StaplesMan
Technical User
The following is the result of a show crypto session command. I am now creating ezvpn connections with Dynamic tunnel interfaces on the hub side. The client side is mode network-extension. VPNs connect just fine but after awhile of non use it seems one of my locations disconnects and then reconnects all the time. But does not clear out correctly because I get this double connection as seen below. You will notice that the link to peer 64.92.144.xxx is connected twice one in a UP-NO-IKE state and the other in a UP-ACTIVE state. At this time I can not pass data but if I clear out the UP-NO-IKE then by using clear crypto session then all works good again until the next reconnection and it's back. UP-NO-IKE! After search hi and low I can not find any ware what in the world UP-NO-IKE is telling me. I know a full config will be helpful in figuring out the problem but before I go into the trouble of Getting it all cleaned up for publishing I thought it would be good to get info on this message first.
NOTE the username bob VPN has no problems but it's on a better internet connection and I feel the seth connection has more doped packets. And in turn is connection the reconnections.
NOTE2 if IPs seem confusing below keep in mind both sides are nated before reaching the internet. Seems to have not caused any problem with former VPN connection as noted on post:
Crypto session current status
Interface: Virtual-Access4
Session status: UP-NO-IKE
Peer: 64.92.144.xxx port 51393
IPSEC FLOW: permit ip 192.168.78.0/255.255.255.0 192.168.11.0/255.255.255.0
Active SAs: 2, origin: crypto map
Interface: Virtual-Access3
Username: bob
Profile: myisakmpprofile
Group: Family
Session status: UP-ACTIVE
Peer: 173.23.91.2xx port 4500
IKE SA: local 192.168.7.2/4500 remote 173.23.91.1xx/4500 Active
IPSEC FLOW: permit ip 192.168.78.0/255.255.255.0 192.168.12.0/255.255.255.0
Active SAs: 2, origin: crypto map
Interface: Virtual-Access6
Username: seth
Profile: myisakmpprofile
Group: Family
Session status: UP-ACTIVE
Peer: 64.92.144.xxx port 51413
IKE SA: local 192.168.7.2/4500 remote 64.92.144.xxx/51413 Active
IPSEC FLOW: permit ip 192.168.78.0/255.255.255.0 192.168.11.0/255.255.255.0
Active SAs: 2, origin: crypto map
CCNA, A+, HP Certified Professional
NOTE the username bob VPN has no problems but it's on a better internet connection and I feel the seth connection has more doped packets. And in turn is connection the reconnections.
NOTE2 if IPs seem confusing below keep in mind both sides are nated before reaching the internet. Seems to have not caused any problem with former VPN connection as noted on post:
Crypto session current status
Interface: Virtual-Access4
Session status: UP-NO-IKE
Peer: 64.92.144.xxx port 51393
IPSEC FLOW: permit ip 192.168.78.0/255.255.255.0 192.168.11.0/255.255.255.0
Active SAs: 2, origin: crypto map
Interface: Virtual-Access3
Username: bob
Profile: myisakmpprofile
Group: Family
Session status: UP-ACTIVE
Peer: 173.23.91.2xx port 4500
IKE SA: local 192.168.7.2/4500 remote 173.23.91.1xx/4500 Active
IPSEC FLOW: permit ip 192.168.78.0/255.255.255.0 192.168.12.0/255.255.255.0
Active SAs: 2, origin: crypto map
Interface: Virtual-Access6
Username: seth
Profile: myisakmpprofile
Group: Family
Session status: UP-ACTIVE
Peer: 64.92.144.xxx port 51413
IKE SA: local 192.168.7.2/4500 remote 64.92.144.xxx/51413 Active
IPSEC FLOW: permit ip 192.168.78.0/255.255.255.0 192.168.11.0/255.255.255.0
Active SAs: 2, origin: crypto map
CCNA, A+, HP Certified Professional