<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Managing ASA over VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4536834#M1086687</link>
    <description>&lt;P&gt;Bump. Any ideas ? I did a packet tracer from an inside IP (lets say .3) to a destination over VPN and looks just fine. Did the same from the IP of the inside interface and it doesn't seem to be placed over VPN. I rechecked access lists and they look OK. what can it be the issue?&lt;/P&gt;</description>
    <pubDate>Mon, 24 Jan 2022 08:47:29 GMT</pubDate>
    <dc:creator>silric26227</dc:creator>
    <dc:date>2022-01-24T08:47:29Z</dc:date>
    <item>
      <title>Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4535276#M1086622</link>
      <description>&lt;P&gt;As the title says, I have a VPN ikev2 tunnel from a Fortigate to a Cisco ASA, but the snmp/ping anything doesnt work on the inside. Also I saw in Forti logging that the traffic is going over tunnel, but on the ASA I don't see any packets on sh cry ipsec sa peer. Both Forti and ASA seem to show the tunnel as being UP, on the Forti I have outgoing traffic but not incoming.&lt;/P&gt;&lt;P&gt;asa-odg-01# sh crypto ipsec sa&lt;BR /&gt;interface: outside&lt;BR /&gt;Crypto map tag: outside_map, seq num: 1, local addr: 1.1.1.1&lt;/P&gt;&lt;P&gt;access-list outside_crypto extended permit ip 10.1.2.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;BR /&gt;local ident (addr/mask/prot/port): (10.1.2.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (172.16.1.0/255.255.255.0/0/0)&lt;BR /&gt;current_peer: 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: 1.1.1.1/500, remote crypto endpt.: 2.2.2.2/500&lt;BR /&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: clear-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: A11CBE2B&lt;BR /&gt;current inbound spi : F97CF8EA&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0xF97CF8EA (4185716970)&lt;BR /&gt;transform: esp-aes-256 esp-md5-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 4096, crypto-map: outside_map&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (8500/3068)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0xA11CBE2B (2703015467)&lt;BR /&gt;transform: esp-aes-256 esp-md5-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 4096, crypto-map: outside_map&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (9400/3068)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A packet capture on ASA shows the traffic coming in:&lt;/P&gt;&lt;P&gt;13: 06:35:46.540423 802.1Q vlan#2 P0 1.1.1.1 &amp;gt; 2.2.2.2: [|udp]&lt;BR /&gt;14: 06:35:46.549257 802.1Q vlan#2 P0 2.2.2.2.500 &amp;gt; 1.1.1.1.500: udp 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase 2 is UP-active on Forti, i have traffic outgoing on the tunnel. On the ASA I have the management access inside command.&lt;/P&gt;&lt;P&gt;What is happening, why is ASA not responding, I cannot ping the inside interface or anything. Any commands that can help ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 19:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4535276#M1086622</guid>
      <dc:creator>silric26227</dc:creator>
      <dc:date>2022-01-20T19:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4535502#M1086635</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;can you share your asa configuration please?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;You might be missing management-access command and/or a nat misconfiguration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 03:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4535502#M1086635</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2022-01-21T03:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4535553#M1086637</link>
      <description>&lt;P&gt;I have attached the ASA file, I hope that's OK. Will also paste a bit more commands output here:&lt;/P&gt;&lt;P&gt;show crypto ikev2 sa&lt;/P&gt;&lt;P&gt;IKEv2 SAs:&lt;/P&gt;&lt;P&gt;Session-id:1, Status:UP-ACTIVE, IKE count:1, CHILD count:2&lt;/P&gt;&lt;P&gt;Tunnel-id Local Remote Status Role&lt;BR /&gt;160520829 1.1.1.1/500 2.2.2.2/500 READY RESPONDER&lt;BR /&gt;Encr: AES-CBC, keysize: 256, Hash: SHA256, DH Grp:5, Auth sign: PSK, Auth verify: PSK&lt;BR /&gt;Life/Active Time: 28800/22822 sec&lt;BR /&gt;Child sa: local selector 10.1.2.0/0 - 10.1.2.255/65535&lt;BR /&gt;remote selector 172.16.1.0/0 - 172.16.1.255/65535&lt;BR /&gt;ESP spi in/out: 0xczzz56e/0xzzz26d&lt;BR /&gt;Child sa: local selector 10.1.2.0/0 - 10.1.2.255/65535&lt;BR /&gt;remote selector 172.17.1.0/0 - 172.17.1.255/65535&lt;BR /&gt;ESP spi in/out: 0xbzzz063a/0xa1zzz251&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also start to think NAT is the culprit but the fact that sh cry ipsec sa peer shows no packets really confuses me. Im starting to think it might not work for ikev2 ?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 06:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4535553#M1086637</guid>
      <dc:creator>silric26227</dc:creator>
      <dc:date>2022-01-21T06:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4536834#M1086687</link>
      <description>&lt;P&gt;Bump. Any ideas ? I did a packet tracer from an inside IP (lets say .3) to a destination over VPN and looks just fine. Did the same from the IP of the inside interface and it doesn't seem to be placed over VPN. I rechecked access lists and they look OK. what can it be the issue?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 08:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4536834#M1086687</guid>
