<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>tema Re: VPN site-to-site ASA-AWS en VPN</title>
    <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395079#M122970</link>
    <description>&lt;P&gt;I saw again my configuration and i looked that i had a problem on the transform-set&lt;/P&gt;
&lt;P&gt;crypto ipsec ikev1 transform-set VPN-COPEC_AWS-ACID_Labs_stagging esp-aes esp-sha-hmac&lt;/P&gt;
&lt;P&gt;I correct it and its working now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jun 2018 16:21:31 GMT</pubDate>
    <dc:creator>rponte</dc:creator>
    <dc:date>2018-06-06T16:21:31Z</dc:date>
    <item>
      <title>VPN site-to-site ASA-AWS</title>
      <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395012#M122964</link>
      <description>&lt;P&gt;Hello Folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to do a VPN connection between my asa and AWS VPC and it is not working. Could you please check it and help me ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There you have my configuration:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Publics IPs changed:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;crypto ikev1 policy 9&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; lifetime 28800&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object-group network DST_VPN_L2L_AWS-ACID_Labs_stagging&lt;BR /&gt; network-object 171.0.10.0 255.255.255.0&lt;BR /&gt; network-object 171.0.11.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group network SRC_VPN_L2L_AWS-ACID_Labs_stagging&lt;BR /&gt; network-object host 10.1.3.16&lt;BR /&gt; network-object host 10.1.3.23&lt;BR /&gt; network-object host 10.1.3.58&lt;BR /&gt; network-object host 10.1.3.55&lt;BR /&gt; network-object host 10.1.3.15&lt;BR /&gt; network-object host 10.1.3.22&lt;BR /&gt; network-object host 10.1.2.102&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list ACL-L2L-VPN-AWS-ACID_Labs_stagging extended permit ip object-group SRC_VPN_L2L_AWS-ACID_Labs_stagging object-group DST_VPN_L2L_AWS-ACID_Labs_stagging&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (Interna,outside) source static SRC_VPN_L2L_AWS-ACID_Labs_stagging SRC_VPN_L2L_AWS-ACID_Labs_stagging destination static DST_VPN_L2L_AWS-ACID_Labs_stagging DST_VPN_L2L_AWS-ACID_Labs_stagging&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ipsec ikev1 transform-set VPN-COPEC_AWS-ACID_Labs_stagging esp-aes-256 esp-sha-hmac&lt;/P&gt;
&lt;P&gt;crypto map segurovpn 15 match address ACL-L2L-VPN-AWS-ACID_Labs_stagging&lt;BR /&gt;crypto map segurovpn 15 set pfs &lt;BR /&gt;crypto map segurovpn 15 set peer 1.1.1.1 2.2.2.2&lt;BR /&gt;crypto map segurovpn 15 set ikev1 transform-set VPN-COPEC_AWS-ACID_Labs_stagging&lt;BR /&gt;crypto map segurovpn 15 set security-association lifetime seconds 3600&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tunnel-group 1.1.1.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 1.1.1.1 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key abc&lt;BR /&gt; isakmp keepalive threshold 10 retry 10&lt;/P&gt;
&lt;P&gt;tunnel-group 2.2.2.2 type ipsec-l2l&lt;BR /&gt;tunnel-group 2.2.2.2 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key cde&lt;BR /&gt; isakmp keepalive threshold 10 retry 10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an IP SLA on my core:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip sla 20&lt;BR /&gt; icmp-echo 171.0.10.131 source-interface Vlan41&lt;BR /&gt; frequency 5&lt;BR /&gt;ip sla schedule 20 life forever start-time now&lt;BR /&gt;ip sla 30&lt;BR /&gt; icmp-echo 171.0.11.212 source-interface Vlan41&lt;BR /&gt; frequency 5&lt;BR /&gt;ip sla schedule 30 life forever start-time now&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did the debug and it shows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input interna icmp 10.1.3.16 8 0 171.0.10.131 de&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 10.1.2.0 255.255.254.0 Interna&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Interna in interface Interna&lt;BR /&gt;access-list Interna extended permit ip any any &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x73a0f890, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=64111047, user_data=0x6f59ec80, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=Interna, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7378d138, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=2793297518, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=Interna, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: &lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x747d4960, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt; hits=28975364, user_data=0x747d3940, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0&lt;BR /&gt; input_ifc=Interna, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7378cd10, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt; hits=28977323, user_data=0x7378c328, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0&lt;BR /&gt; input_ifc=Interna, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x75d57938, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt; hits=383796209, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0&lt;BR /&gt; input_ifc=Interna, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Interna,outside) source static SRC_VPN_L2L_AWS-ACID_Labs_stagging SRC_VPN_L2L_AWS-ACID_Labs_stagging destination static DST_VPN_L2L_AWS-ACID_Labs_stagging DST_VPN_L2L_AWS-ACID_Labs_stagging&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.3.16/0 to 10.1.3.16/0&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x774d52c0, priority=6, domain=nat, deny=false&lt;BR /&gt; hits=10, user_data=0x76b60a00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=10.1.3.16, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip/id=171.0.10.0, mask=255.255.255.