<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC over VTI not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3207740#M1065902</link>
    <description>&lt;P&gt;Hello Andrew.&lt;/P&gt;
&lt;P&gt;I have absolutely the same problem with the same port numbers. If you found the solution could you please share it? I think many people would be really greatful for that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Igor&lt;/P&gt;</description>
    <pubDate>Mon, 30 Oct 2017 20:02:41 GMT</pubDate>
    <dc:creator>ilkulagin</dc:creator>
    <dc:date>2017-10-30T20:02:41Z</dc:date>
    <item>
      <title>IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3187988#M1065892</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a new ISR4321 router which is replacing an ISR877. The ISR4321 has two IPSEC over VTI connections to two other ISR's. The ISR4321 is unable to establish IPSEC over VTI, but simple GRE over VTI works fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ISAKMP response&amp;nbsp;on the remote ISR's is trying to return to port 512 not port 500 on the ISR4321. I think this is the issue, but I don't know how to resolve it. It must be caused by the ISR4321 as it happens on all remote ISRs: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Sep 22 2017 11:21:15 BST: ISAKMP (0): received packet from 1.1.1.1 dport 500 sport 512 Global (I) MM_SA_SETUP
Sep 22 2017 11:21:15 BST: ISAKMP:(0): phase 1 packet is a duplicate of a previous packet.
Sep 22 2017 11:21:15 BST: ISAKMP:(0): retransmitting due to retransmit phase 1
Sep 22 2017 11:21:15 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:15 BST: ISAKMP (0): incrementing error counter on sa, attempt 4 of 5: retransmit phase 1
Sep 22 2017 11:21:15 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP
Sep 22 2017 11:21:15 BST: ISAKMP:(0): sending packet to 1.1.1.1 my_port 500 peer_port 512 (I) MM_SA_SETUP&lt;/PRE&gt;&lt;P&gt;Here is a full debug from a remote ISR: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing SA payload. message ID = 0
Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP (0): vendor ID is NAT-T RFC 3947
Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP (0): vendor ID is NAT-T v7
Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID is NAT-T v3
Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID is NAT-T v2
Sep 22 2017 11:21:08 BST: ISAKMP:(0):found peer pre-shared key matching 1.1.1.1
Sep 22 2017 11:21:08 BST: ISAKMP:(0): local preshared key found
Sep 22 2017 11:21:08 BST: ISAKMP : Scanning profiles for xauth ...
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 policy
Sep 22 2017 11:21:08 BST: ISAKMP:      encryption AES-CBC
Sep 22 2017 11:21:08 BST: ISAKMP:      keylength of 256
Sep 22 2017 11:21:08 BST: ISAKMP:      hash SHA
Sep 22 2017 11:21:08 BST: ISAKMP:      default group 5
Sep 22 2017 11:21:08 BST: ISAKMP:      auth pre-share
Sep 22 2017 11:21:08 BST: ISAKMP:      life type in seconds
Sep 22 2017 11:21:08 BST: ISAKMP:      life duration (basic) of 3600
Sep 22 2017 11:21:08 BST: ISAKMP:(0):atts are acceptable. Next payload is 0
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Acceptable atts:actual life: 0
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Acceptable atts:life: 0
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Basic life_in_seconds:3600
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Returning Actual lifetime: 3600
Sep 22 2017 11:21:08 BST: ISAKMP:(0)::Started lifetime timer: 3600.

Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP (0): vendor ID is NAT-T RFC 3947
Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP (0): vendor ID is NAT-T v7
Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID is NAT-T v3
Sep 22 2017 11:21:08 BST: ISAKMP:(0): processing vendor id payload
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
Sep 22 2017 11:21:08 BST: ISAKMP:(0): vendor ID is NAT-T v2
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM1

Sep 22 2017 11:21:08 BST: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Sep 22 2017 11:21:08 BST: ISAKMP:(0): sending packet to 1.1.1.1 my_port 500 peer_port 512 (R) MM_SA_SETUP
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Sending an IKE IPv4 Packet.
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM2

Sep 22 2017 11:21:08 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:08 BST: ISAKMP:(0):peer does not do paranoid keepalives.

Sep 22 2017 11:21:08 BST: ISAKMP:(0):deleting SA reason "Death by retransmission P1" state (R) MM_SA_SETUP (peer 1.1.1.1)
Sep 22 2017 11:21:08 BST: ISAKMP:(0):deleting SA reason "Death by retransmission P1" state (R) MM_SA_SETUP (peer 1.1.1.1)
Sep 22 2017 11:21:08 BST: ISAKMP: Unlocking peer struct 0x852FE83C for isadb_mark_sa_deleted(), count 0
Sep 22 2017 11:21:08 BST: ISAKMP: Deleting peer node by peer_reap for 1.1.1.1: 852FE83C
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Sep 22 2017 11:21:08 BST: ISAKMP:(0):Old State = IKE_R_MM2  New State = IKE_DEST_SA

Sep 22 2017 11:21:15 BST: ISAKMP (0): received packet from 1.1.1.1 dport 500 sport 512 Global (I) MM_SA_SETUP
Sep 22 2017 11:21:15 BST: ISAKMP:(0): phase 1 packet is a duplicate of a previous packet.