      <dc:creator>silric26227</dc:creator>
      <dc:date>2022-01-24T08:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4536839#M1086689</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1220116"&gt;@silric26227&lt;/a&gt; provide the output from packet-tracer and "show crypto ipsec sa".&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 08:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4536839#M1086689</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-24T08:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4536874#M1086692</link>
      <description>&lt;P&gt;Your configuration look solid in regards to site-to-site VPN and Nat. you said you can see the out going traffic on the Fortinet firewall and the tunnel phase 1 and phase 2 is up but there is not encap and decap on the ASA unit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you also mentioned that you can see the outgoing traffic on the Fortinet firewall means its doing encap.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you also confirm if you can ping to any network behind the ASA firewall from Fortinet. I also noted your ASA is responder where as you Fortinet is initiator.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 09:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4536874#M1086692</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-01-24T09:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4537684#M1086722</link>
      <description>&lt;P&gt;The config looks ok in terms of nat and you have the management-access command. Your ssh allow list is correct as well. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;can you share the output of: show run all sysopt&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 04:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4537684#M1086722</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2022-01-25T04:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4538181#M1086740</link>
      <description>&lt;P&gt;# show run all sysopt&lt;BR /&gt;no sysopt connection timewait&lt;BR /&gt;sysopt connection tcpmss 1380&lt;BR /&gt;sysopt connection tcpmss minimum 0&lt;BR /&gt;sysopt connection permit-vpn&lt;BR /&gt;sysopt connection reclassify-vpn&lt;BR /&gt;no sysopt connection preserve-vpn-flows&lt;BR /&gt;no sysopt radius ignore-secret&lt;BR /&gt;no sysopt noproxyarp inside&lt;BR /&gt;no sysopt noproxyarp outside&lt;BR /&gt;no sysopt noproxyarp management&lt;/P&gt;&lt;P&gt;--------------------------------------------&lt;/P&gt;&lt;P&gt;sh crypto ipsec sa&lt;BR /&gt;interface: outside&lt;BR /&gt;Crypto map tag: outside_map, seq num: 1, local addr: 1.1.1.1&lt;/P&gt;&lt;P&gt;access-list outside_VPN_crypto extended permit ip 10.1.2.0 255.255.255.0 172.17.1.0 255.255.255.0&lt;BR /&gt;local ident (addr/mask/prot/port): (10.1.2.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (172.17.1.0/255.255.255.0/0/0)&lt;BR /&gt;current_peer: 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: 1.1.1.1/500, remote crypto endpt.: 2.2.2.2/500&lt;BR /&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: clear-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: A11FAC1C&lt;BR /&gt;current inbound spi : 1ADAF4AE&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0x1ADAF4AE (450557102)&lt;BR /&gt;transform: esp-aes-256 esp-md5-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 770048, crypto-map: outside_map&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (9200/1878)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0xA11FAC1C (2703207452)&lt;BR /&gt;transform: esp-aes-256 esp-md5-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 770048, crypto-map: outside_map&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (9100/1878)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;-------------------------------------&lt;/P&gt;&lt;P&gt;No, I cannot ping any device behind the ASA from Forti, I have no encaps/decaps on ASA. I have done a packet tracer from a virtual .3 behind asa inside to the forti range and it did invoke VPN. That did not happen when I did it from .1 (the IP of the interface inside)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 14:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4538181#M1086740</guid>
      <dc:creator>silric26227</dc:creator>
      <dc:date>2022-01-25T14:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4538187#M1086743</link>
      <description>&lt;P&gt;Also, a capture on outside interface:&lt;/P&gt;&lt;P&gt;54: 02:40:03.962978 802.1Q vlan#2 P0 1.1.1.1 &amp;gt; 2.2.2.2: [|udp]&lt;BR /&gt;55: 02:40:03.971736 802.1Q vlan#2 P0 2.2.2.2.500 &amp;gt; 1.1.1.1.500: udp 80&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 14:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4538187#M1086743</guid>
      <dc:creator>silric26227</dc:creator>
      <dc:date>2022-01-25T14:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: Managing ASA over VPN</title>
      <link>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4538311#M1086746</link>
      <description>&lt;P&gt;On the sh crypto we see the remote subnet&amp;nbsp;&lt;SPAN&gt;172.17.1.0 but the SSH is only for 172.16.1.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can you paste the whole output please?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 16:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/managing-asa-over-vpn/m-p/4538311#M1086746</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2022-01-25T16:40:40Z</dc:date>
    </item>
  </channel>
</rss>

