<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to send packet from PC to Server via IPSec Tunnel in Switching</title>
    <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944119#M553221</link>
    <description>&lt;P&gt;I tried pinging from server to pc using `ping -t 192.168.4.2` but it doesn't work&lt;/P&gt;</description>
    <pubDate>Thu, 19 Oct 2023 09:23:29 GMT</pubDate>
    <dc:creator>heymastreo</dc:creator>
    <dc:date>2023-10-19T09:23:29Z</dc:date>
    <item>
      <title>Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943341#M553187</link>
      <description>&lt;P&gt;I am trying to create a network comprising of two routers, one ASA 5505 firewall, one computer and one web server.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="heymastreo_0-1697677800866.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/200000i0CBF8A16DFBA176E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="heymastreo_0-1697677800866.png" alt="heymastreo_0-1697677800866.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have created a VPN tunnel in between Router4 and ASA5505 firewall. I have also configured both the routers and the ASA5505 firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also i read on the internet that i have to initiate interesting traffic for VPN to initialize. But I don't really understand what it means.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below are the configuration of the router4:&lt;/P&gt;&lt;P&gt;Router(config)#exit&lt;/P&gt;&lt;P&gt;Router#&lt;/P&gt;&lt;P&gt;%SYS-5-CONFIG_I: Configured from console by console&lt;/P&gt;&lt;P&gt;show run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current configuration : 1226 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 15.1&lt;/P&gt;&lt;P&gt;no service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Router&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;license udi pid CISCO1941/K9 sn FTX15247V2V-&lt;/P&gt;&lt;P&gt;license boot module c1900 technology-package securityk9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 5&lt;/P&gt;&lt;P&gt;lifetime 28800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp key 12345 address 192.168.2.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set R1-&amp;gt;ASA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map IPSEC-MAP 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;! Incomplete&lt;/P&gt;&lt;P&gt;set peer 192.168.2.1&lt;/P&gt;&lt;P&gt;set transform-set R1-&amp;gt;ASA&lt;/P&gt;&lt;P&gt;match address VPN-TRAFFIC&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;spanning-tree mode pvst&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;ip address 192.168.4.1 255.255.255.0&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;ip address 192.168.3.2 255.255.255.0&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;crypto map IPSEC-MAP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.3.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip flow-export version 9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended VPN-TRAFFIC&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.4.2 host 192.168.1.2&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.1.2 host 192.168.4.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;Router#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And ASA5505 firewall configuration are as follows:&lt;/P&gt;&lt;P&gt;ciscoasa#show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network local-network&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list VPN-TRAFFIC extended permit ip 192.168.1.0 255.255.255.0 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VPN-TRAFFIC extended permit icmp 192.168.4.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ASA-&amp;gt;R1 esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map IPSEC-MAP 10 match address VPN-TRAFFIC&lt;/P&gt;&lt;P&gt;crypto map IPSEC-MAP 10 set peer 192.168.3.2&lt;/P&gt;&lt;P&gt;crypto map IPSEC-MAP 10 set ikev1 transform-set ASA-&amp;gt;R1&lt;/P&gt;&lt;P&gt;crypto map IPSEC-MAP interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 5&lt;/P&gt;&lt;P&gt;lifetime 28800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group 192.168.3.2 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 192.168.3.2 ipsec-attributes&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key 12345&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 01:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943341#M553187</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T01:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943727#M553204</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1616772"&gt;@heymastreo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The interesting traffic for the VPN tunnel is defined by the "VPN-TRAFFIC" access lists on both devices, allowing traffic between the specified subnets (192.168.1.0/24 and 192.168.4.0/24) to trigger the VPN connection.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;To initiate the VPN tunnel, you need to send traffic between these subnets (for example, by pinging a device in the remote network from the local network). Once the devices detect the interesting traffic, the VPN tunnel should establish automatically.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 05:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943727#M553204</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2023-10-19T05:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943841#M553207</link>
      <description>&lt;P&gt;Router&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share this&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;debug crypto isakmp&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 19 Oct 2023 06:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943841#M553207</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T06:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943948#M553210</link>