Sep 22 2017 11:21:15 BST: ISAKMP:(0): retransmitting due to retransmit phase 1
Sep 22 2017 11:21:15 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:15 BST: ISAKMP (0): incrementing error counter on sa, attempt 4 of 5: retransmit phase 1
Sep 22 2017 11:21:15 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP
Sep 22 2017 11:21:15 BST: ISAKMP:(0): sending packet to 1.1.1.1 my_port 500 peer_port 512 (I) MM_SA_SETUP
Sep 22 2017 11:21:15 BST: ISAKMP:(0):Sending an IKE IPv4 Packet.
Sep 22 2017 11:21:18 BST: ISAKMP (0): received packet from 1.1.1.1 dport 500 sport 512 Global (R) MM_SA_SETUP
Sep 22 2017 11:21:18 BST: ISAKMP:(0): phase 1 packet is a duplicate of a previous packet.
Sep 22 2017 11:21:18 BST: ISAKMP:(0): retransmitting due to retransmit phase 1
Sep 22 2017 11:21:19 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:19 BST: ISAKMP (0): incrementing error counter on sa, attempt 1 of 5: retransmit phase 1
Sep 22 2017 11:21:19 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP
Sep 22 2017 11:21:19 BST: ISAKMP:(0): sending packet to 1.1.1.1 my_port 500 peer_port 512 (R) MM_SA_SETUP
Sep 22 2017 11:21:19 BST: ISAKMP:(0):Sending an IKE IPv4 Packet.
R1003951#
Sep 22 2017 11:21:25 BST: ISAKMP (0): received packet from 1.1.1.1 dport 500 sport 512 Global (I) MM_SA_SETUP
Sep 22 2017 11:21:25 BST: ISAKMP:(0): phase 1 packet is a duplicate of a previous packet.
Sep 22 2017 11:21:25 BST: ISAKMP:(0): retransmitting due to retransmit phase 1
Sep 22 2017 11:21:25 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:25 BST: ISAKMP (0): incrementing error counter on sa, attempt 5 of 5: retransmit phase 1
Sep 22 2017 11:21:25 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP
Sep 22 2017 11:21:25 BST: ISAKMP:(0): sending packet to 1.1.1.1 my_port 500 peer_port 512 (I) MM_SA_SETUP
Sep 22 2017 11:21:25 BST: ISAKMP:(0):Sending an IKE IPv4 Packet.
Sep 22 2017 11:21:28 BST: ISAKMP (0): received packet from 1.1.1.1 dport 500 sport 512 Global (R) MM_SA_SETUP
Sep 22 2017 11:21:28 BST: ISAKMP:(0): phase 1 packet is a duplicate of a previous packet.
Sep 22 2017 11:21:28 BST: ISAKMP:(0): retransmitting due to retransmit phase 1
Sep 22 2017 11:21:29 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:29 BST: ISAKMP (0): incrementing error counter on sa, attempt 2 of 5: retransmit phase 1
Sep 22 2017 11:21:29 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP
Sep 22 2017 11:21:29 BST: ISAKMP:(0): sending packet to 1.1.1.1 my_port 500 peer_port 512 (R) MM_SA_SETUP
Sep 22 2017 11:21:29 BST: ISAKMP:(0):Sending an IKE IPv4 Packet.
Sep 22 2017 11:21:35 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:35 BST: ISAKMP:(0):peer does not do paranoid keepalives.

Sep 22 2017 11:21:35 BST: ISAKMP:(0):deleting SA reason "Death by retransmission P1" state (I) MM_SA_SETUP (peer 1.1.1.1)
Sep 22 2017 11:21:35 BST: ISAKMP:(0):deleting SA reason "Death by retransmission P1" state (I) MM_SA_SETUP (peer 1.1.1.1)
Sep 22 2017 11:21:35 BST: ISAKMP: Unlocking peer struct 0x85725B18 for isadb_mark_sa_deleted(), count 0
Sep 22 2017 11:21:35 BST: ISAKMP: Deleting peer node by peer_reap for 1.1.1.1: 85725B18
Sep 22 2017 11:21:35 BST: ISAKMP:(0):deleting node -2087223094 error FALSE reason "IKE deleted"
Sep 22 2017 11:21:35 BST: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Sep 22 2017 11:21:35 BST: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_DEST_SA

Sep 22 2017 11:21:38 BST: ISAKMP (0): received packet from 1.1.1.1 dport 500 sport 512 Global (R) MM_SA_SETUP
Sep 22 2017 11:21:38 BST: ISAKMP:(0): phase 1 packet is a duplicate of a previous packet.
Sep 22 2017 11:21:38 BST: ISAKMP:(0): retransmitting due to retransmit phase 1
Sep 22 2017 11:21:39 BST: ISAKMP:(0): retransmitting phase 1 MM_SA_SETUP...