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=Interna, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x74ed1578, priority=70, domain=encrypt, deny=false&lt;BR /&gt; hits=3127, user_data=0x2bb320bc, cs_id=0x7700da58, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=10.1.3.16, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip/id=171.0.10.0, mask=255.255.255.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x747d5ea0, priority=0, domain=user-statistics, deny=false&lt;BR /&gt; hits=2944520092, user_data=0x746a7cb0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x74ef6d98, priority=69, domain=ipsec-tunnel-flow, deny=false&lt;BR /&gt; hits=3127, user_data=0x2c247f14, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=171.0.10.0, mask=255.255.255.0, port=0&lt;BR /&gt; dst ip/id=10.1.3.16, mask=255.255.255.255, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x76e27a38, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt; hits=400754464, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x737671b0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=2873324028, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt; &lt;BR /&gt;Phase: 14&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; out id=0x747d66e8, priority=0, domain=user-statistics, deny=false&lt;BR /&gt; hits=2860347337, user_data=0x746a7cb0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=Interna&lt;/P&gt;
&lt;P&gt;Phase: 15&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2906792974, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_encrypt&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_ipsec_tunnel_flow&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Interna&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show crypto ipsec sa peer&amp;nbsp;1.1.1.1&lt;/STRONG&gt;&lt;BR /&gt;peer address:&amp;nbsp;1.1.1.1&lt;BR /&gt; Crypto map tag: segurovpn, seq num: 15, local addr:&amp;nbsp;3.3.3.3&lt;/P&gt;
&lt;P&gt;access-list ACL-L2L-VPN-AWS-ACID_Labs_stagging extended permit ip host 10.1.3.22 171.0.11.0 255.255.255.0 &lt;BR /&gt; local ident (addr/mask/prot/port): (10.1.3.22/255.255.255.255/0/0)&lt;BR /&gt; remote ident (addr/mask/prot/port): (171.0.11.0/255.255.255.0/0/0)&lt;BR /&gt; current_peer:&amp;nbsp;1.1.1.1&lt;/P&gt;
&lt;P&gt;#pkts encaps: 54536, #pkts encrypt: 54536, #pkts digest: 54536&lt;BR /&gt; #pkts decaps: 163624, #pkts decrypt: 163624, #pkts verify: 163624&lt;BR /&gt; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt; #pkts not compressed: 54536, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt; #send errors: 0, #recv errors: 109090&lt;/P&gt;
&lt;P&gt;local crypto endpt.: 3.3.3.3/4500, remote crypto endpt.: 1.1.1.1/4500&lt;BR /&gt; path mtu 1500, ipsec overhead 82, media mtu 1500&lt;BR /&gt; current outbound spi: 9C8BFD41&lt;BR /&gt; current inbound spi : D0C785FD&lt;/P&gt;
&lt;P&gt;inbound esp sas:&lt;BR /&gt; spi: 0xD0C785FD (3502736893)&lt;BR /&gt; transform: esp-aes-256 esp-sha-hmac no compression &lt;BR /&gt; in use settings ={L2L, Tunnel, NAT-T-Encaps, PFS Group 2, }&lt;BR /&gt; slot: 0, conn_id: 86343680, crypto-map: segurovpn&lt;BR /&gt; sa timing: remaining key lifetime (kB/sec): (4373963/3434)&lt;BR /&gt; IV size: 16 bytes&lt;BR /&gt; replay detection support: Y&lt;BR /&gt; Anti replay bitmap: &lt;BR /&gt; 0xFFFFFFFF 0xFFFFFFFF&lt;BR /&gt; outbound esp sas:&lt;BR /&gt; spi: 0x9C8BFD41 (2626420033)&lt;BR /&gt; transform: esp-aes-256 esp-sha-hmac no compression &lt;BR /&gt; in use settings ={L2L, Tunnel, NAT-T-Encaps, PFS Group 2, }&lt;BR /&gt; slot: 0, conn_id: 86343680, crypto-map: segurovpn&lt;BR /&gt; sa timing: remaining key lifetime (kB/sec): (4373990/3434)&lt;BR /&gt; IV size: 16 bytes&lt;BR /&gt; replay detection support: Y&lt;BR /&gt; Anti replay bitmap: &lt;BR /&gt; 0x00000000 0x00000001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;in ASDM:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;IPSEC: Received an ESP packet (SPI=0xB3D438FD, sequence number = 0x7E3) from 1.1.1.1 (user=1.1.1.1) to 3.3.3.3.&lt;BR /&gt;The decapsulated inner packet doesn't match the negotiated policy in the SA.&lt;BR /&gt;The packet specifies its destination as 10.1.3.16, its source as 171.0.10.131, and its protocol as icmp. The SA specifies its local proxy as 10.1.3.22/255.255.255.255/ip/0 and its remote_proxy as 171.0.11.0/255.255.255.0/ip/0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395012#M122964</guid>
      <dc:creator>rponte</dc:creator>
      <dc:date>2019-03-12T12:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-to-site ASA-AWS</title>
      <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395017#M122965</link>