      <description>&lt;P&gt;1. bare in mind the ACL not match same both the side you have only host entry 1&amp;nbsp; router side and other side subnet&lt;/P&gt;
&lt;P&gt;ip access-list extended VPN-TRAFFIC&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip host 192.168.4.2 host 192.168.1.2&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip host 192.168.1.2 host 192.168.4.2&lt;/P&gt;
&lt;P&gt;2. is the Trunnel up and running- check with show crypto commands.&lt;/P&gt;
&lt;P&gt;3. Initiate the traffic mean, ping one side to other side allowed traffic subnet. (so you see encryption and decryption take place).&lt;/P&gt;
&lt;P&gt;below guide help you :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.networkstraining.com/site-to-site-vpn-between-cisco-asa-and-router/" target="_blank"&gt;https://www.networkstraining.com/site-to-site-vpn-between-cisco-asa-and-router/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 07:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4943948#M553210</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-10-19T07:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944118#M553220</link>
      <description>&lt;P&gt;Router#show crypto isakmp sa&lt;/P&gt;&lt;P&gt;IPv4 Crypto ISAKMP SA&lt;/P&gt;&lt;P&gt;dst src state conn-id slot status&lt;/P&gt;&lt;P&gt;192.168.2.1 192.168.3.2 QM_IDLE 1087 0 ACTIVE (deleted)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPv6 Crypto ISAKMP SA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router#&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944118#M553220</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T09:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944119#M553221</link>
      <description>&lt;P&gt;I tried pinging from server to pc using `ping -t 192.168.4.2` but it doesn't work&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944119#M553221</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T09:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944120#M553222</link>
      <description>&lt;P&gt;Can yoh ping from R to ASA outside interface?&lt;/P&gt;
&lt;P&gt;I.e. ping from vpn endpoint to endpoint&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944120#M553222</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T09:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944124#M553223</link>
      <description>&lt;P&gt;This is what i see when i run `show crpto isakmp sa` on router&lt;/P&gt;&lt;P&gt;Router#show crypto isakmp sa&lt;/P&gt;&lt;P&gt;IPv4 Crypto ISAKMP SA&lt;/P&gt;&lt;P&gt;dst src state conn-id slot status&lt;/P&gt;&lt;P&gt;192.168.2.1 192.168.3.2 QM_IDLE 1087 0 ACTIVE (deleted)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPv6 Crypto ISAKMP SA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and this is what i see when i run `show crypto isakmp sa` on ASA5505 firewall&lt;/P&gt;&lt;P&gt;ciscoasa#show crypto isakmp sa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Active SA: 1&lt;/P&gt;&lt;P&gt;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;1 IKE Peer: 192.168.3.2&lt;/P&gt;&lt;P&gt;Type : L2L Role : Initiator&lt;/P&gt;&lt;P&gt;Rekey : no State : QM_IDLE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944124#M553223</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T09:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944127#M553224</link>
      <description>&lt;P&gt;I think I can&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="heymastreo_0-1697708456492.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/200112iED62F5772EE44588/image-size/medium?v=v2&amp;amp;px=400" role="button" title="heymastreo_0-1697708456492.png" alt="heymastreo_0-1697708456492.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944127#M553224</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T09:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944128#M553225</link>
      <description>&lt;P&gt;That great&lt;/P&gt;
&lt;P&gt;Meaning phase1 is OK&lt;/P&gt;
&lt;P&gt;Phase2 now need to check&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show crypto ipsec&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share this output of router&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944128#M553225</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T09:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944129#M553226</link>
      <description>&lt;P&gt;output of `show crypto ipsec sa` on router&lt;/P&gt;&lt;P&gt;Router#show crypto ipsec sa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface: GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;Crypto map tag: IPSEC-MAP, local addr 192.168.3.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;protected vrf: (none)&lt;/P&gt;&lt;P&gt;local ident (addr/mask/prot/port): (192.168.4.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;remote ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;current_peer 192.168.2.1 port 500&lt;/P&gt;&lt;P&gt;PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;#pkts encaps: 32, #pkts encrypt: 32, #pkts digest: 0&lt;/P&gt;&lt;P&gt;#pkts decaps: 27, #pkts decrypt: 27, #pkts verify: 0&lt;/P&gt;&lt;P&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;#pkts not compressed: 0, #pkts compr. failed: 0&lt;/P&gt;&lt;P&gt;#pkts not decompressed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;#send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;local crypto endpt.: 192.168.3.2, remote crypto endpt.:192.168.2.1&lt;/P&gt;&lt;P&gt;path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;current outbound spi: 0x55C37018(1438871576)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;/P&gt;&lt;P&gt;spi: 0xD5C1765B(3586225755)&lt;/P&gt;&lt;P&gt;transform: esp-aes esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;conn id: 2005, flow_id: FPGA:1, crypto map: IPSEC-MAP&lt;/P&gt;&lt;P&gt;sa timing: remaining key lifetime (k/sec): (4525504/3078)&lt;/P&gt;&lt;P&gt;IV size: 16 bytes&lt;/P&gt;&lt;P&gt;replay detection support: N&lt;/P&gt;&lt;P&gt;Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inbound ah sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inbound pcp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;outbound esp sas:&lt;/P&gt;&lt;P&gt;spi: 0x55C37018(1438871576)&lt;/P&gt;&lt;P&gt;transform: esp-aes esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;conn id: 2006, flow_id: FPGA:1, crypto map: IPSEC-MAP&lt;/P&gt;&lt;P&gt;sa timing: remaining key lifetime (k/sec): (4525504/3078)&lt;/P&gt;&lt;P&gt;IV size: 16 bytes&lt;/P&gt;&lt;P&gt;replay detection support: N&lt;/P&gt;&lt;P&gt;Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;outbound ah sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;outbound pcp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router#&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944129#M553226</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T09:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944132#M553227</link>
      <description>&lt;P&gt;#pkts encaps: 32, #pkts encrypt: 32, #pkts digest: 0&lt;/P&gt;
&lt;P&gt;#pkts decaps: 27, #pkts decrypt: 27, #pkts verify: 0&lt;/P&gt;
&lt;P&gt;There packet encrypt decrypt so vpn is OK&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check gw in Server and PC.&lt;/P&gt;
&lt;P&gt;Also since there is asa you need to allow ping via&amp;nbsp;&lt;/P&gt;
&lt;P&gt;inspect icmp under global policy of asa.&lt;/P&gt;
&lt;P&gt;I think this is issue here&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944132#M553227</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T09:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944136#M553228</link>
      <description>&lt;P&gt;These are the access-lists I have on my asa for now&lt;/P&gt;&lt;P&gt;ciscoasa#show access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300&lt;/P&gt;&lt;P&gt;access-list VPN-TRAFFIC; 2 elements; name hash: 0x2679b677&lt;/P&gt;&lt;P&gt;access-list VPN-TRAFFIC line 1 extended permit ip 192.168.1.0 255.255.255.0 192.168.4.0 255.255.255.0(hitcnt=11) 0xd9419465&lt;/P&gt;&lt;P&gt;access-list VPN-TRAFFIC line 2 extended permit icmp 192.168.4.0 255.255.255.0 192.168.1.0 255.255.255.0(hitcnt=0) 0x478a1876&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944136#M553228</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T09:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944137#M553229</link>
      <description>&lt;P&gt;This acl for vpn remove second line&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list VPN-TRAFFIC line 2 extended permit icmp 192.168.4.0 255.255.255.0 192.168.1.0 255.255.255.0(hitcnt=0)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;And Add inspect icmp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944137#M553229</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T09:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944143#M553230</link>
      <description>&lt;P&gt;`inspect icmp` does not seem to be working. It gives invalid input detected error&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="heymastreo_0-1697709766178.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/200115i95FF82BEB6A449E6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="heymastreo_0-1697709766178.png" alt="heymastreo_0-1697709766178.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944143#M553230</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T10:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944146#M553231</link>
      <description>&lt;P&gt;&lt;A href="https://m.youtube.com/watch?v=YY5zr22Pp94" target="_blank"&gt;https://m.youtube.com/watch?v=YY5zr22Pp94&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944146#M553231</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T10:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944177#M553232</link>
      <description>&lt;P&gt;I was able to add inspect icmp in asa but i have no idea what to do after this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;This is what i got after i ping from one end point of vpn to another&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="heymastreo_0-1697711260939.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/200116i971829972CA2550A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="heymastreo_0-1697711260939.png" alt="heymastreo_0-1697711260939.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944177#M553232</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T10:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944179#M553233</link>
      <description>&lt;P&gt;Sorry you can ping now from pc to server?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944179#M553233</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T10:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944180#M553234</link>
      <description>&lt;P&gt;I still can't it says request timed out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I have to do the NAT translation for this on the ASA? And Do i have to add access-list for icmp to allow traffic beyond asa to the firewall?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:34:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944180#M553234</guid>
      <dc:creator>heymastreo</dc:creator>
      <dc:date>2023-10-19T10:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to send packet from PC to Server via IPSec Tunnel</title>
      <link>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944181#M553235</link>
      <description>&lt;P&gt;Can you share last config of asa and router&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/unable-to-send-packet-from-pc-to-server-via-ipsec-tunnel/m-p/4944181#M553235</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T10:38:08Z</dc:date>
    </item>
  </channel>
</rss>