Sep 22 2017 11:21:39 BST: ISAKMP (0): incrementing error counter on sa, attempt 3 of 5: retransmit phase 1&lt;/PRE&gt;&lt;P&gt;Here is a config from the ISR4321 (first time I have used ZBF): -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;class-map type inspect match-any CM_ZP_ANY
 match access-group name ACL_ANY
class-map type inspect match-any CM_ZP_IN-OUT
 match protocol dns
 match protocol icmp
 match protocol http
 match protocol https
 match protocol ssh
 match access-group name ACL_ZP_IN-OUT
class-map type inspect match-any CM_L2L
 match access-group name ACL_L2L
class-map type inspect match-any CM_ZP_OUT-LO
 match access-group name ACL_ZP_OUT-LO
class-map type inspect match-any CM_ZP_LO-OUT
 match access-group name ACL_ZP_LO-OUT
class-map type inspect match-any CM_ZP_IN-WAN
 match access-group name ACL_ZP_IN-WAN
class-map type inspect match-any CM_ZP_WAN-IN
 match access-group name ACL_ZP_WAN-IN
!
policy-map type inspect PM_ZP_IN-WAN
 class type inspect CM_ZP_IN-WAN
  inspect
 class class-default
  drop log
policy-map type inspect PM_ZP-LO-OUT
 class type inspect CM_L2L
  pass log
 class type inspect CM_ZP_LO-OUT
  pass log
 class class-default
  drop log
policy-map type inspect PM_ZP-OUT-LO
 class type inspect CM_L2L
  pass log
 class type inspect CM_ZP_OUT-LO
  pass log
 class class-default
  drop log
policy-map type inspect PM_ZP-IN-OUT
 class type inspect CM_ZP_IN-OUT
  inspect
 class class-default
  drop log
policy-map type inspect PM_ZP_WAN-IN
 class type inspect CM_ZP_WAN-IN
  inspect
 class class-default
  drop log
!
zone security Z_IN
zone security Z_OUT
zone security Z_WAN
zone-pair security ZP_IN-OUT source Z_IN destination Z_OUT
 service-policy type inspect PM_ZP-IN-OUT
zone-pair security ZP_IN-WAN source Z_IN destination Z_WAN
 service-policy type inspect PM_ZP_IN-WAN
zone-pair security ZP_LO-OUT source self destination Z_OUT
 service-policy type inspect PM_ZP-LO-OUT
zone-pair security ZP_OUT-LO source Z_OUT destination self
 service-policy type inspect PM_ZP-OUT-LO
zone-pair security ZP_WAN-IN source Z_WAN destination Z_IN
 service-policy type inspect PM_ZP_WAN-IN
!
crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 5
 lifetime 3600
crypto isakmp key xxxx address 2.2.2.2
!
!
crypto ipsec transform-set CITS_1 esp-aes esp-sha512-hmac
 mode transport
!
crypto ipsec profile CIP_1
 set transform-set CITS_1
!
!interface Loopback0
 ip address 1.2.50.79 255.255.255.255
!
interface Tunnel1002
 ip address 10.144.226.5 255.255.255.254
 ip mtu 1300
 ip tcp adjust-mss 1260
 tunnel source Dialer1
 tunnel mode ipsec ipv4
 tunnel destination 2.2.2.2
 tunnel protection ipsec profile CIP_1
!
interface Ethernet0/2/0
 no ip address
 no negotiation auto
!
interface Ethernet0/2/0.101
 encapsulation dot1Q 101
 pppoe enable group global
 pppoe-client dial-pool-number 1
!
interface Vlan1
 description LAN/WIFI
 ip address 10.144.144.254 255.255.255.0
 ip nat inside
 zone-member security Z_IN
!
interface Dialer1
 ip address negotiated
 ip nat outside
 zone-member security Z_OUT
 encapsulation ppp
 ip tcp adjust-mss 1452
 dialer pool 1
 ppp mtu adaptive
 ppp authentication chap callin
 ppp chap hostname x
 ppp chap password 7 x
!
ip nat inside source list ACL_NAT interface Dialer1 overload
ip forward-protocol nd
no ip http server
no ip http secure-server
ip tftp source-interface Vlan1
ip route 0.0.0.0 0.0.0.0 Dialer1 permanent
ip route 10.145.0.0 255.255.224.0 Tunnel1001
ip route 192.168.0.0 255.255.254.0 Tunnel1001
ip route 192.168.254.0 255.255.255.0 Tunnel1001
!
ip ssh logging events
ip ssh version 2
ip ssh dh min size 4096
ip ssh server algorithm encryption aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes192-ctr aes256-ctr
!
