<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD - IPSec failed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792642#M1098630</link>
    <description>&lt;P&gt;some times NAT-T is disable.&amp;nbsp;&lt;BR /&gt;I only suggest for him to check this point.&lt;BR /&gt;thanks a lot.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Mar 2023 12:27:46 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-03-13T12:27:46Z</dc:date>
    <item>
      <title>FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792471#M1098623</link>
      <description>&lt;P&gt;Hi everybody,&lt;/P&gt;
&lt;P&gt;I have an FTD with FMC that must have a VPN tunnel IPSec with a router.&lt;/P&gt;
&lt;P&gt;I have configured the FTD following all the instructions but I receive the message log error "Failed to authenticate the IKE SA".&lt;/P&gt;
&lt;P&gt;Reading the debug messages I found this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="afeniello_1-1678702529039.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/178803iAF0E1739511C8802/image-size/medium?v=v2&amp;amp;px=400" role="button" title="afeniello_1-1678702529039.png" alt="afeniello_1-1678702529039.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Both endpoints use the same PSK, maybe is something about the algorithms.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is the remote peer config:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="afeniello_0-1678702373366.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/178802i3026985E5369AB91/image-size/medium?v=v2&amp;amp;px=400" role="button" title="afeniello_0-1678702373366.png" alt="afeniello_0-1678702373366.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I've uploaded the debug logs too, please help me to find a solution.&lt;/P&gt;
&lt;P&gt;Thanks for your help!!&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 10:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792471#M1098623</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-13T10:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792607#M1098625</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1318234"&gt;@angelito_mas&lt;/a&gt; this is likely a PSK mismatch, double check the PSK and confirm the received peer's identity is matched correctly.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 11:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792607#M1098625</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-13T11:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792616#M1098626</link>
      <description>&lt;P&gt;How can I verify the peer's identity? This is my config:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="afeniello_0-1678708566077.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/178810iB5309D0199965AA2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="afeniello_0-1678708566077.png" alt="afeniello_0-1678708566077.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 11:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792616#M1098626</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-13T11:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792625#M1098627</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1318234"&gt;@angelito_mas&lt;/a&gt; I assume you replaced the identity - IKEv2-PROTO-4: (5011): Use preshared key for id &lt;STRONG&gt;*remote* &lt;/STRONG&gt;&amp;lt; I expect that was the IP address of the peer?&lt;/P&gt;
&lt;P&gt;I suggest you and the peer replace your PSK, to be sure it's correct on both sides. Confirm no whitespace entered.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 12:06:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792625#M1098627</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-13T12:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792630#M1098628</link>
      <description>&lt;P&gt;one of Peer FTD or router is behind NATing device this make issue in identity,&lt;BR /&gt;you must config Peer and PSK with mapped IP not real IP.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;also check for IKEv2&amp;nbsp;&lt;BR /&gt;are you config remote identify address under ikev2 profile of router ?? this can solve issue if IP is NATing in some point between two Peer.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 12:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792630#M1098628</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-13T12:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792635#M1098629</link>
      <description>&lt;P&gt;Good suggestion, but...&lt;/P&gt;
&lt;P&gt;IKEv2-PROTO-4: (5011): Checking NAT discovery&lt;BR /&gt;IKEv2-PROTO-4: (5011): NAT not found&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 12:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792635#M1098629</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-13T12:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792642#M1098630</link>
      <description>&lt;P&gt;some times NAT-T is disable.&amp;nbsp;&lt;BR /&gt;I only suggest for him to check this point.&lt;BR /&gt;thanks a lot.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 12:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792642#M1098630</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-13T12:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792644#M1098631</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Where I can check it?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 12:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792644#M1098631</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-13T12:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792716#M1098633</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1318234"&gt;@angelito_mas&lt;/a&gt; nat-t is enabled as default and from the output of the debugs is looks like it is enabled.&lt;/P&gt;
&lt;P&gt;To confirm, the id &lt;STRONG&gt;*remote*&lt;/STRONG&gt; as per the debugs is the public IP address of the peer right?&lt;/P&gt;
&lt;P&gt;Re-enter the PSK on both devices and confirm it is identical - &lt;STRONG&gt;on both sides.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 13:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792716#M1098633</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-13T13:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792725#M1098634</link>
