<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2921 router working example of a route-map - NEEDED in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3830102#M312575</link>
    <description>&lt;P&gt;A RTR will ping the other router through the tunnel even if there is not PC hanging off the end.&amp;nbsp; I didn't know that a router is building it each time when traffic is presented.&amp;nbsp; I just looked like it was up all the time.&amp;nbsp; There are no ACLs on the interfaces so sourcing is not needed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;FROM 192.168.175.1 outside 192.168.168.235&lt;/P&gt;&lt;P&gt;remotertr175#ping 192.168.176.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.176.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;remotertr175#ping 192.168.177.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.177.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;remotertr175#sh cry ipsec sa&lt;/P&gt;&lt;P&gt;local ident (addr/mask/prot/port): (192.168.175.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (192.168.176.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;local crypto endpt.: 192.168.168.235, remote crypto endpt.: 192.168.168.236&lt;/P&gt;&lt;P&gt;local ident (addr/mask/prot/port): (192.168.175.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (192.168.177.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;local crypto endpt.: 192.168.168.235, remote crypto endpt.: 192.168.168.237&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Apr 2019 17:21:38 GMT</pubDate>
    <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
    <dc:date>2019-04-01T17:21:38Z</dc:date>
    <item>
      <title>2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828089#M312362</link>
      <description>&lt;P&gt;Hi does anyone have an example of a route-map that works on a 2921?&amp;nbsp; I have an issue with PAT and L3 tunnel that I'm hoping that route-map will help.&lt;/P&gt;&lt;P&gt;1) The L3 tunnel shows up at the distant end as the outside address instead of the private address.&lt;/P&gt;&lt;P&gt;2) The PAT blocks the inside address:port from working&amp;nbsp; through the L3 tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the L3 tunnel and the route-map that did not work &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&amp;nbsp; Thanks for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;==================--------------===========================&lt;BR /&gt;================== route-map ===========================&lt;BR /&gt;==================--------------===========================&lt;/P&gt;&lt;P&gt;ip nat source static tcp 192.168.175.4 80 192.168.168.235 8888 route-map NONAT&lt;/P&gt;&lt;P&gt;access-list 177 deny ip host 192.168.175.4 192.168.177.0 0.0.0.255&lt;BR /&gt;access-list 177 permit ip host 192.168.175.4 any&lt;/P&gt;&lt;P&gt;route-map NONAT permit 10&lt;BR /&gt;match ip address 177&lt;/P&gt;&lt;P&gt;remotertr175(config)#ip nat source static tcp 192.168.175.4 80 192.168.168.235$&lt;BR /&gt;ip nat source static tcp 192.168.175.4 80 192.168.168.235 8888 route-map NONAT&lt;BR /&gt;^&lt;BR /&gt;% Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;remotertr175(config)#ip nat source static tcp 192.168.175.4 80 192.168.168.235 8888 ?&lt;BR /&gt;extendable Extend this translation when used&lt;BR /&gt;no-alias Do not create an alias for the global address&lt;BR /&gt;no-payload No translation of embedded address/port in the payload&lt;BR /&gt;vrf Specify vrf&lt;BR /&gt;&amp;lt;cr&amp;gt;&lt;/P&gt;&lt;P&gt;==================--------------===========================&lt;BR /&gt;================== IPSEC Tunnel ===========================&lt;BR /&gt;==================--------------===========================&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;BR /&gt;encr 3des&lt;BR /&gt;hash md5&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 2&lt;BR /&gt;crypto ipsec transform-set TS esp-3des esp-md5-hmac&lt;BR /&gt;mode tunnel&lt;BR /&gt;crypto isakmp key firewallcx address 192.168.168.236&lt;BR /&gt;!&lt;BR /&gt;crypto map CMAP 76 ipsec-isakmp&lt;BR /&gt;set peer 192.168.168.236&lt;BR /&gt;set transform-set TS&lt;BR /&gt;match address VPN_TRAFFIC_176&lt;BR /&gt;!&lt;BR /&gt;ip route 192.168.176.0 255.255.255.0 192.168.168.236&lt;BR /&gt;ip access-list extended VPN_TRAFFIC_176&lt;BR /&gt;permit tcp 192.168.175.0 0.0.0.255 192.168.176.0 0.0.0.255&lt;BR /&gt;permit ip 192.168.175.0 0.0.0.255 192.168.176.0 0.0.0.255&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 14:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828089#M312362</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-03-28T14:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828107#M312364</link>
