<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL Problem in Switching</title>
    <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708571#M15323</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure thing John,&lt;/P&gt;&lt;P&gt;Thanks for looking at this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rob.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Jan 2007 10:24:39 GMT</pubDate>
    <dc:creator>rodonohu1</dc:creator>
    <dc:date>2007-01-30T10:24:39Z</dc:date>
    <item>
      <title>ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708569#M15321</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;My issues is this:&lt;/P&gt;&lt;P&gt;I have a home office router and a core router. The following is the config. I'm using crypto maps to create it. But there seems to be an issue with the ACLS. I can ping both public IP address but after that, nothing. Any help is great. Any good ACL troubleshooting methods?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Main Router to Home office Router:&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 3600&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp key RODONOHU-VPN address 213.94.219.249&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set 60GMAC esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map COGENT_VPN 60 ipsec-isakmp&lt;/P&gt;&lt;P&gt; description RODONOHU-HOME-TEST&lt;/P&gt;&lt;P&gt; set peer 213.94.219.249&lt;/P&gt;&lt;P&gt; set transform-set 60GMAC&lt;/P&gt;&lt;P&gt; match address RODONOHUE_HOME&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 172.17.25.16 255.255.255.240 66.28.244.17 name RobODonohueHomeTest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 213.94.219.249 255.255.255.255 66.28.244.17 name RODONOHU-TUNNEL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended RODONOHUE_HOME&lt;/P&gt;&lt;P&gt; permit ip host 66.28.244.18 host 213.94.219.249&lt;/P&gt;&lt;P&gt; permit ip 172.16.0.0 0.0.255.255 172.17.25.16 0.0.0.15&lt;/P&gt;&lt;P&gt; permit ip 172.17.0.0 0.0.255.255 172.17.25.16 0.0.0.15&lt;/P&gt;&lt;P&gt; permit ip 192.168.0.0 0.0.255.255 172.17.25.16 0.0.0.15&lt;/P&gt;&lt;P&gt; permit ip 192.206.209.0 0.0.0.255 172.17.25.16 0.0.0.15&lt;/P&gt;&lt;P&gt; deny   ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Home Office Router&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 3600&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp key RODONOHU-VPN address 66.28.244.18&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set 60GMAC esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map COGENT_VPN 60 ipsec-isakmp &lt;/P&gt;&lt;P&gt; set peer 66.28.244.18&lt;/P&gt;&lt;P&gt; set transform-set 60GMAC &lt;/P&gt;&lt;P&gt; match address Crypto_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended Crypto_ACL&lt;/P&gt;&lt;P&gt; permit ip host 213.94.219.249 host 66.28.244.18&lt;/P&gt;&lt;P&gt; permit ip 172.17.25.16 0.0.0.15 172.16.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; permit ip 172.17.25.16 0.0.0.15 172.17.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; permit ip 172.17.25.16 0.0.0.15 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; permit ip 172.17.25.16 0.0.0.15 192.206.209.0 0.0.0.255&lt;/P&gt;&lt;P&gt; permit ip host 213.94.219.249 host 66.28.244.17&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 22:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708569#M15321</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2019-03-05T22:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708570#M15322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you send the full configs minus any sensitive info. What youy have sent looks alright but i suspect there may be some NAT issues going on. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 10:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708570#M15322</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-01-30T10:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708571#M15323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure thing John,&lt;/P&gt;&lt;P&gt;Thanks for looking at this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rob.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 10:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708571#M15323</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-30T10:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708572#M15324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you send me an e-mail asap at&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:jon.marshall@networkrail.co.uk"&gt;jon.marshall@networkrail.co.uk&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 10:51:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708572#M15324</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-01-30T10:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708573#M15325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still sifting through 7206 config :-). Couple of questions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Do the VPN setups for RConway &amp;amp; PKearney work ?. These seem to be setup the same as yours. &lt;/P&gt;&lt;P&gt;2) When you try and connect from home how far does the VPN negotiation get, if anywhere.&lt;/P&gt;&lt;P&gt;3) When you say you can access the peer ip addresses with ping have you confirmed this is bringing up the VPN tunnel or is it just going out in cleartext. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing i did notice which is why i aksed 1) is that you have a route not only for your home public ip address but also for your home subnet. This should not be needed on the 7206 as the crypto map access-list should see this as interesting traffic and know it has to be sent down a VPN tunnel. But if the others are working then i guess it makes no difference. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 18:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708573#M15325</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-01-30T18:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708574#M15326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;Thanks for looking at this.&lt;/P&gt;&lt;P&gt;To answer:&lt;/P&gt;&lt;P&gt;1) The Rconway one worked but it has since been removed so i can't test. I set up the Pkearney one last week and have the same problem as my own one.&lt;/P&gt;&lt;P&gt;2) When i connect from home, the Dialer interface comes up and I can ping the peer address. but how do i verify that the VPN tunnel is up? what debug commands do I need? There is no explicit tunnel created like in the other ones where I use BGP routing and a gre tunnel. I'd do all these the same as that only for two users have wireless routers that don't support BGP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you think I should take out the static route altogether?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 18:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708574#M15326</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-30T18:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708575#M15327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like you have mismatched isakmp policies on the peering routers. Your ISAKMP SA is probably not established and you can verify that by doing 'show crypto isakmp sa'. The default isakmp encryption is DES &amp;amp; hash is SHA and that's what you are using on the core router. Can you remove the hash &amp;amp; encryption from the home office router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Home Office Router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; no encr 3des&lt;/P&gt;&lt;P&gt; no hash md5 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are still having issues, can you post the output of 'show crypto isakmp policy' from both routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 18:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708575#M15327</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2007-01-30T18:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708576#M15328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;I will try this but I have other Home office routers using the same set up with "Policy 1" but they can route. They were using BGP but the router I'm trying to configure this using static route and access lists. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still no luck.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 19:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708576#M15328</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-30T19:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708577#M15329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert / Sundar &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar, there is actually an isakmp policy on the core router that matches but it's just not included in the original post. It's isakmp policy 4 and it should be picked up i would have thought. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still not sure about the route for the remote subnet. Sundar, do you know if this would stop it working ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert - it wouldn't do any harm to temporarily remove the route to see what happens. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you could also run the commands Sundar sent - best run them on your home router rather than the 7206, there's a lot going on with that router &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 21:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708577#M15329</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-01-30T21:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708578#M15330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I've removed the route on the core router and also made the checks and changes to the policy on the home office but still no luck:&lt;/P&gt;&lt;P&gt;See output below from the "sh crypto policy"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output:&lt;/P&gt;&lt;P&gt;RODONOHU-HOME#sh crypto isakmp policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global IKE policy&lt;/P&gt;&lt;P&gt;Protection suite of priority 1&lt;/P&gt;&lt;P&gt;        encryption algorithm:   Three key triple DES&lt;/P&gt;&lt;P&gt;        hash algorithm:         Message Digest 5&lt;/P&gt;&lt;P&gt;        authentication method:  Pre-Shared Key&lt;/P&gt;&lt;P&gt;        Diffie-Hellman group:   #2 (1024 bit)&lt;/P&gt;&lt;P&gt;        lifetime:               3600 seconds, no volume limit&lt;/P&gt;&lt;P&gt;Default protection suite&lt;/P&gt;&lt;P&gt;        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).&lt;/P&gt;&lt;P&gt;        hash algorithm:         Secure Hash Standard&lt;/P&gt;&lt;P&gt;        authentication method:  Rivest-Shamir-Adleman Signature&lt;/P&gt;&lt;P&gt;        Diffie-Hellman group:   #1 (768 bit)&lt;/P&gt;&lt;P&gt;        lifetime:               86400 seconds, no volume limit&lt;/P&gt;&lt;P&gt;RODONOHU-HOME#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global IKE policy&lt;/P&gt;&lt;P&gt;Protection suite of priority 1&lt;/P&gt;&lt;P&gt;        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).&lt;/P&gt;&lt;P&gt;        hash algorithm:         Secure Hash Standard&lt;/P&gt;&lt;P&gt;        authentication method:  Pre-Shared Key&lt;/P&gt;&lt;P&gt;        Diffie-Hellman group:   #2 (1024 bit)&lt;/P&gt;&lt;P&gt;        lifetime:               3600 seconds, no volume limit&lt;/P&gt;&lt;P&gt;Default protection suite&lt;/P&gt;&lt;P&gt;        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).