<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - need to trace the traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4476579#M1084067</link>
    <description>&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;No luck with anything you advised. There's no cryptomap acl that matches these particular source/dest ip. I even analyzed the hitcounts from the packet-tracer output with hitcounts from all acl lines - they don't match.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hits=4303490516 - is the hitcount on output which I got yesterday. So today the matching acl should have increased counter, but there's only two lines that get close to it, but they are lower - (hitcnt=4254446208) and (hitcnt=4155233505).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;That's a mystery.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Although have this weird&amp;nbsp;&lt;/SPAN&gt;cryptomap&amp;nbsp;&lt;SPAN&gt;- can it cause such behavior?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wexi9ns - Imgur.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/132697i17A8F9680064CB75/image-size/medium?v=v2&amp;amp;px=400" role="button" title="wexi9ns - Imgur.png" alt="wexi9ns - Imgur.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Wed, 29 Sep 2021 08:13:40 GMT</pubDate>
    <dc:creator>Pavelpro7</dc:creator>
    <dc:date>2021-09-29T08:13:40Z</dc:date>
    <item>
      <title>Cisco ASA - need to trace the traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4475343#M1084029</link>
      <description>&lt;P&gt;The problem is some subnet from our backend is able to connect to public NTP server (actually to multiple public networks) through our Cisco ASA - which is strange, because there's no ACL or NAT that will allow it to pass. Trying to get detailed information with ASA's internal packet-tracer but had no luck. It just went trhough on all steps. The thing that confuses me is Phase: 7 - Type: VPN - Subtype: ipsec-tunnel-flow. Is this indicating that traffic is going by one of the ipsec tunnels? If so - how can I track which one it is? Tried to look up the id=0x7f433312d310 from output, but there's no match with any ipsec. Did someone experienced situation like this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CISCO_ASA# packet-tracer input inside udp 1.1.1.1 123 89.109.251.21 123 detailed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 3.3.3.3 using egress ifc outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_in in interface inside&lt;BR /&gt;access-list inside_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f434cd37eb0, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=3526614492, user_data=0x7f43582ff9c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f43354cf680, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=9334231202, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f434d237f50, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=11970178801, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f434d7d9bc0, priority=20, domain=lu, deny=false&lt;BR /&gt;hits=635936820, user_data=0x0, cs_id=0x0, flags=0x0, protocol=17&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f433accfa90, priority=18, domain=flow-export, deny=false&lt;BR /&gt;hits=4388888776, user_data=0x7f43385957e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f433312d310, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=4303490516, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7f433aeefd40, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=10525119331, user_data=0x7f4338592150, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f43354cf680, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=9334231204, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f4346040e00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=8793199143, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;out id=0x7f433aef3b00, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=12544955565, user_data=0x7f4338592150, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 3784177591, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 08:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4475343#M1084029</guid>
      <dc:creator>Pavelpro7</dc:creator>
      <dc:date>2021-09-28T08:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - need to trace the traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4475405#M1084036</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/408893"&gt;@Pavelpro7&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Yes, this means that your traffic is going via VPN somewhere. Determining through which VPN tunnel is harder task. For that, I would normaly go via info presented in the packet tracer, but you have this:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Based on this, I would think that you have some route-based VPN, and that you should check your routing for the destination (route-based VPNs have quad zeros in crypto domain).&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 10:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4475405#M1084036</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-09-28T10:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - need to trace the traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4475451#M1084038</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Try a trace route from test host to public IP and from the hops you should&lt;BR /&gt;be able to find the tunnel used. Make sure to allow trace route on asa&lt;BR /&gt;inspection policy.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Sep 2021 11:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4475451#M1084038</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-28T11:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - need to trace the traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4476579#M1084067</link>