      <description>&lt;P&gt;I am not clear what is going on here. But I believe that the immediate issue is that you are doing a static translation and trying to control it with a route map. But when you use on line help (the ?) it does not show an option for a route map or an access list when doing static translation. I have seen the access list or route map to control translation when it was dynamic translation but not for static translation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a side note there is a redundancy in the acl you are using to identify vpn traffic&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;permit tcp 192.168.175.0 0.0.0.255 192.168.176.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;permit ip 192.168.175.0 0.0.0.255 192.168.176.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;There is no need to identify tcp traffic if you are then going to permit all ip traffic for those addresses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 14:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828107#M312364</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-03-28T14:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828151#M312369</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's not clear exactly what you are trying to do but if you want to use a route map with a static NAT then you cannot use&amp;nbsp; "ip nat source"&amp;nbsp;&lt;SPAN style="font-family: inherit;"&gt;you need to use "ip nat &amp;lt;inside|outside&amp;gt; source" syntax.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 15:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828151#M312369</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2019-03-28T15:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828152#M312370</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in addition to Richards's remarks, it would be useful to see the full configurations of both sides. Right now, it does not look like the NAT exclusion ACL and the crypto map ACL are mirrors of each other...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if possible post the entire configs of both ends...&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 15:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828152#M312370</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2019-03-28T15:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828273#M312383</link>
      <description>&lt;P&gt;Hi Rick, OH &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&amp;nbsp; That's why there is only a route map on a RTR as follows.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But why does the ipsec tunnel come out the other end with a SOURCE IP ADDRESS of the outside address instead of the originating private 192.168.176.x address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FOLLOWS HERE&lt;/P&gt;&lt;P&gt;# ip nat source route-map ...&lt;/P&gt;&lt;P&gt;Then it does:&lt;/P&gt;&lt;P&gt;# ip nat source route-map MYRMAP interface&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;# ip nat source route-map MYRMAP pool&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 17:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828273#M312383</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-03-28T17:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828277#M312384</link>
      <description>&lt;P&gt;I had the redundancy in because I was going to lock it down to tcp only.&amp;nbsp; But I never got this to work properly on the 2921 so I got it working on an ASA.&amp;nbsp; So I guess that I'm stuck with an ASA, I prefer routers.&amp;nbsp; ASA will not ping through a tunnel, it has to see "interesting" traffic before it brings up the tunnel &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 17:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828277#M312384</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-03-28T17:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828355#M312386</link>
      <description />