&lt;/P&gt;&lt;P&gt;        hash algorithm:         Secure Hash Standard&lt;/P&gt;&lt;P&gt;        authentication method:  Rivest-Shamir-Adleman Signature&lt;/P&gt;&lt;P&gt;        Diffie-Hellman group:   #1 (768 bit)&lt;/P&gt;&lt;P&gt;        lifetime:               86400 seconds, no volume limit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any reason why this wouldn't work? is there an easier way of doing it? Normally I'd use Bgp but its not support on the IOS for the HO. What is set up should work, thats what is bugging me. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 00:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708578#M15330</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-31T00:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708579#M15331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rob &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the configs i can't see a huge lot wrong with what you have. Can you try these commands on your home router when you try to connect &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) debug crypto isa &lt;/P&gt;&lt;P&gt;2) debug crpyto ipsec &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) sh crypto isa sa &lt;/P&gt;&lt;P&gt;4) sh crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should give us an idea of how far it is getting &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 07:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708579#M15331</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-01-31T07:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708580#M15332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll check it out. &lt;/P&gt;&lt;P&gt;Just a thought - where do I apply the COGENT_VPN map on the 7206 seeing that i'm not using a tunnel. Is there an interface I apply it to?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 09:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708580#M15332</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-31T09:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708581#M15333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rob &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must have missed that. it will need to applied on the interface with 62.88.x.x address on your 7206 (sorry i've shredded the config now). If it isn't applied it definitely won't work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 11:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708581#M15333</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-01-31T11:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708582#M15334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry I checked it again there. its there on the interface alright. just skipped it. AHH this thing is frustrating.!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 11:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708582#M15334</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-31T11:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708583#M15335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;I've run those debugging commands. You might find the output interesting. &lt;/P&gt;&lt;P&gt;please see attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rob.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 15:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708583#M15335</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-31T15:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708584#M15336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone have a look at the updated info i supplied for this issue? It seems to be an issue with the Crypto map not saying up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See Below:&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 66.28.244.18, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.203: ISAKMP: received ke message (1/1)&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.203: ISAKMP: set new node 0 to QM_IDLE      &lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.203: ISAKMP (0:1): sitting IDLE. Starting QM immediately (QM_IDLE      )&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.203: ISAKMP (0:1): beginning Quick Mode exchange, M-ID of -572399601&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.215: ISAKMP (0:1): sending packet to 66.28.244.18 my_port 500 peer_port 500 (I) QM_IDLE      &lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.215: ISAKMP (0:1): Node -572399601, Input = IKE_MESG_INTERNAL, IKE_INIT_QM&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.215: ISAKMP (0:1): Old State = IKE_QM_READY  New State = IKE_QM_I_QM1&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.583: ISAKMP (0:1): received packet from 66.28.244.18 dport 500 sport 500 Global (I) QM_IDLE      &lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP (0:1): processing HASH payload. message ID = -572399601&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP (0:1): processing SA payload. message ID = -572399601&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP (0:1): Checking IPSec proposal 1&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP:      encaps is 1 (Tunnel)&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP:      SA life type in seconds&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP:      SA life duration (basic) of 3600&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP:      SA life type in kilobytes&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 &lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.595: ISAKMP:      authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.599: ISAKMP (0:1): atts are acceptable.&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.599: ISAKMP (0:1): processing NONCE payload. message ID = -572399601&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.599: ISAKMP (0:1): processing ID payload. message ID = -572399601&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.599: ISAKMP (0:1): processing ID payload. message ID = -572399601&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647: ISAKMP (0:1): Creating IPSec SAs&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         inbound SA from 66.28.244.18 to 213.94.219.249 (f/i)  0/ 0&lt;/P&gt;&lt;P&gt;        (proxy 6.!!!!