<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072569#M1069444</link>
    <description>&lt;P&gt;Actually that's the output on ASA, ICMP requests are received on the ASA but the replies are not sent to the router via the Tunnel. For information, I am pinging a local interface on the ASA from the router (no routing needed). This is the output on the router:&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;interface: FastEthernet4&lt;BR /&gt;Crypto map tag: ToASA, local addr 192.168.1.2&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;protected vrf: (none)&lt;BR /&gt;local ident (addr/mask/prot/port): &amp;lt;same-ping-source&amp;gt;&lt;BR /&gt;remote ident (addr/mask/prot/port): &amp;lt;same-ping-destination&amp;gt;&lt;BR /&gt;current_peer &amp;lt;ASA_PUB_IP&amp;gt; port 4500&lt;BR /&gt;PERMIT, flags={origin_is_acl,}&lt;BR /&gt;#pkts encaps: 28, #pkts encrypt: 28, #pkts digest: 28&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;#pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;#send errors 0, #recv errors 0&lt;BR /&gt;&lt;BR /&gt;local crypto endpt.: 192.168.1.2, remote crypto endpt.: &amp;lt;ASA_PUB_IP&amp;gt;&lt;BR /&gt;path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet4&lt;BR /&gt;current outbound spi: 0x56B6BB01(1454816001)&lt;BR /&gt;PFS (Y/N): Y, DH group: group2&lt;BR /&gt;&lt;BR /&gt;inbound esp sas:&lt;BR /&gt;spi: 0xD883140D(3632469005)&lt;BR /&gt;transform: esp-aes esp-sha-hmac ,&lt;BR /&gt;in use settings ={Tunnel UDP-Encaps, }&lt;BR /&gt;conn id: 33, flow_id: Onboard VPN:33, sibling_flags 80004040, crypto map: ToASA&lt;BR /&gt;sa timing: remaining key lifetime (k/sec): (4177391/3371)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Status: ACTIVE(ACTIVE)&lt;BR /&gt;&lt;BR /&gt;inbound ah sas:&lt;BR /&gt;&lt;BR /&gt;inbound pcp sas:&lt;BR /&gt;&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0x56B6BB01(1454816001)&lt;BR /&gt;transform: esp-aes esp-sha-hmac ,&lt;BR /&gt;in use settings ={Tunnel UDP-Encaps, }&lt;BR /&gt;conn id: 34, flow_id: Onboard VPN:34, sibling_flags 80004040, crypto map: ToASA&lt;BR /&gt;sa timing: remaining key lifetime (k/sec): (4177390/3371)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Status: ACTIVE(ACTIVE)&lt;BR /&gt;&lt;BR /&gt;outbound ah sas:&lt;BR /&gt;&lt;BR /&gt;outbound pcp sas:&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Apr 2020 17:12:15 GMT</pubDate>
    <dc:creator>Edward E.</dc:creator>
    <dc:date>2020-04-23T17:12:15Z</dc:date>
    <item>
      <title>Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072525#M1069441</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;I am experiencing a strange behavior with a Dynamic IPSEC VPN Tunnel between an ASA and a IOS router,&lt;/P&gt;&lt;P&gt;Both ph1 and ph2 are successful. When I try to ping a local resource in either directions, packets go through the tunnel, decapsulated on the other end but the replies do not go back through tunnel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any Idea what could the root cause of this behavior? I tried to configure a regular L2L IPSEC tunnel (not dynamic) and ping works fine, but since the router's public IP can change, I have to use a Dynamic Cryptomap.&lt;/P&gt;&lt;P&gt;ACL and Routing is correctly configured (since the regular IPSEC tunnel worked fine), I have a doubt that I am missing something in the Dynamic Cryptomap configuration, this is what I configured on the ASA:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map OUTSIDE_DYN_MAP 1 match address ACL-VPN&lt;BR /&gt;crypto dynamic-map OUTSIDE_DYN_MAP 1 set pfs&lt;BR /&gt;crypto dynamic-map OUTSIDE_DYN_MAP 1 set ikev1 transform-set ESP-AES256-SHA1 ESP-AES128-SHA1&lt;BR /&gt;crypto dynamic-map OUTSIDE_DYN_MAP 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto dynamic-map OUTSIDE_DYN_MAP 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map OUTSIDE_DYN_MAP 1 set reverse-route&lt;BR /&gt;crypto map CRYPTO-MAP-VPNS 1 ipsec-isakmp dynamic OUTSIDE_DYN_MAP&lt;BR /&gt;crypto map CRYPTO-MAP-VPNS interface