      <pubDate>Mon, 01 Apr 2019 17:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828355#M312386</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-04-01T17:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828396#M312388</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="L2_L3_PAT_cropped.png" style="width: 742px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/33218iABF932BECD3A490C/image-size/large?v=v2&amp;amp;px=999" role="button" title="L2_L3_PAT_cropped.png" alt="L2_L3_PAT_cropped.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 12:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828396#M312388</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-03-29T12:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828405#M312390</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still not entirely sure what you are looking to do but have a look at this thread for an example of using a route map with a static NAT and a VPN tunnel -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/routing/ipsec-with-ip-nat-inside-source-static/td-p/2689248" target="_self"&gt;https://community.cisco.com/t5/routing/ipsec-with-ip-nat-inside-source-static/td-p/2689248&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;there is no reason why it would not work on your router as far as I know.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 18:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828405#M312390</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2019-03-28T18:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828409#M312391</link>
      <description>&lt;P&gt;Perhaps I am not understanding correctly what you are saying here&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ASA will not ping through a tunnel, it has to see "interesting" traffic before it brings up the tunnel &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;It is a common behavior on both router and ASA that it needs to see "interesting" traffic to bring up the tunnel. Perhaps you are referring to the fact that the router has the ability to ping and to specify the source address of the ping?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 18:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828409#M312391</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-03-28T18:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828412#M312392</link>
      <description>&lt;P&gt;I am not clear about this statement&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But why does the ipsec tunnel come out the other end with a SOURCE IP ADDRESS of the outside address instead of the originating private 192.168.176.x address?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;My best guess at this point is that there is an issue at the other peer and it is doing address translation on the vpn traffic where the vpn traffic should be exempted from translation. Perhaps you could post from the remote peer the crypto map, the acl used to identify traffic for encryption, and any of the config for address translation?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 18:33:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828412#M312392</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-03-28T18:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828484#M312402</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;I followed your example.&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.175.3 80 192.168.168.235 8888 route-map NO_NAT_192.168.177.0&lt;/P&gt;&lt;P&gt;route-map NO_NAT_192.168.177.0 deny 10&lt;BR /&gt;match ip address DENY_NAT_192.168.177.0&lt;/P&gt;&lt;P&gt;ip access-list extended DENY_NAT_192.168.177.0&lt;BR /&gt;deny ip 192.168.177.0 0.0.0.255 192.168.175.0 0.0.0.255&lt;BR /&gt;deny ip 192.168.175.0 0.0.0.255 192.168.177.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I realized that what I'm doing is Port Mapping an http call from the outside external WAN address and translating it to an inside host address and port.&amp;nbsp; Looks like route-map is only available for inside to outside.&amp;nbsp; There is an "add-route" for outside to inside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So at first I tried this: ==========================================&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.175.3 80 192.168.168.235 8888 route-map NO_NAT_192.168.177.0&lt;/P&gt;&lt;P&gt;route-map NO_NAT_192.168.177.0 deny 10&lt;BR /&gt;match ip address DENY_NAT_192.168.177.0&lt;/P&gt;&lt;P&gt;ip access-list extended DENY_NAT_192.168.177.0&lt;BR /&gt;deny ip 192.168.177.0 0.0.0.255 192.168.175.0 0.0.0.255&lt;BR /&gt;deny ip 192.168.175.0 0.0.0.255 192.168.177.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Realized my mistake and tried this: ====================================&lt;/P&gt;&lt;P&gt;remotertr175(config)# ip nat outside source static tcp 192.168.175.177 80 192.168.168.235 8888 route-map NO_NAT_192.168.177.0 ?&lt;BR /&gt;% Unrecognized command&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;remotertr175(config)#$ ip nat outside source static tcp 192.168.175.177 80 192.168.168.235 8888 ?