&lt;/P&gt;&lt;P&gt;Success rate is 80 percent (4/5), round-trip min/avg/max = 108/111/112 ms&lt;/P&gt;&lt;P&gt;RODONOHU-HOME#6.28.244.18 to 213.94.219.249)&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         has spi 0x4D8354B6 and conn_id 202 and flags 2&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         lifetime of 3600 seconds&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         lifetime of 4608000 kilobytes&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         has client flags 0x0&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         outbound SA from 213.94.219.249  to 66.28.244.18    (f/i)  0/ 0 (proxy 213.94.219.249  to 66.28.244.18   )&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         has spi 873654110 and conn_id 203 and flags A&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         lifetime of 3600 seconds&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         lifetime of 4608000 kilobytes&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.647:         has client flags 0x0&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.651: ISAKMP (0:1): sending packet to 66.28.244.18 my_port 500 peer_port 500 (I) QM_IDLE      &lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.655: ISAKMP (0:1): deleting node -572399601 error FALSE reason ""&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.655: ISAKMP (0:1): Node -572399601, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH&lt;/P&gt;&lt;P&gt;Feb  2 08:03:51.655: ISAKMP (0:1): Old State = IKE_QM_I_QM1  New State = IKE_QM_PHASE2_COMPLETE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2007 22:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708584#M15336</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-01-31T22:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708585#M15337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rob &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry i didn't look at this yesterday - had a bit of a load balancing crisis. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interesting but from the debugs is &lt;/P&gt;&lt;P&gt;   local  ident (addr/mask/prot/port): (172.17.25.16/255.255.255.240/0/0)&lt;/P&gt;&lt;P&gt;   remote ident (addr/mask/prot/port): (192.206.209.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;   current_peer: 66.28.244.18:500&lt;/P&gt;&lt;P&gt;     PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;    #pkts encaps: 41, #pkts encrypt: 41, #pkts digest 41&lt;/P&gt;&lt;P&gt;    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0&lt;/P&gt;&lt;P&gt;    #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;    #pkts not compressed: 0, #pkts compr. failed: 0&lt;/P&gt;&lt;P&gt;    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;    #send errors 1, #recv errors 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you identify what traffic generated this ie. what machine you were using from home and which machine you were trying to contact. Cleary there was traffic being sent down the tunnel but nothing coming back. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 08:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708585#M15337</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-02-01T08:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708586#M15338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem at all. &lt;/P&gt;&lt;P&gt;I just tried to ping a server on the other end. it just timed out. Could numbered ACLs be better to use than Named? I know probably not but i'm clutching at straws. the machine from home was just a desktop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any other debugs or show commands i could use to show more details? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 09:12:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708586#M15338</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-02-01T09:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708587#M15339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rob &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No i don't think it's going to make any difference what type of acl you use. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm that if you try and contact a server at work from your home subnet that the debugging showed nothing ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i would like is the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Turn on debug crypto isa &lt;/P&gt;&lt;P&gt;2) turn on debug crypto ipsec &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to connect from home to a server at work. As it is trying to connect &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) sh crypto isa sa &lt;/P&gt;&lt;P&gt;2) sh crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't normally add in the peer IP addresses to the crypto maps when i do site-to-site VPNs but it should be okay. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies if you have already done this but it is a bit unclear from the debugging. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 10:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708587#M15339</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-02-01T10:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL Problem</title>
      <link>https://community.cisco.com/t5/switching/acl-problem/m-p/708588#M15340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please find the attached text file from the commands above. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 21:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/acl-problem/m-p/708588#M15340</guid>
      <dc:creator>rodonohu1</dc:creator>
      <dc:date>2007-02-01T21:22:41Z</dc:date>
    </item>
  </channel>
</rss>

