Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the post-smtp domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/cloudrun.co.uk/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the breadcrumb-navxt domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/cloudrun.co.uk/public_html/wp-includes/functions.php on line 6114
Configuring Site to Site VPN from Cisco ASA to a Draytek router – Cloudrun

Configuring Site to Site VPN from Cisco ASA to a Draytek router

Walkthrough for creating a site to site VPN from a Cisco ASA firewall to a Draytek router, using ADSM. The models used were a Cisco ASA 5505 running ADSM 7.4(2) and ASA 9.2(3)3, and a Draytek 2860 series firewall/router.

Note that there is a guide on the Draytek site here: http://www.draytek.com/index.php?option=com_k2&view=item&id=2027&Itemid=293&lang=en but I found this did not have quite enough information, and besides is for an older ASA and ADSM version.

ASA Configuration

Connection Profile:

  1. Choose Wizards>>IPsec VPN Wizard
  2. Peer IP address: Enter the WAN IP of your Draytek
  3. Local network: Choose the Network Object for your inside network
  4. Remote network: Choose or add a new Network Object for the remote network (inside the Draytek)
  5. Click Next
  6. Enter a Pre-shared key
  7. Click Next
  8. Check the box for NAT exempt (you will get asymmetric NAT errors if you do not choose this).
  9. When finished, edit the Connection profile, and under IKE v1 change the IPsec proposal to just ESP-3DES-SHA
  10. On IKE v2 choose 3DES
ASAK_IKE1
ASAK_IKE2

Access Rule:

  1. On Access Rules, click Add:
    • Interface: Inside
    • Source: Choose your inside network
    • Destination: Choose your remote network behind the Draytek
  2. Add another access rule:
    • Interface: Outside
    • Source: Choose your remote network behind the Draytek
    • Destination: Choose your inside network

Draytek Configuration

  1. Click on VPN and Remote Access
  2. Click Lan to Lan
  3. Click a free Index
  4. Enter a profile name
  5. Call direction Dial-Out
  6. Dial-Out settings: Ipsec tunnel
  7. Server IP: Enter the IP of the ASA
  8. IKE Authentication Method: enter the same key you used on the ASA
  9. IPsec Security Method: Click High, then Advanced, then choose:
    1.  IKE phase 1 proposal: 3DES_SHA1_G2
    2. IKE phase 2 proposal:  3DES_SHA1
Draytek_IKE
  1. Enter the remote network settings under TCP/IP Network Settings at the bottom.

That’s it! Then try pinging something on the other side and it should dial the tunnel. I would suggest using the logging on the ASA to troubleshoot issues, since it is more comprehensive that the syslog on the Draytek. The most common reasons for the tunnel not coming up are the phase 1 and phase 2 settings, so make sure that these match on both sides.

Posted in Networking

3 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.