&lt;BR /&gt;add-route Add a static route for outside local address&lt;BR /&gt;extendable Extend this translation when used&lt;BR /&gt;no-alias Do not create an alias for the local address&lt;BR /&gt;no-payload No translation of embedded address/port in the payload&lt;BR /&gt;redundancy NAT redundancy operation&lt;BR /&gt;vrf Specify vrf&lt;BR /&gt;&amp;lt;cr&amp;gt;&lt;/P&gt;&lt;P&gt;remotertr175(config)#ip nat outside source static tcp 192.168.175.177 80 192.$&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 20:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828484#M312402</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-03-28T20:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828768#M312450</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Static NAT works in both directions so if the inside IP is 192.168.175.3 and the outside IP is 192.168.168.235 then "ip nat inside" is the correct syntax.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note the above IPs would be the destination IPs in the packet ie. the destination IP on the outside would be 192.168.168.235 port 8888 and you would be translating this to the destination IP on the inside of 192.168.175.3 port 80.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 09:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828768#M312450</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2019-03-29T09:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828937#M312457</link>
      <description>&lt;P&gt;I gave it my best shot and it did not work, there are no hits through the NAT at port 8888 from an outside PC showing in a tcpdump on the http server at 192.168.175.3.&amp;nbsp; Here is the NAT.&amp;nbsp; There must be something wrong with the NAT....&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.175.3 80 192.168.168.235 8888 route-map NO_NAT_192.168.176.0&lt;/P&gt;&lt;P&gt;route-map NO_NAT_192.168.176.0 deny 10&lt;BR /&gt;match ip address DENY_NAT_192.168.176.0&lt;/P&gt;&lt;P&gt;ip access-list extended DENY_NAT_192.168.176.0&lt;BR /&gt;deny ip 192.168.176.0 0.0.0.255 192.168.175.0 0.0.0.255&lt;BR /&gt;deny ip 192.168.175.0 0.0.0.255 192.168.176.0 0.0.0.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a tcpdump through the tunnel to 192.168.175.3 80 from 192.168.176.4&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@studio1:/home/vbox# tcpdump -n | grep 192.168.176&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on enp0s31f6, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;10:43:33.948698 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [S], seq 1417375719, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0&lt;BR /&gt;10:43:33.948766 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [S.], seq 427422819, ack 1417375720, win 28120, options [mss 1406,nop,nop,sackOK,nop,wscale 7], length 0&lt;BR /&gt;10:43:33.949914 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [.], ack 1, win 16520, length 0&lt;BR /&gt;10:43:33.950376 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [P.], seq 1:455, ack 1, win 16520, length 454: HTTP: GET / HTTP/1.1&lt;BR /&gt;10:43:33.950469 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [.], ack 455, win 229, length 0&lt;BR /&gt;10:43:33.953324 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [.], seq 1:1407, ack 455, win 229, length 1406: HTTP: HTTP/1.1 200 OK&lt;BR /&gt;10:43:33.953337 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [.], seq 1407:2813, ack 455, win 229, length 1406: HTTP&lt;BR /&gt;10:43:33.953341 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [P.], seq 2813:3478, ack 455, win 229, length 665: HTTP&lt;BR /&gt;10:43:33.957883 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [.], ack 3478, win 16520, length 0&lt;BR /&gt;10:43:33.970768 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [P.], seq 455:866, ack 3478, win 16520, length 411: HTTP: GET /icons/ubuntu-logo.png HTTP/1.1&lt;BR /&gt;10:43:33.971458 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [P.], seq 3478:3658, ack 866, win 237, length 180: HTTP: HTTP/1.1 304 Not Modified&lt;BR /&gt;10:43:34.171807 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [.], ack 3658, win 16475, length 0&lt;BR /&gt;10:43:38.958501 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [F.], seq 3658, ack 866, win 237, length 0&lt;BR /&gt;10:43:38.959965 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [.], ack 3659, win 16475, length 0&lt;BR /&gt;10:43:38.960024 IP 192.168.176.4.60008 &amp;gt; 192.168.175.3.80: Flags [F.], seq 866, ack 3659, win 16475, length 0&lt;BR /&gt;10:43:38.960051 IP 192.168.175.3.80 &amp;gt; 192.168.176.4.60008: Flags [.], ack 867, win 237, length 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------================================----------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Point of interest&lt;/FONT&gt;&lt;/STRONG&gt;, I had a relic L3 tunnel setup on the 2921 for 192.168.172.0 and noticed that "cry ipsec sa" was showing something up - I happened to reuse 192.168.172.0 on an ASA 5520 which is also connect to the "outside" switch.