!
ip access-list extended ACL_L2L
 permit ip any any
ip access-list extended ACL_NAT
 deny   ip any object-group OGN_RFC1918
 permit ip any any
ip access-list extended ACL_VPN_L2L
 permit object-group OGS_VPN_L2L object-group OGN_VPN_L2L any
 permit object-group OGS_VPN_L2L any object-group OGN_VPN_L2L
 permit gre any any
 permit esp any any
 permit udp any eq isakmp any eq isakmp
ip access-list extended ACL_VTY_IN
 permit tcp 82.118.108.48 0.0.0.15 any
 permit tcp host 212.105.163.218 any
 permit tcp host 78.25.251.240 any
 permit tcp host 78.25.251.241 any
 permit tcp 10.144.144.0 0.0.0.255 any
 permit tcp host 10.145.1.111 any
 deny   ip any any log
ip access-list extended ACL_ZP_IN-OUT
 permit ip object-group OGN_LAN object-group OGN_RFC1918 log
 permit ip any any
 permit object-group OGS_IN-OUT object-group OGN_LAN any
ip access-list extended ACL_ZP_IN-WAN
 permit ip any any
ip access-list extended ACL_ZP_LO-OUT
 permit icmp any any
 permit tcp any object-group OGN_DATCOM eq 22
 permit udp any object-group OGN_DNS eq domain
 permit tcp any object-group OGN_DNS eq domain
 permit udp any any eq ntp
 permit object-group OGS_VPN_L2L any object-group OGN_VPN_L2L
 permit udp any eq domain any
ip access-list extended ACL_ZP_OUT-LO
 permit icmp object-group OGN_DATCOM any
 permit tcp object-group OGN_DATCOM any eq 22
 permit object-group OGS_VPN_L2L object-group OGN_VPN_L2L any
ip access-list extended ACL_ZP_WAN-IN
 permit ip any any&lt;/PRE&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3187988#M1065892</guid>
      <dc:creator>apstownsend</dc:creator>
      <dc:date>2020-02-21T14:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3188335#M1065893</link>
      <description>Hi can you share the config of the remote router?</description>
      <pubDate>Sat, 23 Sep 2017 00:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3188335#M1065893</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-23T00:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3188821#M1065894</link>
      <description>Hi Francesco,&lt;BR /&gt;&lt;BR /&gt;Here you go: -&lt;BR /&gt;&lt;BR /&gt;! NVRAM config last updated at 04:00:00 BST Sun Sep 24 2017&lt;BR /&gt;version 15.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime localtime show-timezone year&lt;BR /&gt;service timestamps log datetime localtime show-timezone year&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname R1003951&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging buffered 4096 informational&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication ppp default local&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa authorization network default local&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone GMT 0 0&lt;BR /&gt;clock summer-time BST recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot11 syslog&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip domain name somedomain.com&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip name-server 8.8.4.4&lt;BR /&gt;login on-failure log&lt;BR /&gt;login on-success log&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt;path &lt;A href="ftp://somedomain.com/upload/cisco/backup/BK1003951" target="_blank"&gt;ftp://somedomain.com/upload/cisco/backup/BK1003951&lt;/A&gt;&lt;BR /&gt;write-memory&lt;BR /&gt;time-period 1440&lt;BR /&gt;object-group network DNS-SERVERS&lt;BR /&gt;host 8.8.8.8&lt;BR /&gt;host 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;object-group service EX-IN-ALL&lt;BR /&gt;tcp eq ftp-data&lt;BR /&gt;!&lt;BR /&gt;object-group network OGN_COMPANY&lt;BR /&gt;host 1.1.1.1&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;no ip ftp passive&lt;BR /&gt;ip ftp username sd_ftp_cisco&lt;BR /&gt;ip ftp password 7 111111&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 3600&lt;BR /&gt;crypto isakmp key xxxx address 3.3.3.3&lt;BR /&gt;crypto isakmp key xxxx address 1.1.1.1&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set CITS_1 esp-aes esp-sha512-hmac&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile CIP_1&lt;BR /&gt;set transform-set CITS_1&lt;BR /&gt;!&lt;BR /&gt;interface Loopback0&lt;BR /&gt;ip address 10.0.39.51 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1002&lt;BR /&gt;description to "L2L"&lt;BR /&gt;ip address 10.144.226.4 255.255.255.254&lt;BR /&gt;ip mtu 1300&lt;BR /&gt;ip tcp adjust-mss 1260&lt;BR /&gt;tunnel source 2.2.2.2&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination 1.1.1.1&lt;BR /&gt;tunnel protection ipsec profile CIP_1&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1005&lt;BR /&gt;description "L2L/R1003326/DSL1007952"&lt;BR /&gt;ip address 10.144.226.10 255.255.255.254&lt;BR /&gt;ip mtu 1400&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;tunnel source 2.2.2.2&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination 3.3.3.3&lt;BR /&gt;tunnel protection ipsec profile CIP_1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;ip address 2.2.2.2 255.255.255.248&lt;BR /&gt;ip access-group F4-IN in&lt;BR /&gt;ip access-group F4-OUT out&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;ip address 10.9.98.