GCP VPN Tunnel Troubleshooting
What to look for when you're experiencing issues with your GCP-Orka VPN tunnel and how to perform basic troubleshooting.
Quick navigation
You are here in the workflow: GCP-Orka Connections | 1. GCP Side of the VPN Tunnel | 2. GCP. VPN Tunnel Configuration File | 3. Orka Side of the GCP VPN Tunnel | 4. Verifying the GCP VPN Tunnel | GCP VPN Tunnel Troubleshooting
On this page, jump to: Unrecognized interface during the Cisco ASA/ASAv configuration | The tunnel is connected but there's no traffic between GCP and Orka | There's traffic from GCP to Orka but you cannot access GCP from Orka | Troubleshooting
Unrecognized interface during the Cisco ASA/ASAv configuration
Sometimes, the command line interface might return ERROR: unable to find interface “outside”
. The command-line interface might be case-sensitive and you might need to preserve the capitalization of the Orka network configuration as provided in the IP Plan.
- Clean up the ASA configuration.
For more information, see Cleaning up the ASA/ASAv configuration. - Rename
outside
in your configuration toOutside
. - Re-run the complete configuration in Cisco ASDM-IDM.
For more information, see Setting Up the Orka Side of the Site-to-Site VPN.
The tunnel is connected but there's no traffic between GCP and Orka
If GCP shows that the tunnel is Established
but there is no visibility and connectivity between the two clouds, it might be because of some common mistakes when preparing the configuration. Check for the following in the site-to-site VPN configuration. For more information, see Preparing the VPN Configuration for Input into Cisco ASA/ASAv.
- Verify that your
{ shared_key }
is correct. The{ shared_key }
in the configuration must match the key set for the VPN connection. - Verify that you've replaced
{ macstadium_network_address }
and{ macstadium_network_mask }
with the correct values for thePrivate-1
network from your IP Plan. - Verify that you've configured the NAT exemption rule properly.
- The host and subnet mask required for
ONPREM-NET
are the host and mask forPrivate-1
network from your IP Plan. - The host and subnet mask required for
GCP-NET
are the host and mask for your GCP virtual network. You need to convert the subnet mask bit notation to the correct subnet mask (e.g., the/16
notation converts to a255.255.0.0
subnet mask). - The values in the brackets after
nat
must be thePrivate-1
, followed byOutside
.
- The host and subnet mask required for
To resolve any of the listed common problems with the Cisco ASA/ASAv configuration, complete the following steps:
- Clean up the firewall configuration..
- Make the necessary changes to the configuration.
- Re-run the complete configuration in Cisco ASDM-IDM.
There's traffic from GCP to Orka but you cannot access GCP from Orka
Sometimes, you might be able to establish an SSH connection from GCP to Orka but you might not be able to see or access GCP from Orka. This might be due to any of the following issues:
- The GCP firewall is not configured to allow ingress traffic.
For information about how to enable ingress traffic, see Google Cloud Documentation: Configuring firewall rules > Example configurations. - Your GCP instances don't allow OS login.
For more information about user login on GCP instances, see Google Cloud Documentation: Setting up and configuring OS Login.
Troubleshooting
Cleaning up the ASAv configuration
Sometimes, you might need to clean up the Cisco ASAv configuration and start over.
- Verify that you are connected via VPN to your Orka cluster.
- Run Cisco ASDM-IDM and log in to the firewall.
- In the Cisco ASDM-IDM application toolbar, select Tools > Command Line Interface....
- Select Single Line.
- Run the following commands one by one, clicking Send in between. Replace the placeholders with their respective values. Use Table 1: Placeholders for reference.
clear configure tunnel-group { gcp_vpn_ip }
clear configure group-policy gcp
clear configure access-list gcp-in
clear configure access-list gcp-acl
clear configure access-list gcp-filter
clear configure crypto map gcp-vpn-map
clear configure crypto ipsec ikev2 ipsec-proposal gcp
no nat ({ macstadium_network_name },{ macstadium_outside_interface }) 1 source static ONPREM-NET ONPREM-NET destination static GCP-NET GCP-NET
no object-group network GCP-NET
no object-group network ONPREM-NET
Table 1: Placeholders
More troubleshooting by Google
Google Cloud Documentation: Cloud VPN Troubleshooting
More troubleshooting by Cisco
Updated 12 months ago