&amp;nbsp; So I put in the mirror L3 tunnel on the ASA and guess what?&amp;nbsp; The tunnel is up (after I added the route statement :-)).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry still looking into this....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------================================----------------------------&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 15:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828937#M312457</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-03-29T15:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828950#M312458</link>
      <description>&lt;P&gt;I believe that there are 2 issues with the route map and acl as you have posted them&lt;/P&gt;
&lt;P&gt;route-map NO_NAT_192.168.176.0 deny 10&lt;BR /&gt;match ip address DENY_NAT_192.168.176.0&lt;/P&gt;
&lt;P&gt;ip access-list extended DENY_NAT_192.168.176.0&lt;BR /&gt;deny ip 192.168.176.0 0.0.0.255 192.168.175.0 0.0.0.255&lt;BR /&gt;deny ip 192.168.175.0 0.0.0.255 192.168.176.0 0.0.0.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first issue is that your route map statement is a deny and the acl that it references is also deny statements. If the route map statement is a deny then the acl statements must be permit if the traffic is not to be translated.&lt;/P&gt;
&lt;P&gt;The second issue is that the route map is not permitting any traffic. Seems to me that after denying what should not be translated there should be something to permit and translate other traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 15:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3828950#M312458</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-03-29T15:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829023#M312462</link>
      <description>&lt;P&gt;This may give some insight into why the 5520 works and the 2921 doesn't.&lt;/P&gt;&lt;P&gt;Here is an IPSEC tunnel between a ASA 5520 and RTR 2921.&amp;nbsp; Note how the 2921 comes out of the tunnel with the outside address, but the 5520 uses the inside addresses.&amp;nbsp; Attached are the configurations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MY GUESS IS THAT ENCRYPTION IS NOT BEING DONE!!!!!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;----------------------------================================------------------------------&lt;BR /&gt;SESSION 1 is the ASA ((GOOD)) pinging the RTR through the L3 tunnel. Note that the RTR outside WAN interface is used.&lt;BR /&gt;----------------------========================================------------------------------------&lt;BR /&gt;SESSION 11111111111111111111111111111 LOOK AT BOTH SIDES 111111111111111111111111111111111111111&lt;BR /&gt;INITIATE FROM PC 192.168.172.6 on ASA 5520 FIREWALL (inside 192.168.172.1 outside 192.168.168.232)&lt;BR /&gt;- to PC 192.168.175.3 on RTR 2921 (inside 192.168.175.1 outside 192.168.168.235)&lt;/P&gt;&lt;P&gt;[root@drupal ahuffman]# ip addr | grep 192&lt;BR /&gt;inet 192.168.172.6/24 brd 192.168.172.255 scope global p1p1&lt;BR /&gt;[root@drupal ahuffman]#&lt;/P&gt;&lt;P&gt;[root@drupal ahuffman]# ping 192.168.175.3&lt;BR /&gt;PING 192.168.175.3 (192.168.175.3) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=1 ttl=63 time=1.55 ms &amp;lt;-----------------look at WAN address&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=2 ttl=63 time=1.22 ms&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=3 ttl=63 time=1.24 ms&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=4 ttl=63 time=1.23 ms&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=5 ttl=63 time=1.22 ms&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=6 ttl=63 time=1.27 ms&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=7 ttl=63 time=1.25 ms&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=8 ttl=63 time=1.23 ms&lt;BR /&gt;64 bytes from 192.168.168.235: icmp_seq=9 ttl=63 time=1.30 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 192.168.175.3 ping statistics ---&lt;BR /&gt;9 packets transmitted, 9 received, 0% packet loss, time 8431ms&lt;BR /&gt;rtt min/avg/max/mdev = 1.225/1.283/1.554/0.109 ms&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[root@drupal ahuffman]# tcpdump -i p1p1 | grep ICMP&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on p1p1, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;BR /&gt;12:12:56.790530 IP 192.168.172.6 &amp;gt; 192.168.175.3: ICMP echo request, id 