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Dialer1&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 82.118.127.233&lt;BR /&gt;ip route 10.1.10.0 255.255.255.0 10.9.98.192 permanent&lt;BR /&gt;ip route 10.9.99.0 255.255.255.0 10.9.98.192 permanent&lt;BR /&gt;ip route 10.11.4.0 255.255.255.0 10.9.98.192 permanent&lt;BR /&gt;ip route 10.144.144.0 255.255.255.0 Tunnel1002&lt;BR /&gt;ip route 10.145.0.0 255.255.254.0 Tunnel1005&lt;BR /&gt;ip route 192.168.254.0 255.255.255.0 Tunnel1005&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended F4-IN&lt;BR /&gt;permit ip any any&lt;BR /&gt;permit ip object-group OGN_COMPANY any&lt;BR /&gt;permit udp object-group DNS-SERVERS eq domain any&lt;BR /&gt;permit udp any eq ntp any eq ntp&lt;BR /&gt;evaluate F4-REFLEX&lt;BR /&gt;deny ip any any log&lt;BR /&gt;ip access-list extended F4-OUT&lt;BR /&gt;permit ip any any reflect F4-REFLEX timeout 300&lt;BR /&gt;ip access-list extended VTY-IN&lt;BR /&gt;permit tcp object-group OGN_COMPANY any&lt;BR /&gt;permit tcp 10.9.99.0 0.0.0.255 any&lt;BR /&gt;permit tcp 10.9.98.0 0.0.0.255 any&lt;BR /&gt;permit tcp 192.168.254.0 0.0.0.255 any&lt;BR /&gt;permit tcp 192.168.252.0 0.0.0.255 any&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;kron occurrence daily-backup at 4:00 recurring&lt;BR /&gt;policy-list daily-backup&lt;BR /&gt;!&lt;BR /&gt;kron policy-list daily-backup&lt;BR /&gt;cli write&lt;BR /&gt;!&lt;BR /&gt;logging facility local6&lt;BR /&gt;logging source-interface Vlan1&lt;BR /&gt;logging 10.9.99.1&lt;BR /&gt;logging host 10.9.99.1 transport tcp port 3951&lt;BR /&gt;!&lt;BR /&gt;snmp-server ifindex persist&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;no modem enable&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class VTY-IN in&lt;BR /&gt;transport preferred ssh&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output ssh&lt;BR /&gt;!&lt;BR /&gt;ntp server uk.pool.ntp.org&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Andrew</description>
      <pubDate>Mon, 25 Sep 2017 07:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3188821#M1065894</guid>
      <dc:creator>apstownsend</dc:creator>
      <dc:date>2017-09-25T07:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3189031#M1065895</link>
      <description>Thanks. Can you paste the full config of your 1st router? I wanted to validate also all groups used within your ACLs?&lt;BR /&gt;</description>
      <pubDate>Mon, 25 Sep 2017 13:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3189031#M1065895</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-25T13:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3189060#M1065896</link>
      <description>&lt;P&gt;Can you share the output in a text file for below commands on both&amp;nbsp;routers:&lt;/P&gt;
&lt;P&gt;- sh cryp isak sa&lt;/P&gt;
&lt;P&gt;- sh cryp ipsec sa&lt;/P&gt;
&lt;P&gt;- sh ip int bri | ex unas&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On your 1st router, I've seen some ACE without any protocols and those shouldn't work, like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL_VPN_L2L&lt;BR /&gt; permit object-group OGS_VPN_L2L object-group OGN_VPN_L2L any&lt;BR /&gt; permit object-group OGS_VPN_L2L any object-group OGN_VPN_L2L&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL_ZP_LO-OUT&lt;BR /&gt; permit object-group OGS_VPN_L2L any object-group OGN_VPN_L2L&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL_ZP_OUT-LO&lt;BR /&gt; permit object-group OGS_VPN_L2L object-group OGN_VPN_L2L any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share the output on your 1st router for command:&lt;/P&gt;
&lt;P&gt;- sh access-list&amp;nbsp;&lt;SPAN&gt;ACL_VPN_L2L&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- sh access-list ACL_ZP_LO-OUT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- sh access-list&amp;nbsp;ACL_ZP_OUT-LO&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Maybe it's just a copy/paste issue.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Except that, even with ZBF, you tunnel should be UP.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'll wait for your object-groups to validate.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2017 13:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3189060#M1065896</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-25T13:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190028#M1065897</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R1025079#sh crypto isakmp sa&lt;BR /&gt;IPv4 Crypto ISAKMP SA&lt;BR /&gt;dst src state conn-id status&lt;BR /&gt;1.1.1.1 2.2.2.2 MM_SA_SETUP 0 ACTIVE&lt;BR /&gt;1.1.1.1 2.2.2.2 MM_SA_SETUP 0 ACTIVE&lt;BR /&gt;2.2.2.2 1.1.1.1 MM_NO_STATE 0 ACTIVE&lt;BR /&gt;2.2.2.2 1.1.1.1 MM_NO_STATE 0 ACTIVE (deleted)&lt;/P&gt;&lt;P&gt;IPv6 Crypto ISAKMP SA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;R1025079#sh crypto ipsec sa&lt;/P&gt;&lt;P&gt;interface: Tunnel1002&lt;BR /&gt;Crypto map tag: Tunnel1002-head-0, local addr 1.1.1.1&lt;/P&gt;&lt;P&gt;protected vrf: (none)&lt;BR /&gt;local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;BR /&gt;current_peer 