INTERNET&lt;/PRE&gt;&lt;P&gt;Group policiy configuration on ASA:&lt;/P&gt;&lt;PRE&gt;group-policy GP internal&lt;BR /&gt;group-policy GP attributes&lt;BR /&gt;vpn-filter value ACL-VPN&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;tunnel-group DynamicSite2Site type ipsec-l2l&lt;BR /&gt;tunnel-group DynamicSite2Site general-attributes&lt;BR /&gt;default-group-policy GP&lt;BR /&gt;tunnel-group DynamicSite2Site ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/PRE&gt;&lt;P&gt;On cisco router:&lt;/P&gt;&lt;PRE&gt;crypto isakmp peer address &amp;lt;ASA_PUB_IP&amp;gt;&lt;BR /&gt;set aggressive-mode password ****&lt;BR /&gt;set aggressive-mode client-endpoint fqdn DynamicSite2Site&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP-AES128-SHA1 esp-aes esp-sha-hmac&lt;BR /&gt;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map ToASA 10 ipsec-isakmp&lt;BR /&gt;set peer &amp;lt;ASA_PUB_IP&amp;gt;&lt;BR /&gt;set transform-set ESP-AES128-SHA1&lt;BR /&gt;set pfs group2&lt;BR /&gt;match address ACL-VPN&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Any ideas? This is really unusual...&lt;/P&gt;&lt;P&gt;sh crypto ipsec output after pinging from IOS to ASA:&lt;/P&gt;&lt;PRE&gt;peer address: &amp;lt;IOS_PUB_IP&amp;gt;&lt;BR /&gt;Crypto map tag: OUTSIDE_DYN_MAP, seq num: 1, local addr: &amp;lt;ASA_PUB_IP&amp;gt;&lt;BR /&gt;&lt;BR /&gt;access-list ACL-VPN extended permit ...&lt;BR /&gt;local ident (addr/mask/prot/port): &amp;lt;ping_destination&amp;gt;&lt;BR /&gt;remote ident (addr/mask/prot/port): &amp;lt;ping_source&amp;gt;&lt;BR /&gt;current_peer: &amp;lt;IOS_PUB_IP&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/STRONG&gt;&lt;BR /&gt;#pkts decaps: 24, #pkts decrypt: 24, #pkts verify: 24&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;BR /&gt;&lt;BR /&gt;local crypto endpt.: &amp;lt;ASA_PUB_IP&amp;gt;/4500, remote crypto endpt.: &amp;lt;IOS_PUB_IP&amp;gt;/4500&lt;BR /&gt;path mtu 1500, ipsec overhead 82(52), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: 0DEBD4BA&lt;BR /&gt;current inbound spi : 579400FD&lt;BR /&gt;&lt;BR /&gt;inbound esp sas:&lt;BR /&gt;spi: 0x579400FD (1469317373)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes esp-sha-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, NAT-T-Encaps, PFS Group 2, IKEv1, }&lt;BR /&gt;slot: 0, conn_id: 216276992, crypto-map: OUTSIDE_DYN_MAP&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (4373997/2429)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x01FFFFFF&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0x0DEBD4BA (233559226)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes esp-sha-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, NAT-T-Encaps, PFS Group 2, IKEv1, }&lt;BR /&gt;slot: 0, conn_id: 216276992, crypto-map: OUTSIDE_DYN_MAP&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (4374000/2429)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 16:12:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072525#M1069441</guid>
      <dc:creator>Edward E.</dc:creator>
      <dc:date>2020-04-23T16:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072541#M1069442</link>
      <description>&lt;P&gt;seem like your router received the traffic from the ASA and decap it but somehow router is not doing encap. could be a routing issue on router.&lt;/P&gt;
&lt;P&gt;could you share the config of router.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/STRONG&gt;&lt;BR /&gt;#pkts decaps: 24, #pkts decrypt: 24, #pkts verify: 24&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 16:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072541#M1069442</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-04-23T16:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072569#M1069444</link>
