<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asa Troubleshooting IPSEC traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3346816#M1000518</link>
    <description>&lt;P&gt;And how did you use it? What did it show for you in this case?&lt;/P&gt;</description>
    <pubDate>Mon, 12 Mar 2018 15:05:29 GMT</pubDate>
    <dc:creator>Florin Barhala</dc:creator>
    <dc:date>2018-03-12T15:05:29Z</dc:date>
    <item>
      <title>Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3308510#M1000504</link>
      <description>&lt;P&gt;I have a IPsec tunnet to amazon VPC client.&lt;/P&gt;
&lt;P&gt;The tunnel is up and the VPC side can get access to my resources but I cannot get access to VPC side.&lt;/P&gt;
&lt;P&gt;The client claims that inbound security rules are setup to allow my subnet.&lt;/P&gt;
&lt;P&gt;How can I troubleshoot if my packet to his network leave the outside interface through the tunnel.&lt;/P&gt;
&lt;P&gt;I see the packet increment via show crypto ipsec but how can I be sure that they were sent to the client?&lt;/P&gt;
&lt;P&gt;I also see in the packet capture over port 4500 that there is communication between IPsec tunnel pair.&lt;/P&gt;
&lt;P&gt;How can I be 100% that my icmp packet left via tunnel.&lt;/P&gt;
&lt;P&gt;I see communication over port 4500 but how can i know if this is related to my ICMP request?&lt;/P&gt;
&lt;P&gt;Is there a way to check if asa is drooping those in case correct reply was sent via the tunnel?&lt;/P&gt;
&lt;P&gt;PCVST-ASA# capture b type raw-data interface outside match udp 1.1.1.1 255.255.255.255 2.2.2.2 255.255.255.255 eq 4500&lt;BR /&gt;PCVST-ASA# ping inside 172.31.48.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.31.48.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;PCVST-ASA# show cap b&lt;/P&gt;
&lt;P&gt;20 packets captured&lt;/P&gt;
&lt;P&gt;1: 23:37:04.081157 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 148&lt;BR /&gt; 2: 23:37:06.076106 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 148&lt;BR /&gt; 3: 23:37:07.914823 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 1&lt;BR /&gt; 4: 23:37:07.914884 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 1&lt;BR /&gt; 5: 23:37:08.076183 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 148&lt;BR /&gt; 6: 23:37:09.917249 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 96&lt;BR /&gt; 7: 23:37:09.918485 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 96&lt;BR /&gt; 8: 23:37:10.076152 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 148&lt;BR /&gt; 9: 23:37:12.076091 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 148&lt;BR /&gt; 10: 23:37:15.934644 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 400&lt;BR /&gt; 11: 23:37:15.937741 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 448&lt;BR /&gt; 12: 23:37:16.499272 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 100&lt;BR /&gt; 13: 23:37:16.499974 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 100&lt;BR /&gt; 14: 23:37:16.510242 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 100&lt;BR /&gt; 15: 23:37:16.510319 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 292&lt;BR /&gt; 16: 23:37:16.510975 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 100&lt;BR /&gt; 17: 23:37:16.511799 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 356&lt;BR /&gt; 18: 23:37:16.521503 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 100&lt;BR /&gt; 19: 23:37:16.522281 1.1.1.1.4500 &amp;gt; 2.2.2.2.4500: udp 660&lt;BR /&gt; 20: 23:37:16.532351 2.2.2.2.4500 &amp;gt; 1.1.1.1.4500: udp 100&lt;BR /&gt;20 packets shown&lt;BR /&gt;PCVST-ASA#&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3308510#M1000504</guid>
      <dc:creator>blwegrzyn</dc:creator>
      <dc:date>2020-02-21T15:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309227#M1000506</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/254237"&gt;@blwegrzyn&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you test with a packet-tracer and verify what is happening to the traffic once it reaches the ASA?.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input inside icmp &amp;lt;IP IN Network&amp;gt; 8 0 172.31.48.1 detail&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 19:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309227#M1000506</guid>
      <dc:creator>GioGonza</dc:creator>
      <dc:date>2018-01-10T19:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309293#M1000508</link>
      <description>&lt;P&gt;I concur with the suggestion for packet tracer, that should tell you if it is actually hitting the crypto acl and going to be sent over the tunnel. You could also send traffic and make sure you see encaps / de-encaps on show crypto ipsec sa. If you see it getting encapsulated, then you know it at least is getting to their side. If you don't see any de-encaps for the return traffic you know the issue is on their side.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 20:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309293#M1000508</guid>
      <dc:creator>mls577</dc:creator>
      <dc:date>2018-01-10T20:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309341#M1000510</link>
      <description>&lt;P&gt;The traffic&amp;nbsp; work when client initiates the connections.&lt;/P&gt;
&lt;P&gt;He is on amazon VPC, and he claims that all acls are ok.&lt;/P&gt;
&lt;P&gt;When i initiate the connection i get encap but no decap.&lt;/P&gt;
&lt;P&gt;Is seeing encap enough to prove to the client that i am sending the traffic to him?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 22:52:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309341#M1000510</guid>
      <dc:creator>blwegrzyn</dc:creator>
