<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC/FTD VPN issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727605#M1095329</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Yes I have checked the ACL's and there is an ACL above which allows the .200 address to any across a different L2L is it possible the traffic is matching on that ACL, ?? Yes&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and do you agree no NAT rule required as we never had one previously for this.?? let change ACL from any to remote LAN then see if we need NAT or not.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Nov 2022 14:51:56 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-11-24T14:51:56Z</dc:date>
    <item>
      <title>FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727438#M1095315</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Got x2 2100 FTD's managed by same FMC and got the VPN up between the two but oneside has no decaps any ideas, ? there is no NAT configured do I need it as some docs suggest because it was working before one FTD got replaced due to failure with no NAT?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 11:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727438#M1095315</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-24T11:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727449#M1095316</link>
      <description>&lt;P&gt;you need NAT exemption&amp;nbsp; not NAT traffic.&amp;nbsp;&lt;BR /&gt;so sure you need to deal with NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 12:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727449#M1095316</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-24T12:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727451#M1095317</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; is routing setup correctly from the local switch, to route traffic via the FTD and over the VPN?&lt;/P&gt;
&lt;P&gt;Can you provide the output of "show crypto ipsec sa" from both sides, just so we can confirm.&lt;/P&gt;
&lt;P&gt;You'd only need a NAT exemption rule if you had dynamic PAT/NAT setup, which would unintentially translate the VPN traffic. Sounds like you don't need a NAT rule.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 12:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727451#M1095317</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-24T12:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727460#M1095319</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;show crypto ipsec sa peer 81.0.89.50&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;peer address: 81.0.89.50&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: CSM_INTERNET_map, seq num: 4, local addr: 81.136.195.226&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list CSM_IPSEC_ACL_4 extended permit ip host 192.168.99.200 host 172.16.99.200&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (192.168.99.200/255.255.255.255/0/0)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (172.16.99.200/255.255.255.255/0/0)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 81.0.89.50&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 281, #pkts decrypt: 281, #pkts verify: 281&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #TFC rcvd: 0, #TFC sent: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 81.136.195.226/500, remote crypto endpt.: 81.0.89.50/500&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 94(44), media mtu 1500&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PMTU time remaining (sec): 0, DF policy: copy-df&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ICMP error validation: disabled, TFC packets: disabled&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: BF622F97&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : C8AD9DB1&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xC8AD9DB1 (3366821297)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA State: active&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-512-hmac no compression&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, PFS Group 21, IKEv2, }&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 37362, crypto-map: CSM_INTERNET_map&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (3916785/17727)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xFFFFFFFF 0xFFFFFFFF&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xBF622F97 (3210882967)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA State: active&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-512-hmac no compression&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, PFS Group 21, IKEv2, }&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 37362, crypto-map: CSM_INTERNET_map&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4147200/17727)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;show crypto ipsec sa peer 81.136.195.226&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;peer address: 81.136.195.226&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: CSM_INTERNET_map, seq num: 1, local addr: 81.0.89.50&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list CSM_IPSEC_ACL_1 extended permit ip host 172.16.99.200 host 192.168.99.200&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (172.16.99.200/255.255.255.255/0/0)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (192.168.99.200/255.255.255.255/0/0)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 81.136.195.226&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 281, #pkts encrypt: 281, #pkts digest: 281&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 281, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #TFC rcvd: 0, #TFC sent: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 81.0.89.50/500, remote crypto endpt.: 81.136.195.226/500&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 94(44), media mtu 1500&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PMTU time remaining (sec): 0, DF policy: copy-df&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ICMP error validation: disabled, TFC packets: disabled&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: C8AD9DB1&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : BF622F97&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xBF622F97 (3210882967)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA State: active&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-512-hmac no compression&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, PFS Group 21, IKEv2, }&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 28134, crypto-map: CSM_INTERNET_map&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4101120/17542)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xC8AD9DB1 (3366821297)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA State: active&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-512-hmac no compression&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, PFS Group 21, IKEv2, }&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 28134, crypto-map: CSM_INTERNET_map&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;sa timing: remaining key lifetime (kB/sec): (4147185/17542)&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 12:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727460#M1095319</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-24T12:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727462#M1095321</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;The traffic isnt matching any other NAT rule&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 12:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727462#M1095321</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-24T12:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727464#M1095322</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; What's the topology, is the FTD the default gateway for all traffic? Do you have multiple WAN interfaces?&lt;/P&gt;