2.2.2.2 port 500&lt;BR /&gt;PERMIT, flags={origin_is_acl,}&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;#pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;#send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: 1.1.1.1, remote crypto endpt.: 2.2.2.2&lt;BR /&gt;plaintext mtu 1492, path mtu 1492, ip mtu 1492, ip mtu idb Dialer1&lt;BR /&gt;current outbound spi: 0x0(0)&lt;BR /&gt;PFS (Y/N): N, DH group: none&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;/P&gt;&lt;P&gt;inbound ah sas:&lt;/P&gt;&lt;P&gt;inbound pcp sas:&lt;/P&gt;&lt;P&gt;outbound esp sas:&lt;/P&gt;&lt;P&gt;outbound ah sas:&lt;/P&gt;&lt;P&gt;outbound pcp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R1025079#sh ip int bri | ex unas&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;Dialer1 1.1.1.1 YES IPCP up up&lt;BR /&gt;Loopback0 1.2.50.79 YES NVRAM up up&lt;BR /&gt;Tunnel1001 10.144.226.3 YES NVRAM up up&lt;BR /&gt;Tunnel1002 10.144.226.5 YES NVRAM up down&lt;/P&gt;&lt;P&gt;Vlan1 10.144.144.254 YES NVRAM up up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network OGN_COMPANY&lt;BR /&gt;host&amp;nbsp;2.2.2.2&lt;BR /&gt;host&amp;nbsp;3.3.3.3&lt;BR /&gt;!&lt;BR /&gt;object-group network OGN_DNS&lt;BR /&gt;host 208.67.222.222&lt;BR /&gt;host 208.67.220.220&lt;BR /&gt;host 8.8.8.8&lt;BR /&gt;host 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;object-group network OGN_LAN&lt;BR /&gt;10.144.144.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object-group network OGN_RFC1918&lt;BR /&gt;10.0.0.0 255.0.0.0&lt;BR /&gt;192.168.0.0 255.255.0.0&lt;BR /&gt;172.0.0.0 255.224.0.0&lt;BR /&gt;!&lt;BR /&gt;object-group network OGN_VPN_L2L&lt;BR /&gt;&lt;SPAN&gt;host&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;2.2.2.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;3.3.3.3&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;object-group service OGS_IN-OUT&lt;BR /&gt;tcp-udp eq 3389&lt;BR /&gt;tcp eq 993&lt;BR /&gt;tcp eq 5222&lt;BR /&gt;udp eq ntp&lt;BR /&gt;tcp eq 5223&lt;BR /&gt;!&lt;BR /&gt;object-group service OGS_VPN_L2L&lt;BR /&gt;gre&lt;BR /&gt;udp eq isakmp&lt;BR /&gt;udp eq non500-isakmp&lt;BR /&gt;icmp&lt;BR /&gt;esp&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R1025079#sh access-l ACL_VPN_L2L&lt;BR /&gt;Extended IP access list ACL_VPN_L2L&lt;BR /&gt;10 permit object-group OGS_VPN_L2L object-group OGN_VPN_L2L any&lt;BR /&gt;20 permit object-group OGS_VPN_L2L any object-group OGN_VPN_L2L&lt;BR /&gt;30 permit gre any any&lt;BR /&gt;40 permit esp any any&lt;BR /&gt;50 permit udp any eq isakmp any eq isakmp&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;R1025079#sh access-l ACL_ZP_LO-OUT&lt;BR /&gt;Extended IP access list ACL_ZP_LO-OUT&lt;BR /&gt;10 permit icmp any any&lt;BR /&gt;20 permit tcp any object-group &lt;SPAN&gt;OGN_&lt;/SPAN&gt;&lt;SPAN&gt;COMPANY&amp;nbsp;&lt;/SPAN&gt;eq 22&lt;BR /&gt;30 permit udp any object-group OGN_DNS eq domain&lt;BR /&gt;40 permit tcp any object-group OGN_DNS eq domain&lt;BR /&gt;50 permit udp any any eq ntp&lt;BR /&gt;60 permit object-group OGS_VPN_L2L any object-group OGN_VPN_L2L&lt;BR /&gt;70 permit udp any eq domain any&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;R1025079#sh access-l ACL_ZP_OUT-LO&lt;BR /&gt;Extended IP access list ACL_ZP_OUT-LO&lt;BR /&gt;10 permit icmp object-group OGN_COMPANY any&lt;BR /&gt;20 permit tcp object-group &lt;SPAN&gt;OGN_&lt;/SPAN&gt;&lt;SPAN&gt;COMPANY&amp;nbsp;&lt;/SPAN&gt;any eq 22&lt;BR /&gt;30 permit object-group OGS_VPN_L2L object-group OGN_VPN_L2L any&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 06:05:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190028#M1065897</guid>
      <dc:creator>apstownsend</dc:creator>
      <dc:date>2017-09-27T06:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190032#M1065898</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the remote side: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R1003951#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 5853 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 10:29:46 BST Fri Sep 22 2017 by COMPANY&lt;BR /&gt;! NVRAM config last updated at 04:00:00 BST Wed Sep 27 2017&lt;BR /&gt;! NVRAM config last updated at 04:00:00 BST Wed Sep 27 2017&lt;BR /&gt;version 15.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime localtime show-timezone year&lt;BR /&gt;service timestamps log datetime localtime show-timezone year&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname R1003951&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging buffered 4096 informational&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication ppp default local&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa authorization network default local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone GMT 0 0&lt;BR /&gt;clock summer-time BST recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot11 syslog&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip inspect name INSPECT ntp&lt;BR /&gt;ip inspect name INSPECT icmp&lt;BR /&gt;ip domain name new.uk.COMPANY.co.uk&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip name-server 8.8.4.4&lt;BR /&gt;login on-failure log&lt;BR /&gt;login on-success log&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt;path /upload/cisco/backup/BK1003951&lt;BR /&gt;write-memory&lt;BR /&gt;time-period 1440&lt;BR /&gt;object-group network DNS-SERVERS&lt;BR /&gt;host 8.8.8.8&lt;BR /&gt;host 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;object-group service EX-IN-ALL&lt;BR /&gt;tcp eq ftp-data&lt;BR /&gt;!