      <description>&lt;P&gt;Actually that's the output on ASA, ICMP requests are received on the ASA but the replies are not sent to the router via the Tunnel. For information, I am pinging a local interface on the ASA from the router (no routing needed). This is the output on the router:&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;interface: FastEthernet4&lt;BR /&gt;Crypto map tag: ToASA, local addr 192.168.1.2&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;protected vrf: (none)&lt;BR /&gt;local ident (addr/mask/prot/port): &amp;lt;same-ping-source&amp;gt;&lt;BR /&gt;remote ident (addr/mask/prot/port): &amp;lt;same-ping-destination&amp;gt;&lt;BR /&gt;current_peer &amp;lt;ASA_PUB_IP&amp;gt; port 4500&lt;BR /&gt;PERMIT, flags={origin_is_acl,}&lt;BR /&gt;#pkts encaps: 28, #pkts encrypt: 28, #pkts digest: 28&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;#pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;#send errors 0, #recv errors 0&lt;BR /&gt;&lt;BR /&gt;local crypto endpt.: 192.168.1.2, remote crypto endpt.: &amp;lt;ASA_PUB_IP&amp;gt;&lt;BR /&gt;path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet4&lt;BR /&gt;current outbound spi: 0x56B6BB01(1454816001)&lt;BR /&gt;PFS (Y/N): Y, DH group: group2&lt;BR /&gt;&lt;BR /&gt;inbound esp sas:&lt;BR /&gt;spi: 0xD883140D(3632469005)&lt;BR /&gt;transform: esp-aes esp-sha-hmac ,&lt;BR /&gt;in use settings ={Tunnel UDP-Encaps, }&lt;BR /&gt;conn id: 33, flow_id: Onboard VPN:33, sibling_flags 80004040, crypto map: ToASA&lt;BR /&gt;sa timing: remaining key lifetime (k/sec): (4177391/3371)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Status: ACTIVE(ACTIVE)&lt;BR /&gt;&lt;BR /&gt;inbound ah sas:&lt;BR /&gt;&lt;BR /&gt;inbound pcp sas:&lt;BR /&gt;&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0x56B6BB01(1454816001)&lt;BR /&gt;transform: esp-aes esp-sha-hmac ,&lt;BR /&gt;in use settings ={Tunnel UDP-Encaps, }&lt;BR /&gt;conn id: 34, flow_id: Onboard VPN:34, sibling_flags 80004040, crypto map: ToASA&lt;BR /&gt;sa timing: remaining key lifetime (k/sec): (4177390/3371)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Status: ACTIVE(ACTIVE)&lt;BR /&gt;&lt;BR /&gt;outbound ah sas:&lt;BR /&gt;&lt;BR /&gt;outbound pcp sas:&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 17:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072569#M1069444</guid>
      <dc:creator>Edward E.</dc:creator>
      <dc:date>2020-04-23T17:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072663#M1069446</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1037970"&gt;@Edward E.&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I am pinging a local interface on the ASA from the router (no routing needed). This is the output on the router:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If you are pinging an ASA interface over a VPN tunnel you will need the command &lt;STRONG&gt;management-access &amp;lt;interface-name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Normally you'd test by sending traffic through the ASA....ensure you have NAT exemption rules in place if you have issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 17:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4072663#M1069446</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-04-23T17:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073114#M1069468</link>
      <description>&lt;P&gt;After some debugging, I noticed that the icmp packets are filtered on the asa by an ACL:&lt;/P&gt;&lt;PRE&gt;1: 08:05:02.358669 &amp;lt;remote_ios-ip&amp;gt; &amp;gt; &amp;lt;local_asa-ip&amp;gt;: icmp: echo request Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;2: 08:05:04.354214 &amp;lt;remote_ios-ip&amp;gt; &amp;gt; &amp;lt;local_asa-ip&amp;gt;: icmp: echo request Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;3: 08:05:06.354641 &amp;lt;remote_ios-ip&amp;gt; &amp;gt; &amp;lt;local_asa-ip&amp;gt;: icmp: echo request Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;For the dynamic VPN, i tries to remove remote/local ACLs to to see if it works but I still see these drops.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 08:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073114#M1069468</guid>
      <dc:creator>Edward E.</dc:creator>
