<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem with traffic through IPSec site-to-site tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4171966#M1075056</link>
    <description>&lt;P&gt;Traffic was flowing through this tunnel but recently stopped. When doing a packet-trace on the outside interface using a valid IP from our customer, the following results, and I can't figure out why Phase: 6 denies the flow. Any thoughts? This tunnel is up, and I see bidirectional traffic on phase 2. Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp ##.138.220.70 2000 #.223.248.13 21 det&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static obj-172.16.11.10 obj-#.223.248.13 destination static CUSTOMER-VPN CUSTOMER-VPN&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate #.223.248.13/21 to 172.16.11.10/21&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;access-list OUTSIDE extended permit ip object-group CUSTOMER-VPN host 172.16.11.10&lt;BR /&gt;access-list OUTSIDE remark Permit restricted ICMP traffic&lt;BR /&gt;object-group network CUSTOMER-VPN&lt;BR /&gt;network-object 192.168.2.0 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;network-object host 192.168.107.24&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x78394aa8, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=3, user_data=0x70f79d00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=##.138.220.70, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;dst ip/id=172.16.11.10, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static obj-172.16.11.10 obj-#.223.248.13 destination static CUSTOMER-VPN CUSTOMER-VPN&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate ##.138.220.70/2000 to ##.138.220.70/2000&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x774a6fb8, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=65, user_data=0x75c87438, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=##.138.220.70, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;dst ip/id=#.223.248.13, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x757732a8, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;hits=5344794649, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7582a7d0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=4256517931, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79902f80, priority=70, domain=ipsec-tunnel-flow, deny=false&lt;BR /&gt;hits=699, user_data=0x27e77104, cs_id=0x7da6de88, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=##.138.220.70, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;dst ip/id=#.223.248.0, mask=255.255.255.128, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;ASA5520-A(config)#&lt;/P&gt;</description>
    <pubDate>Thu, 22 Oct 2020 17:06:02 GMT</pubDate>
    <dc:creator>ABaker94985</dc:creator>
    <dc:date>2020-10-22T17:06:02Z</dc:date>
    <item>
      <title>Problem with traffic through IPSec site-to-site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4171966#M1075056</link>
      <description>&lt;P&gt;Traffic was flowing through this tunnel but recently stopped. When doing a packet-trace on the outside interface using a valid IP from our customer, the following results, and I can't figure out why Phase: 6 denies the flow. Any thoughts? This tunnel is up, and I see bidirectional traffic on phase 2. Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp ##.138.220.70 2000 #.223.248.13 21 det&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static obj-172.16.11.10 obj-#.223.248.13 destination static CUSTOMER-VPN CUSTOMER-VPN&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate #.223.248.13/21 to 172.16.11.10/21&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;access-list OUTSIDE extended permit ip object-group CUSTOMER-VPN host 172.16.11.10&lt;BR /&gt;access-list OUTSIDE remark Permit restricted ICMP traffic&lt;BR /&gt;object-group network CUSTOMER-VPN&lt;BR /&gt;network-object 192.168.2.0 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;network-object host 192.168.107.24&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x78394aa8, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=3, user_data=0x70f79d00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=##.138.220.70, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;dst ip/id=172.16.11.10, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static obj-172.16.11.10 obj-#.223.248.13 destination static CUSTOMER-VPN CUSTOMER-VPN&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate ##.138.220.70/2000 to ##.138.220.70/2000&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x774a6fb8, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=65, user_data=0x75c87438, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=##.138.220.70, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;dst ip/id=#.223.248.13, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x757732a8, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;hits=5344794649, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7582a7d0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=4256517931, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79902f80, priority=70, domain=ipsec-tunnel-flow, deny=false&lt;BR /&gt;hits=699, user_data=0x27e77104, cs_id=0x7da6de88, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=##.138.220.70, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;dst ip/id=#.223.248.0, mask=255.255.255.128, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;ASA5520-A(config)#&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 17:06:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4171966#M1075056</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2020-10-22T17:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic through IPSec site-to-site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4172033#M1075061</link>
      <description>&lt;P&gt;Inside have by default permit any any&lt;BR /&gt;but if you config any ACL on inside interface then this ACL will end with deny any any&lt;BR /&gt;so please change the ACL with add permit traffic through the tunnel.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 18:16:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4172033#M1075061</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-10-22T18:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic through IPSec site-to-site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4172055#M1075062</link>
      <description>&lt;P&gt;Thanks for the response, but there is an ACL on the inside, which ends with "permit ip any any." I figured out the source of the problem, but I'm not sure why the configuration is incorrect. I did a packet-trace (&lt;SPAN&gt;packet-tracer input outside tcp ##.138.220.70 2000 172.16.11.10 21 det) where I&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;accidentally changed the destination from the public address to the private address, and the packet-trace finished successfully . I need to figure out why NATing isn't working.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 18:53:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4172055#M1075062</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2020-10-22T18:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic through IPSec site-to-site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4172056#M1075063</link>
      <description>&lt;P&gt;I might add that when I do the packet-trace from the inside to the remote end of the VPN tunnel, there is a phase where 172.16.11.10 is translater to&amp;nbsp;&lt;SPAN&gt;#.223.248.13.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 18:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-through-ipsec-site-to-site-tunnel/m-p/4172056#M1075063</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2020-10-22T18:57:19Z</dc:date>
    </item>
  </channel>
</rss>