4727, seq 77, length 64&lt;BR /&gt;12:12:56.791760 IP 192.168.168.235 &amp;gt; 192.168.172.6: ICMP echo reply, id 4727, seq 77, length 64&lt;BR /&gt;12:12:57.792034 IP 192.168.172.6 &amp;gt; 192.168.175.3: ICMP echo request, id 4727, seq 78, length 64&lt;BR /&gt;12:12:57.793236 IP 192.168.168.235 &amp;gt; 192.168.172.6: ICMP echo reply, id 4727, seq 78, length 64&lt;BR /&gt;12:12:58.793594 IP 192.168.172.6 &amp;gt; 192.168.175.3: ICMP echo request, id 4727, seq 79, length 64&lt;BR /&gt;12:12:58.794818 IP 192.168.168.235 &amp;gt; 192.168.172.6: ICMP echo reply, id 4727, seq 79, length 64&lt;BR /&gt;^C72 packets captured&lt;BR /&gt;1163 packets received by filter&lt;BR /&gt;1066 packets dropped by kernel&lt;/P&gt;&lt;P&gt;[root@drupal ahuffman]#&lt;/P&gt;&lt;P&gt;----------------------========================================------------------------------------&lt;BR /&gt;SESSION 11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111&lt;/P&gt;&lt;P&gt;INCOMING FROM PC 192.168.172.6 on ASA 5520 FIREWALL (inside 192.168.172.1 outside 192.168.168.232)&lt;BR /&gt;- to PC 192.168.175.3 on RTR 2921 (inside 192.168.175.1 outside 192.168.168.235)&lt;/P&gt;&lt;P&gt;vmuser@studio1:~$ ip addr | grep 192&lt;BR /&gt;inet 192.168.175.3/24 brd 192.168.175.255 scope global dynamic noprefixroute enp0s31f6&lt;BR /&gt;vmuser@studio1:~$&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;root@studio1:/home/vbox# tcpdump -n | grep ICMP&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on enp0s31f6, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;12:44:57.215052 IP 192.168.168.232 &amp;gt; 192.168.175.3: ICMP echo request, id 45177, seq 1, length 64&lt;BR /&gt;12:44:57.215108 IP 192.168.175.3 &amp;gt; 192.168.168.232: ICMP echo reply, id 45177, seq 1, length 64&lt;BR /&gt;12:44:58.216693 IP 192.168.168.232 &amp;gt; 192.168.175.3: ICMP echo request, id 45177, seq 2, length 64&lt;BR /&gt;12:44:58.216750 IP 192.168.175.3 &amp;gt; 192.168.168.232: ICMP echo reply, id 45177, seq 2, length 64&lt;BR /&gt;12:44:59.218147 IP 192.168.168.232 &amp;gt; 192.168.175.3: ICMP echo request, id 45177, seq 3, length 64&lt;BR /&gt;12:44:59.218203 IP 192.168.175.3 &amp;gt; 192.168.168.232: ICMP echo reply, id 45177, seq 3, length 64&lt;BR /&gt;12:45:00.219657 IP 192.168.168.232 &amp;gt; 192.168.175.3: ICMP echo request, id 45177, seq 4, length 64&lt;BR /&gt;12:45:00.219714 IP 192.168.175.3 &amp;gt; 192.168.168.232: ICMP echo reply, id 45177, seq 4, length 64&lt;BR /&gt;12:45:01.221156 IP 192.168.168.232 &amp;gt; 192.168.175.3: ICMP echo request, id 45177, seq 5, length 64&lt;BR /&gt;12:45:01.221214 IP 192.168.175.3 &amp;gt; 192.168.168.232: ICMP echo reply, id 45177, seq 5, length 64&lt;BR /&gt;12:45:02.222635 IP 192.168.168.232 &amp;gt; 192.168.175.3: ICMP echo request, id 45177, seq 6, length 64&lt;BR /&gt;12:45:02.222692 IP 192.168.175.3 &amp;gt; 192.168.168.232: ICMP echo reply, id 45177, seq 6, length 64&lt;BR /&gt;12:45:03.224095 IP 192.168.168.232 &amp;gt; 192.168.175.3: ICMP echo request, id 45177, seq 7, length 64&lt;BR /&gt;12:45:03.224152 IP 192.168.175.3 &amp;gt; 192.168.168.232: ICMP echo reply, id 45177, seq 7, length 64&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;----------------------------================================------------------------------&lt;BR /&gt;SESSION 2 is the RTR (((BAD))) pinging the ASA through the L3 tunnel. Note that the inside LAN address are used.&lt;BR /&gt;----------------------------================================------------------------------&lt;BR /&gt;SESSION 2222222222222222222222222222222222222222222222222222222222222222222222222222222222222&lt;BR /&gt;INITIATE FROM PC 192.168.175.3 on RTR 2921 (inside 192.168.175.1 outside 192.168.168.235)&lt;BR /&gt;- to PC 192.168.172.6 on ASA 5520 FIREWALL (inside 192.168.172.1 outside 192.168.168.232)&lt;/P&gt;&lt;P&gt;vmuser@studio1:~$&lt;BR /&gt;vmuser@studio1:~$ ip addr | grep 192&lt;BR /&gt;inet 192.168.175.3/24 brd 192.168.175.255 scope global dynamic noprefixroute enp0s31f6&lt;BR /&gt;vmuser@studio1:~$&lt;/P&gt;&lt;P&gt;vmuser@studio1:~$ ping 192.168.172.6&lt;BR /&gt;PING 192.168.172.6 (192.168.172.6) 56(84) bytes of data.