      <dc:date>2020-04-24T08:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073258#M1069474</link>
      <description>&lt;P&gt;I generated traffic from the remote site to the ASA as you suggested and I still have the same issue, No packets are encrypted from ASA to IOS. The traffic doesn't even get routed to the correct VRF even though the routing is ok. I saw something unusual on the logs:&lt;/P&gt;&lt;PRE&gt;Apr 24 2020 10:55:51: %ASA-7-609001: Built local-host INTERNET:&amp;lt;local_ios_ip&amp;gt;&lt;BR /&gt;Apr 24 2020 10:55:51: %ASA-7-609001: Built local-host INTERCO_ACCESS:&amp;lt;resource_behind_ASA&amp;gt;&lt;BR /&gt;Apr 24 2020 10:55:51: %ASA-7-609002: Teardown local-host INTERNET:&amp;lt;local_ios_ip&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 10:55:51: %ASA-7-609002: Teardown local-host INTERCO_ACCESS:&amp;lt;resource_behind_ASA&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 10:55:53: %ASA-7-609001: Built local-host INTERNET:&amp;lt;local_ios_ip&amp;gt;&lt;BR /&gt;Apr 24 2020 10:55:53: %ASA-7-609001: Built local-host INTERCO_ACCESS:&amp;lt;resource_behind_ASA&amp;gt;&lt;BR /&gt;Apr 24 2020 10:55:53: %ASA-7-609002: Teardown local-host INTERNET:&amp;lt;local_ios_ip&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 10:55:53: %ASA-7-609002: Teardown local-host INTERCO_ACCESS:&amp;lt;resource_behind_ASA&amp;gt; duration 0:00:00&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Packets are instantly torn down.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 10:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073258#M1069474</guid>
      <dc:creator>Edward E.</dc:creator>
      <dc:date>2020-04-24T10:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073271#M1069476</link>
      <description>&lt;P&gt;could you add this command and test it&lt;/P&gt;
&lt;PRE&gt;policy-map global_policy
  inspect icmp
  inspect icmp error
&lt;/PRE&gt;</description>
      <pubDate>Fri, 24 Apr 2020 11:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073271#M1069476</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-04-24T11:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IPSEC VPN Tunnel does not encapsulate any packets</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073300#M1069478</link>
      <description>&lt;P&gt;I added the command, I don't see the drops anymore in the logs, but there are no icmp replies either. sh crypto ipsec always shows 0 packets encrypted and all traffic (icmp and the other traffic that I generated) is being torn down in the ASA:&lt;/P&gt;&lt;PRE&gt;Apr 24 2020 12:16:37: %ASA-7-609002: Teardown local-host INTERNET:&amp;lt;ping_source_ip&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 12:16:37: %ASA-7-609002: Teardown local-host INTERCO_ACCESS:&amp;lt;ping_dest_ip&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 12:16:44: %ASA-7-609001: Built local-host INTERNET:&amp;lt;ping_source_ip&amp;gt;&lt;BR /&gt;Apr 24 2020 12:16:44: %ASA-7-609001: Built local-host INTERCO_ACCESS:&amp;lt;ping_dest_ip&amp;gt;&lt;BR /&gt;Apr 24 2020 12:16:44: %ASA-7-609002: Teardown local-host INTERNET:&amp;lt;ping_source_ip&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 12:16:44: %ASA-7-609002: Teardown local-host INTERCO_ACCESS:&amp;lt;ping_dest_ip&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 12:16:46: %ASA-7-609001: Built local-host INTERNET:&amp;lt;ping_source_ip&amp;gt;&lt;BR /&gt;Apr 24 2020 12:16:46: %ASA-7-609001: Built local-host INTERCO_ACCESS:&amp;lt;ping_dest_ip&amp;gt;&lt;BR /&gt;Apr 24 2020 12:16:46: %ASA-7-609002: Teardown local-host INTERNET:&amp;lt;ping_source_ip&amp;gt; duration 0:00:00&lt;BR /&gt;Apr 24 2020 12:16:46: %ASA-7-609002: Teardown local-host INTERCO_ACCESS:&amp;lt;ping_dest_ip&amp;gt; duration 0:00:00&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 12:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ipsec-vpn-tunnel-does-not-encapsulate-any-packets/m-p/4073300#M1069478</guid>
      <dc:creator>Edward E.</dc:creator>
      <dc:date>2020-04-24T12:12:39Z</dc:date>
    </item>
  </channel>
</rss>