      <dc:date>2018-01-10T22:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309343#M1000512</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/254237"&gt;@blwegrzyn&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing you need to keep in mind, VPN tunnels with Amazon support only 1 ACL on the crypto map that´s why they recommend to use "any" as source of the traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another thing will be to check the configuration on your side but if you can see encaps that means the traffic is being sent to them and they should be able to see it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 22:58:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309343#M1000512</guid>
      <dc:creator>GioGonza</dc:creator>
      <dc:date>2018-01-10T22:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309452#M1000513</link>
      <description>Yes my case is exactly where traffic hits the tunnel and I see encap but no decap.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 11 Jan 2018 04:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309452#M1000513</guid>
      <dc:creator>blwegrzyn</dc:creator>
      <dc:date>2018-01-11T04:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309885#M1000514</link>
      <description>&lt;P&gt;yes amazon says in their guide:&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;
&lt;P&gt;! This access list should contain a static route corresponding to your VPC CIDR and allow traffic from any subnet.&lt;BR /&gt;! If you do not wish to use the "any" source, you must use a single access-list entry for accessing the VPC range.&lt;BR /&gt;! If you specify more than one entry for this ACL without using "any" as the source, the VPN will function erratically.&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So in my case i have:&lt;/P&gt;
&lt;P&gt;access-list acl-aws extended permit ip object AWS-Src-10.213.0.0 object AWS-Dest-172.31.48.0&lt;/P&gt;
&lt;P&gt;where:&lt;/P&gt;
&lt;P&gt;object network AWS-Dest-172.31.48.0&lt;BR /&gt; subnet 172.31.48.0 255.255.240.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network AWS-Src-10.213.0.0&lt;BR /&gt; subnet 10.213.0.0 255.255.0.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So that works fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It must be the other end security rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PCVST-ASA# packet-tracer input inside icmp 10.213.3.12 8 0 172.31.48.1&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static AWS-Src-10.213.0.0 AWS-Src-10.213.0.0 destination static AWS-Dest-172.31.48.0 AWS-Dest-172.31.48.0&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 172.31.48.1/0 to 172.31.48.1/0&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group FROM_INSIDE in interface inside&lt;BR /&gt;access-list FROM_INSIDE extended permit icmp any any object-group TRACEroute&lt;BR /&gt;object-group icmp-type TRACEroute&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object echo&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static AWS-Src-10.213.0.0 AWS-Src-10.213.0.0 destination static AWS-Dest-172.31.48.0 AWS-Dest-172.31.48.0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.213.3.12/0 to 10.213.3.12/0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map FIREPOWER&lt;BR /&gt; match access-list FIREPOWER&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class FIREPOWER&lt;BR /&gt; sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static AWS-Src-10.213.0.0 AWS-Src-10.213.0.0 destination static AWS-Dest-172.31.48.0 AWS-Dest-172.31.48.0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 14&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 15&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 16&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 17&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 18&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 36549835, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2018 15:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309885#M1000514</guid>
      <dc:creator>blwegrzyn</dc:creator>
      <dc:date>2018-01-11T15:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309932#M1000515</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/254237"&gt;@blwegrzyn&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are sending the traffic so you need to follow up with AWS in order to verify what´s happening to your traffic since the ASA is doing what he is suppposed to do.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Gio&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2018 16:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3309932#M1000515</guid>
      <dc:creator>GioGonza</dc:creator>
      <dc:date>2018-01-11T16:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3345660#M1000516</link>
      <description>&lt;P&gt;i also found that below commands is helpful:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# capture asp type asp-drop all circular buffer 33554432&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 16:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3345660#M1000516</guid>
      <dc:creator>blwegrzyn</dc:creator>
      <dc:date>2018-03-09T16:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3345661#M1000517</link>
      <description>&lt;P&gt;I&amp;nbsp;also found that below command can be helpful:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# capture asp type asp-drop all circular buffer 33554432&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 16:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3345661#M1000517</guid>
      <dc:creator>blwegrzyn</dc:creator>
      <dc:date>2018-03-09T16:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Asa Troubleshooting IPSEC traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3346816#M1000518</link>
      <description>&lt;P&gt;And how did you use it? What did it show for you in this case?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Mar 2018 15:05:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-troubleshooting-ipsec-traffic/m-p/3346816#M1000518</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-03-12T15:05:29Z</dc:date>
    </item>
  </channel>
</rss>