&lt;BR /&gt;object-group network OGN_COMPANY&lt;BR /&gt;host 1.1.1.1&lt;BR /&gt;host 3.3.3.3&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip ftp passive&lt;BR /&gt;ip ftp username sd_ftp_cisco&lt;BR /&gt;ip ftp password 7 x&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 3600&lt;BR /&gt;crypto isakmp key RgHRUM1oCb4khQJpPG2D address 3.3.3.3&lt;BR /&gt;crypto isakmp key JIcv5U3yB8gBg2x33Yfn address 1.1.1.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set CITS_1 esp-aes esp-sha512-hmac&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile CIP_1&lt;BR /&gt;set transform-set CITS_1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Loopback0&lt;BR /&gt;ip address 10.0.39.51 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1002&lt;BR /&gt;ip address 10.144.226.4 255.255.255.254&lt;BR /&gt;ip mtu 1400&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;tunnel source 2.2.2.2&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination 1.1.1.1&lt;BR /&gt;tunnel protection ipsec profile CIP_1&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1005&lt;BR /&gt;description "L2L/GRANTHAM/R1003326/DSL1007952"&lt;BR /&gt;ip address 10.144.226.10 255.255.255.254&lt;BR /&gt;ip mtu 1400&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;tunnel source 2.2.2.2&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination 3.3.3.3&lt;BR /&gt;tunnel protection ipsec profile CIP_1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;ip address 2.2.2.2 255.255.255.248&lt;BR /&gt;ip access-group F4-IN in&lt;BR /&gt;ip access-group F4-OUT out&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;ip address 10.9.98.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Dialer1&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 82.118.127.233&lt;BR /&gt;ip route 10.1.10.0 255.255.255.0 10.9.98.192 permanent&lt;BR /&gt;ip route 10.9.99.0 255.255.255.0 10.9.98.192 permanent&lt;BR /&gt;ip route 10.11.4.0 255.255.255.0 10.9.98.192 permanent&lt;BR /&gt;ip route 10.144.144.0 255.255.255.0 Tunnel1002&lt;BR /&gt;ip route 10.145.0.0 255.255.254.0 Tunnel1005&lt;BR /&gt;ip route 192.168.254.0 255.255.255.0 Tunnel1005&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended F4-IN&lt;BR /&gt;permit ip any any&lt;BR /&gt;permit ip object-group OGN_COMPANY any&lt;BR /&gt;permit udp object-group DNS-SERVERS eq domain any&lt;BR /&gt;permit udp any eq ntp any eq ntp&lt;BR /&gt;evaluate F4-REFLEX&lt;BR /&gt;deny ip any any log&lt;BR /&gt;ip access-list extended F4-OUT&lt;BR /&gt;permit ip any any reflect F4-REFLEX timeout 300&lt;BR /&gt;ip access-list extended VTY-IN&lt;BR /&gt;permit tcp object-group OGN_COMPANY any&lt;BR /&gt;permit tcp 10.9.99.0 0.0.0.255 any&lt;BR /&gt;permit tcp 10.9.98.0 0.0.0.255 any&lt;BR /&gt;permit tcp 192.168.254.0 0.0.0.255 any&lt;BR /&gt;permit tcp 192.168.252.0 0.0.0.255 any&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;kron occurrence daily-backup at 4:00 recurring&lt;BR /&gt;policy-list daily-backup&lt;BR /&gt;!&lt;BR /&gt;kron policy-list daily-backup&lt;BR /&gt;cli write&lt;BR /&gt;!&lt;BR /&gt;logging facility local6&lt;BR /&gt;logging source-interface Vlan1&lt;BR /&gt;logging 10.9.99.1&lt;BR /&gt;logging host 10.9.99.1 transport tcp port 3951&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;snmp-server community prtg RO SNMP&lt;BR /&gt;snmp-server community COMPANY RO&lt;BR /&gt;snmp-server ifindex persist&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;no modem enable&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class VTY-IN in&lt;BR /&gt;transport preferred ssh&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output ssh&lt;BR /&gt;!&lt;BR /&gt;ntp server uk.pool.ntp.org&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 06:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190032#M1065898</guid>
      <dc:creator>apstownsend</dc:creator>
      <dc:date>2017-09-27T06:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190286#M1065899</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You shared the full config of remote site but not the local one. Can you drop the config for the local site in a text file please? It will be easier to read it, avoiding scroll down/up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, I reproduced your design, just to be sure that there were not missing something (as I said before, the config looks good). The lab of your design works well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here the config I used. Let me know for the primary site if I'am in line with your production config?