&lt;BR /&gt;^C&lt;BR /&gt;--- 192.168.172.6 ping statistics ---&lt;BR /&gt;18 packets transmitted, 0 received, 100% packet loss, time 17405ms&lt;/P&gt;&lt;P&gt;vmuser@studio1:~$&lt;/P&gt;&lt;P&gt;root@studio1:/home/vbox# tcpdump -n | grep ICMP&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on enp0s31f6, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;12:57:03.864477 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 1, length 64&lt;BR /&gt;12:57:04.886071 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 2, length 64&lt;BR /&gt;12:57:05.910217 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 3, length 64&lt;BR /&gt;12:57:06.934276 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 4, length 64&lt;BR /&gt;12:57:07.958236 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 5, length 64&lt;BR /&gt;12:57:08.982241 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 6, length 64&lt;BR /&gt;12:57:10.006328 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 7, length 64&lt;BR /&gt;12:57:11.030221 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 8, length 64&lt;BR /&gt;12:57:12.054251 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 9, length 64&lt;BR /&gt;12:57:13.078289 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 10, length 64&lt;BR /&gt;12:57:14.101992 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 11, length 64&lt;BR /&gt;12:57:15.126255 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 12, length 64&lt;BR /&gt;12:57:16.150038 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 13, length 64&lt;BR /&gt;12:57:17.174260 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 14, length 64&lt;BR /&gt;12:57:18.198236 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 15, length 64&lt;BR /&gt;12:57:19.222293 IP 192.168.175.3 &amp;gt; 192.168.172.6: ICMP echo request, id 8642, seq 16, length 64&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------================================------------------------------&lt;BR /&gt;SESSION 3 #sh cry ipsec sa - on ASA and RTR - NOTE THAT THERE ARE NO encaps decaps SHOWING&lt;BR /&gt;----------------------------================================------------------------------&lt;BR /&gt;SESSION 33333333333333333333333333333333333333333333333333333333333333333333333333333333333333&lt;/P&gt;&lt;P&gt;ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA-ASA&lt;/P&gt;&lt;P&gt;allan@allandesk ~ $ ssh cisco@192.168.168.232&lt;BR /&gt;cisco@192.168.168.232's password:&lt;BR /&gt;Type help or '?' for a list of available commands.&lt;BR /&gt;asa172-232&amp;gt; en&lt;BR /&gt;Password: ********&lt;BR /&gt;asa172-232# sh cry ip&lt;BR /&gt;asa172-232# sh cry ipsec sa&lt;/P&gt;&lt;P&gt;There are no ipsec sas&lt;BR /&gt;asa172-232#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR-RTR&lt;/P&gt;&lt;P&gt;allan@allandesk ~ $ ssh cisco@192.168.168.235&lt;BR /&gt;Password:&lt;/P&gt;&lt;P&gt;remotertr175&amp;gt;en&lt;BR /&gt;Password:&lt;BR /&gt;remotertr175#sh cry ip&lt;BR /&gt;remotertr175#sh cry ipsec sa&lt;/P&gt;&lt;P&gt;interface: GigabitEthernet0/0&lt;BR /&gt;Crypto map tag: CMAP, local addr 192.168.168.235&lt;/P&gt;&lt;P&gt;protected vrf: (none)&lt;BR /&gt;local ident (addr/mask/prot/port): (192.168.175.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (192.168.172.0/255.255.255.0/0/0)&lt;BR /&gt;current_peer 192.168.168.232 port 500&lt;BR /&gt;PERMIT, flags={origin_is_acl,}&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;#pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;#send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: 192.168.168.235, remote crypto endpt.: 192.168.168.232&lt;BR /&gt;plaintext mtu 1500, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0&lt;BR /&gt;current outbound spi: 0x0(0)&lt;BR /&gt;PFS (Y/N): N, DH group: none&lt;BR /&gt;inbound esp sas:&lt;BR /&gt;inbound ah sas:&lt;BR /&gt;inbound pcp sas:&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;outbound ah sas:&lt;BR /&gt;outbound pcp sas:&lt;/P&gt;&lt;P&gt;protected vrf: (none)&lt;BR /&gt;local ident (addr/mask/prot/port): (192.168.175.0/255.255.255.0/6/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (192.168.172.0/255.255.255.0/6/0)&lt;BR /&gt;current_peer 192.168.168.232 port 500&lt;BR /&gt;PERMIT, flags={origin_is_acl,}&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;#pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;#send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: 192.168.168.235, remote crypto endpt.: 192.168.168.232&lt;BR /&gt;plaintext mtu 1500, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0&lt;BR /&gt;current outbound spi: 0x0(0)&lt;BR /&gt;PFS (Y/N): N, DH group: none&lt;BR /&gt;inbound esp sas:&lt;BR /&gt;inbound ah sas:&lt;BR /&gt;inbound pcp sas:&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;outbound ah sas:&lt;BR /&gt;outbound pcp sas:&lt;BR /&gt;&lt;BR /&gt;protected vrf: (none)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 14:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829023#M312462</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-04-01T14:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829107#M312475</link>