      <description>&lt;P&gt;Based on the packet tracer the traffic is encrypted and sent out the outside interface, but in the show crypto sa I can't see the sa&amp;nbsp;that should be created by the&amp;nbsp;packet tracer.&lt;/P&gt;
&lt;P&gt;I believe you have a couple more crypto map entries, any chance one of those has the same ips in configured the crypto acl ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 14:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395017#M122965</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-06-06T14:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-to-site ASA-AWS</title>
      <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395028#M122966</link>
      <description>&lt;P&gt;I have another VPN working and it have the following: &lt;BR /&gt;&lt;BR /&gt;nat (Interna,outside) source static SRC_VPN_L2L_AWS-ACID_Labs SRC_VPN_L2L_AWS-ACID_Labs destination static DST_VPN_L2L_AWS-ACID_Labs DST_VPN_L2L_AWS-ACID_Labs&lt;BR /&gt;access-list ACL-L2L-VPN-AWS-ACID_Labs extended permit ip object-group SRC_VPN_L2L_AWS-ACID_Labs object-group DST_VPN_L2L_AWS-ACID_Labs&lt;BR /&gt;&lt;BR /&gt;object-group network SRC_VPN_L2L_AWS-ACID_Labs&lt;BR /&gt; network-object host 10.1.3.16&lt;/P&gt;
&lt;P&gt;network-object host 10.1.3.23&lt;BR /&gt; network-object host 10.1.3.58&lt;BR /&gt; network-object host 10.1.3.55&lt;BR /&gt; network-object host 10.1.3.15&lt;BR /&gt; network-object host 10.1.3.22&lt;BR /&gt; network-object host 10.1.2.102&lt;/P&gt;
&lt;P&gt;As you can see the Source is the same. Is that the problem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The crypto entries:&lt;BR /&gt;sh run | i&amp;nbsp;1.1.1.1&lt;BR /&gt;crypto map segurovpn 15 set peer&amp;nbsp;1.1.1.1&amp;nbsp;2.2.2.2&lt;BR /&gt;tunnel-group&amp;nbsp;1.1.1.1 type ipsec-l2l&lt;BR /&gt;tunnel-group&amp;nbsp;1.1.1.1 ipsec-attributes&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 15:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395028#M122966</guid>
      <dc:creator>rponte</dc:creator>
      <dc:date>2018-06-06T15:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-to-site ASA-AWS</title>
      <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395079#M122970</link>
      <description>&lt;P&gt;I saw again my configuration and i looked that i had a problem on the transform-set&lt;/P&gt;
&lt;P&gt;crypto ipsec ikev1 transform-set VPN-COPEC_AWS-ACID_Labs_stagging esp-aes esp-sha-hmac&lt;/P&gt;
&lt;P&gt;I correct it and its working now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 16:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395079#M122970</guid>
      <dc:creator>rponte</dc:creator>
      <dc:date>2018-06-06T16:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-to-site ASA-AWS</title>
      <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395087#M122971</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/211010"&gt;@rponte&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was checking your configuration and you need to keep in mind a detail with VPNs with AWS VPC, based on this link&amp;nbsp;&lt;A href="https://docs.aws.amazon.com/AmazonVPC/latest/NetworkAdminGuide/Cisco_ASA.html" target="_blank"&gt;https://docs.aws.amazon.com/AmazonVPC/latest/NetworkAdminGuide/Cisco_ASA.html&lt;/A&gt;, the ASA needs to have an ACL only with one entry so you need to change your source as ANY since if you don´t configure it like that, you can experience problems with the VPN.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Probably that´s why it´s not working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 16:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/3395087#M122971</guid>
      <dc:creator>GioGonza</dc:creator>
      <dc:date>2018-06-06T16:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-to-site ASA-AWS</title>
      <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/4101214#M273004</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you advise , is it possible to configure ASA Policy Based VPN and ASA site Still Route Based VPN ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far I know AWS does support only ROUTE based VPN&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 02:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/4101214#M273004</guid>
      <dc:creator>subrun.jamil</dc:creator>
      <dc:date>2020-06-11T02:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-to-site ASA-AWS</title>
      <link>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/4149482#M274403</link>
      <description>&lt;P&gt;The Site-to-Site VPN service is a route-based solution. If you are using a policy-based configuration, you must limit your configuration to a single security association (SA).&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/vpn/latest/s2svpn/s2s-vpn-user-guide.pdf" target="_blank"&gt;https://docs.aws.amazon.com/vpn/latest/s2svpn/s2s-vpn-user-guide.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 01:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-site-to-site-asa-aws/m-p/4149482#M274403</guid>
      <dc:creator>AndrewAllwein9842</dc:creator>
      <dc:date>2020-09-11T01:24:22Z</dc:date>
    </item>
  </channel>
</rss>