      <description>&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;No luck with anything you advised. There's no cryptomap acl that matches these particular source/dest ip. I even analyzed the hitcounts from the packet-tracer output with hitcounts from all acl lines - they don't match.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hits=4303490516 - is the hitcount on output which I got yesterday. So today the matching acl should have increased counter, but there's only two lines that get close to it, but they are lower - (hitcnt=4254446208) and (hitcnt=4155233505).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;That's a mystery.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Although have this weird&amp;nbsp;&lt;/SPAN&gt;cryptomap&amp;nbsp;&lt;SPAN&gt;- can it cause such behavior?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wexi9ns - Imgur.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/132697i17A8F9680064CB75/image-size/medium?v=v2&amp;amp;px=400" role="button" title="wexi9ns - Imgur.png" alt="wexi9ns - Imgur.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 08:13:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4476579#M1084067</guid>
      <dc:creator>Pavelpro7</dc:creator>
      <dc:date>2021-09-29T08:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - need to trace the traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4476580#M1084068</link>
      <description>&lt;P&gt;&lt;SPAN&gt;No luck with anything you advised. There's no cryptomap acl that matches these particular source/dest ip. I even analyzed the hitcounts from the packet-tracer output with hitcounts from all acl lines - they don't match.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hits=4303490516 - is the hitcount on output which I got yesterday. So today the matching acl should have increased counter, but there's only two lines that get close to it, but they are lower - (hitcnt=4254446208) and (hitcnt=4155233505).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;That's a mystery.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Although have this weird&amp;nbsp;&lt;/SPAN&gt;cryptomap&amp;nbsp;&lt;SPAN&gt;- can it cause such behavior?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wexi9ns - Imgur.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/132697i17A8F9680064CB75/image-size/medium?v=v2&amp;amp;px=400" role="button" title="wexi9ns - Imgur.png" alt="wexi9ns - Imgur.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 08:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4476580#M1084068</guid>
      <dc:creator>Pavelpro7</dc:creator>
      <dc:date>2021-09-29T08:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - need to trace the traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4476823#M1084077</link>
      <description>&lt;P&gt;Analyzing ACL hit counts - I don't think it would get you somewhere.&lt;/P&gt;&lt;P&gt;Your crypto map is looking different than I'm used to, and it does state no traffic is selected. However, I'm not using ASDM often, so there could be I'm missing something. Could you please post CLI output of the 'show run crypto' command (make sure not to disclose some unwanted info)? Based on this, we should be able to get some starting point.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 12:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4476823#M1084077</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-09-29T12:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - need to trace the traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4477587#M1084093</link>
      <description>&lt;P&gt;Here is the output. Hope it can be helpful&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-1# show run crypto&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set vpnset esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal SHA1-AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256-SHA256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256-sha256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map vpndyn 10 set ikev1 transform-set vpnset ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map vpndyn 10 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map vpndyn 10 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map vpnmap 10 ipsec-isakmp dynamic vpndyn&lt;BR /&gt;crypto map vpnmap 20...&lt;BR /&gt;************&lt;BR /&gt;crypto map vpnmap 130 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map vpnmap interface outside&lt;BR /&gt;crypto map vpnmap interface 5G&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto ca trustpoint **ServerCA**&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint localtrust&lt;BR /&gt;enrollment self&lt;BR /&gt;fqdn bpn.HUBBA_BUBBA.moc&lt;BR /&gt;subject-name CN=bpn.HUBBA_BUBBA.moc&lt;BR /&gt;keypair sslvpnkey&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint DigiDigDigi&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint FRESH_HUBBA_BUBBA&lt;BR /&gt;keypair FRESH_HUBBA_BUBBA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint OLD_FRESH_HUBBA_BUBBA&lt;BR /&gt;keypair FRESH_HUBBA_BUBBA_OLD&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca cert...&lt;BR /&gt;************&lt;BR /&gt;crypto isakmp nat-traversal 30&lt;BR /&gt;crypto ikev2 policy 5&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 19&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 5&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 15&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 19&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 28800&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 enable 5G&lt;BR /&gt;crypto ikev1 enable inside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 10:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-need-to-trace-the-traffic/m-p/4477587#M1084093</guid>
      <dc:creator>Pavelpro7</dc:creator>
      <dc:date>2021-09-30T10:50:56Z</dc:date>
    </item>
  </channel>
</rss>

