<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GETVPN question in VPN</title>
    <link>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843827#M62099</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zoran, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Consider we need to add explicity deny for routing protocols (not only multicast based, but also unicast) in GETVPN encryption ACL - all routing protocols are considered originating from the box (the ones with "router ...." statment on the box).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Jan 2012 10:03:24 GMT</pubDate>
    <dc:creator>Marcin Latosiewicz</dc:creator>
    <dc:date>2012-01-16T10:03:24Z</dc:date>
    <item>
      <title>GETVPN question</title>
      <link>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843824#M62096</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a couple of routers that are members of the same GETVPN group&lt;/P&gt;&lt;P&gt;and share the same network on which traffic is encrypted (same WAN network).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My access list from key server permits encryption for everything except eigrp&lt;/P&gt;&lt;P&gt;and ssh.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I ping one router (his WAN interface) from other router (also his WAN interface,&lt;/P&gt;&lt;P&gt;same subnet) will this ping be encrypted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;List from key server would say yes but I don't know if this goes also for router originating&lt;/P&gt;&lt;P&gt;traffic (from interface on which I have crypto map).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Zoran&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 01:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843824#M62096</guid>
      <dc:creator>zoran.suica</dc:creator>
      <dc:date>2020-02-22T01:49:00Z</dc:date>
    </item>
    <item>
      <title>GETVPN question</title>
      <link>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843825#M62097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zoran, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, router originated traffic is also subject to encryption (we only put a silent deny for UDP/848).&lt;/P&gt;&lt;P&gt;In theory almost everything hits crypto on the way out :-)&lt;/P&gt;&lt;P&gt;Have you seen those packets leaking out in clear? A very easy way to see is "debug ip packet" (with ACLs) packets originated from the box will show in debugs by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;M.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Jan 2012 08:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843825#M62097</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2012-01-14T08:00:03Z</dc:date>
    </item>
    <item>
      <title>GETVPN question</title>
      <link>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843826#M62098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marcin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you very much for your answer. I've done "debug ip packet" and they are&lt;/P&gt;&lt;P&gt;encrypted so everything is like you said but I wanted to double check, especially&lt;/P&gt;&lt;P&gt;because I've heard from some colleagues that it should not be encrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Zoran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jan 2012 23:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843826#M62098</guid>
      <dc:creator>zoran.suica</dc:creator>
      <dc:date>2012-01-15T23:33:17Z</dc:date>
    </item>
    <item>
      <title>GETVPN question</title>
      <link>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843827#M62099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zoran, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Consider we need to add explicity deny for routing protocols (not only multicast based, but also unicast) in GETVPN encryption ACL - all routing protocols are considered originating from the box (the ones with "router ...." statment on the box).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 10:03:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/getvpn-question/m-p/1843827#M62099</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2012-01-16T10:03:24Z</dc:date>
    </item>
  </channel>
</rss>