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the mean time, have your run some debug for&amp;nbsp;crypto ? and did you validate that ZBF isn't dropping anything else? to troubleshoot ZBFW if you don't have any experience in it, take a look at this post:&amp;nbsp;&lt;A href="https://supportforums.cisco.com/t5/security-documents/zbfw-troubleshooting-command-list/ta-p/3107683" target="_blank"&gt;https://supportforums.cisco.com/t5/security-documents/zbfw-troubleshooting-command-list/ta-p/3107683&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 12:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190286#M1065899</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-27T12:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190345#M1065900</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Config attached.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't think it's an ACL issue as I get the same error when I add&amp;nbsp; 'ip any any'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue seems to be the port number in the debug output, I can't find anyone else who has the same issue! The source/peer port should be 500 for ISAKMP.&lt;/P&gt;&lt;PRE&gt;Sep 22 2017 11:21:15 BST: ISAKMP (0): received packet from 1.1.1.1 dport 500 sport &lt;U&gt;&lt;STRONG&gt;512&lt;/STRONG&gt; &lt;/U&gt;Global (I) MM_SA_SETUP
Sep 22 2017 11:21:15 BST: ISAKMP:(0): sending packet to 1.1.1.1 my_port 500 peer_port &lt;U&gt;&lt;STRONG&gt;512&lt;/STRONG&gt; &lt;/U&gt;(I) MM_SA_SETUP&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The router does seem to have other quirks, it can't resolve names, and when attempting to ping a name it takes over 120 secs to time out. I can't access it remotely via SSH (despite the ACL getting a successful hit.) I just assumed I have made a mistake as it's the first time configuring IOS-XE and ZBF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 14:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190345#M1065900</guid>
      <dc:creator>apstownsend</dc:creator>
      <dc:date>2017-09-27T14:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190653#M1065901</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Sorry I didn't noticed that before. I red it quickly.&lt;BR /&gt;Have you tried to downgrade to a recommended version like 16.3.4 ?&lt;BR /&gt;&lt;BR /&gt;Source port can't be changed on the router.&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Sep 2017 21:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3190653#M1065901</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-27T21:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3207740#M1065902</link>
      <description>&lt;P&gt;Hello Andrew.&lt;/P&gt;
&lt;P&gt;I have absolutely the same problem with the same port numbers. If you found the solution could you please share it? I think many people would be really greatful for that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Igor&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2017 20:02:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3207740#M1065902</guid>
      <dc:creator>ilkulagin</dc:creator>
      <dc:date>2017-10-30T20:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3208617#M1065903</link>
      <description>&lt;P&gt;Hello Igor,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have yet to find a solution, if I do I will post it in this thread. If you have the same problem on the same model router it could be a hardware issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 11:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3208617#M1065903</guid>
      <dc:creator>apstownsend</dc:creator>
      <dc:date>2017-11-01T11:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC over VTI not working</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3218287#M1065904</link>
      <description>&lt;P&gt;Hi Igor,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Easy fix in the end. I altered the NAT ACL to just include the subnet of the local LAN: -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Before: -&lt;/P&gt;
&lt;PRE&gt;object-group network OGN_RFC1918
 10.0.0.0 255.0.0.0
 192.168.0.0 255.255.0.0
 172.0.0.0 255.224.0.0

ip nat inside source list ACL_NAT interface Dialer1 overload

ip access-list extended ACL_NAT
 deny ip any object-group OGN_RFC1918
 permit ip any any&lt;/PRE&gt;
&lt;P&gt;After: -&lt;/P&gt;
&lt;PRE&gt;object-group network OGN_RFC1918
 10.0.0.0 255.0.0.0
 192.168.0.0 255.255.0.0
 172.0.0.0 255.224.0.0

ip nat inside source list ACL_NAT interface Dialer1 overload

ip access-list extended ACL_NAT
 deny ip any object-group OGN_RFC1918
 permit ip 192.168.1.0 255.255.255.0 any&lt;/PRE&gt;
&lt;P&gt;This fixed my issue. 'permit ip any any' was always fine on IOS, although not recommended, whereas on IOS-XE it doesn't work (by design.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hopefully this helps you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Andrew&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2017 10:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-over-vti-not-working/m-p/3218287#M1065904</guid>
      <dc:creator>apstownsend</dc:creator>
      <dc:date>2017-11-17T10:44:23Z</dc:date>
    </item>
  </channel>
</rss>

