an ASA site to site. When i first built tunnel it showed up, both green on meraki and showing MM_active in the crypto sa on the ASA. But Still can't talk to devices behind the asa. And periodically when I check asa vpn status it shows red, but when i try to ping something behind the asa i get 100% loss but the tunnel will then show green. Not sure if its an issue with meraki and using summarized subnets or something else. Anyone have experience with this?
Your interesting subnets on the ASA need to exactly match the interesting subnets on the MX. If you need to restrict access across the tunnel, use the VPN firewall rules. Please note that you can only set VPN firewall rules for outbound traffic.
That "no tunnel, ping 100% loss, then tunnel comes up" could be the tunnel dying due to lack of traffic. You send traffic, tunnel comes up. What's the status on the ASA when the tunnel shows as down on the MX side?
Your interesting subnets on the ASA need to exactly match the interesting subnets on the MX. If you need to restrict access across the tunnel, use the VPN firewall rules. Please note that you can only set VPN firewall rules for outbound traffic.
That "no tunnel, ping 100% loss, then tunnel comes up" could be the tunnel dying due to lack of traffic. You send traffic, tunnel comes up. What's the status on the ASA when the tunnel shows as down on the MX side?
Yes this is the doc I used. Currently there are a bunch of asa to asa site to sites so there was already an object group created for the asa subsets but they are summarized in a /15. Like the 10.0.0.0/15 actually has 10.0.3.0/24 and 10.0.4.0/24.
Is routing setup correctly? As in, the devices behind the MX have the MX as next hop for the subnet at the other end of the tunnel or as the default gateway? Inversely on the ASA?
the meraki is the DFGW for all the subnets of the meraki side. The meraki should make those uplink decisions correct? I'm trying to test right from the meraki mx pinging a host behind asa
You don't need an explicit route for VPN on ASA. The access list and crypto map take care of that when properly configured.
You do need to setup an access list that permits VPN traffic inbound/outbound, or whitelist all VPN traffic. You can do so on ASDM -- this is the option on the site-to-site vpn tab labeled "Bypass interface access lists for inbound VPN sessions".