      <description>&lt;P&gt;Thanks Rick, I'll work on this Monday.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you see the cool stuff from connecting the 2921 to the 5520?&amp;nbsp; I never though that it would even connect.&amp;nbsp; Not to say that it is actually encrypted...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;remotertr175#sh ip nat nvi translations ver&lt;BR /&gt;Pro Source global Source local Destin local Destin global&lt;BR /&gt;tcp 192.168.168.235:888 192.168.174.66:80 --- ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;---------------is 8888 truncated?&lt;BR /&gt;create 08:14:50, use 00:22:08 timeout:0,&lt;BR /&gt;flags:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LOOKS TO ME LIKE inside AND outside ARE MIXED UP ?????&lt;/P&gt;&lt;P&gt;remotertr175#sh ip nat translations&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Outside global&lt;BR /&gt;tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.168.235:8888&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.175.3:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -- ---&lt;BR /&gt;remotertr175#&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 20:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829107#M312475</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-03-29T20:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829289#M312495</link>
      <description>&lt;P&gt;I have not yet looked at the configs (and will do that later). But want to comment on the output that you post here. It is interesting and unexpected.&lt;/P&gt;
&lt;P&gt;- ping from PC connected to ASA to PC connected to router is successful. (sends requests, receives responses)&lt;/P&gt;
&lt;P&gt;- ping from PC connected to ASA sees request with source and destination as the PC addresses, but sees responses with source address as the translated address of the router. PC connected to router sees the incoming request with source address as the translated address from the ASA. So the ASA is translating the source address of the outgoing request, and the router is translating the source address of the outgoing response.&lt;/P&gt;
&lt;P&gt;- ping from PC connected to router to PC connected to ASA fails. (sends requests, receives no responses)&lt;/P&gt;
&lt;P&gt;- the ASA does not show any negotiated ipsec sa. The router does show a negotiated ipsec sa. But there are no encaps and no decaps.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- so the ping traffic is not being encrypted. And it works in only one direction.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More later.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 12:00:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829289#M312495</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-03-30T12:00:19Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829348#M312508</link>
      <description>&lt;P&gt;I am not sure what is going on. But the posted configs do not match what is described. Your output describes an ASA with inside address 192.168.172.1 and outside address 192.168.168.232. The posted config for ASA has inside address 192.168.168.233 and outside address 68.106.145.92.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 17:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829348#M312508</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-03-30T17:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: 2921 router working example of a route-map - NEEDED</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829982#M312563</link>
      <description>&lt;P&gt;I tried to do just the opposite just to get the route-map to work.&amp;nbsp; It never opens the port 8888 on the outside interface?&lt;/P&gt;&lt;P&gt;I put a "deny ip any any" at the end just in case.&amp;nbsp; Still does not work.... but I can access 192.168.175.3 80 through the L3 tunnel.... :-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CORRECTION wildcard instead of netmask ---------------opposite----------BUT STILL DOES NOT WORK&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.175.3 80 192.168.168.235 8888 route-map TEST_NAT_192.168.176.0 extendable&lt;/P&gt;&lt;P&gt;route-map TEST_NAT_192.168.176.0 permit 11&lt;BR /&gt;match ip address PERMIT_NAT_192.168.176.0&lt;/P&gt;&lt;P&gt;ip access-list extended PERMIT_NAT_192.168.176.0&lt;BR /&gt;permit ip 192.168.168.0 0.0.0.255 host 192.168.175.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 15:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/2921-router-working-example-of-a-route-map-needed/m-p/3829982#M312563</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2019-04-01T15:30:30Z</dc:date>
    </item>
  </channel>
</rss>