&lt;P&gt;Run packet-tracer from the CLI to simulate traffic from 192.168.99.200 to 172.16.99.200, provide the output for review.&lt;/P&gt;
&lt;P&gt;I assumed you meant there is no other NAT rules, if there are then you'd probably need a NAT exemption rule to ensure traffic between the VPN host/network is not unintentially translated.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 12:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727464#M1095322</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-24T12:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727465#M1095323</link>
      <description>&lt;P&gt;do you have NAT overload for local LAN ??&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 12:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727465#M1095323</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-24T12:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727533#M1095324</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;The FTD is split into sveral sub-interfaces at both sides, the server is .200 and thhe GW for the server is .1 there is a route pointing out the internet interface to the server on each side, we nevr had any nat in place for this traffic and also why is one sides traffic recived at the other side but not vice versa? nat rules routes are all the same both sides&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 13:11:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727533#M1095324</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-24T13:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727575#M1095326</link>
      <description>&lt;P&gt;&lt;SPAN&gt;CSM_INTERNET_map, seq num: &lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;4 &amp;lt;&amp;lt;- seq num 4, so there are multi IPsec L2L, can you double check ACL for each L2L&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 13:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727575#M1095326</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-24T13:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727603#M1095328</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Yes I have checked the ACL's and there is an ACL above which allows the .200 address to any across a different L2L is it possible the traffic is matching on that ACL, ??&lt;BR /&gt;&lt;BR /&gt;and do you agree no NAT rule required as we never had one previously for this.??&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 14:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727603#M1095328</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-24T14:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727605#M1095329</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Yes I have checked the ACL's and there is an ACL above which allows the .200 address to any across a different L2L is it possible the traffic is matching on that ACL, ?? Yes&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and do you agree no NAT rule required as we never had one previously for this.?? let change ACL from any to remote LAN then see if we need NAT or not.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 14:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727605#M1095329</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-24T14:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727624#M1095331</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I removed the server from the group which was matching on the ACL above and all looks good now seeing encaps/dcaps, I'm thinking the only way to fix permanently is to delete both vpns but recreate the latter one first so the acl is above and not below the any ipv4 it was matching ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the ACL tip i had checked earlier but wasnt thorough enough.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 15:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727624#M1095331</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-24T15:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727628#M1095332</link>
      <description>&lt;P&gt;Yes you tottaly right change order of vpn can be workaround for your case.&lt;/P&gt;&lt;P&gt;And you are so welcome.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 15:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727628#M1095332</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-24T15:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727640#M1095336</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; the problem that may occur is if the other tunnel with the overlapping networks is established first (before this tunnel you are troubleshooting), then this probably may occur again.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 15:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727640#M1095336</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-24T15:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727728#M1095350</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;Yes absolutely I made sure the first tunnel had established before I configured the second&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 21:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727728#M1095350</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-24T21:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727731#M1095351</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;sure, but if there is no interesting traffic and the IPSec SA expire, or the tunnel drops for any reason, reboot etc, you might find the wrong tunnel comes up first and you've the same problem again.&lt;/P&gt;
&lt;P&gt;It might be better to use a route based VPN or not use overlapping networks, though that might be easier said than done.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 21:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4727731#M1095351</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-24T21:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4728044#M1095366</link>
      <description>&lt;P&gt;Hi Rob&lt;BR /&gt;Good point I'll bare that in mind from now on&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 11:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-vpn-issue/m-p/4728044#M1095366</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2022-11-25T11:49:39Z</dc:date>
    </item>
  </channel>
</rss>