      <description>&lt;P&gt;as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;mention it enable by default&lt;BR /&gt;also I mention above&amp;nbsp;&lt;BR /&gt;use correct IP in remote identity under IKEv2 profile of Router. did you check this point ??&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 13:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792725#M1098634</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-13T13:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792811#M1098637</link>
      <description>&lt;P&gt;I can confirm you that the id&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;*remote*&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;as per the debugs is the public IP address of the peer and that the PSK on both devices is identical.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 14:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4792811#M1098637</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-13T14:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4793081#M1098643</link>
      <description>&lt;P&gt;I run lab, to config IKEv2 between ASA and Router IOS,&amp;nbsp;&lt;BR /&gt;I face same issue as you but&amp;nbsp;&lt;BR /&gt;by check debug line by line I found issue&amp;nbsp;&lt;BR /&gt;points to care in config :-&lt;BR /&gt;1- user address under ikev2 policy&amp;nbsp;&lt;BR /&gt;2- use identity local address under profile&amp;nbsp;&lt;BR /&gt;3- in proposal please match integrity with prf you use per-router and per-asa&amp;nbsp;&lt;BR /&gt;4- transform set in router must not contain any AH, and in same time config hash in transform set and config same integrity in IKEv2 proposal in ASA&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I do all and I success.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (379).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/178872i73387EE0DC306209/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (379).png" alt="Screenshot (379).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;IOU1#show run&lt;BR /&gt;IOU1#show running-config&lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;Current configuration : 2744 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 22:38:33 UTC Mon Mar 13 2023&lt;BR /&gt;!&lt;BR /&gt;version 15.5&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname IOU1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;bsd-client server url &lt;A href="https://cloudsso.cisco.com/as/token.oauth2" target="_blank"&gt;https://cloudsso.cisco.com/as/token.oauth2&lt;/A&gt;&lt;BR /&gt;mmi polling-interval 60&lt;BR /&gt;--More--&lt;BR /&gt;*Mar 13 22:38:33.352: %SYS-5-CONFIG_I: Configured from console by console&lt;BR /&gt;no mmi auto-configure&lt;BR /&gt;no mmi pvc&lt;BR /&gt;mmi snmp-timeout 180&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip icmp rate-limit unreachable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;cts logging verbose&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 5&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 proposal mhm&lt;BR /&gt;encryption des&lt;BR /&gt;integrity md5&lt;BR /&gt;group 5&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 policy mhm&lt;BR /&gt;match address local 100.0.0.2&lt;BR /&gt;proposal mhm&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 keyring mhm&lt;BR /&gt;peer any&lt;BR /&gt;address 100.0.0.1&lt;BR /&gt;pre-shared-key local mhm&lt;BR /&gt;pre-shared-key remote mhm&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 profile mhm&lt;BR /&gt;match address local 100.0.0.2&lt;BR /&gt;match identity remote address 100.0.0.1 255.255.255.255&lt;BR /&gt;identity local address 100.0.0.2&lt;BR /&gt;authentication remote pre-share&lt;BR /&gt;authentication local pre-share&lt;BR /&gt;keyring local mhm&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set mhm esp-des esp-md5-hmac&lt;BR /&gt;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map mhm 10 ipsec-isakmp&lt;BR /&gt;set peer 100.0.0.1&lt;BR /&gt;set transform-set mhm&lt;BR /&gt;set pfs group5&lt;BR /&gt;set ikev2-profile mhm&lt;BR /&gt;match address 100&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;ip address 100.0.0.2 255.255.255.0&lt;BR /&gt;crypto map mhm&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;ip address 20.0.0.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Serial2/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;interface Serial2/1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;interface Serial2/2&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;interface Serial2/3&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;interface Serial3/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;interface Serial3/1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;interface Serial3/2&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;interface Serial3/3&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;serial restart-delay 0&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 100.0.0.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 100 permit ip 20.0.0.0 0.0.0.255 10.0.0.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;line aux 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login&lt;BR /&gt;transport input none&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 22:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4793081#M1098643</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-13T22:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803583#M1099070</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;finally we made it. It was the PRF algorithm that was not enabled on the other side..&lt;BR /&gt;We choose to use ikev1 to simplify the process.&lt;/P&gt;
&lt;P&gt;By the way, now we have some routing problems. The protected networks do not talk.&lt;/P&gt;
&lt;P&gt;From the FTD CLI i see the network advertised but i cannot reach it:&lt;/P&gt;
&lt;P&gt;PCO-N-FWRA1# show route static&lt;/P&gt;
&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via x.x.x.x, WAN&lt;BR /&gt;S 10.0.0.0 255.0.0.0 [5/0] via 172.27.58.209, services_internet&lt;BR /&gt;&lt;STRONG&gt;V 10.38.220.192 255.255.255.192 connected by VPN (advertised), WAN&lt;/STRONG&gt;&lt;BR /&gt;S 172.16.0.0 255.240.0.0 [1/0] via 172.27.58.225, dcs_internet&lt;BR /&gt;S 172.27.1.0 255.255.255.0 [1/0] via 172.27.58.225, dcs_internet&lt;BR /&gt;V 192.168.254.1 255.255.255.255 connected by VPN (advertised), WAN&lt;BR /&gt;V 192.168.254.2 255.255.255.255 connected by VPN (advertised), WAN&lt;BR /&gt;V 192.168.254.52 255.255.255.255 connected by VPN (advertised), WAN&lt;/P&gt;
&lt;P&gt;I've already enabled the access policy.&lt;/P&gt;
&lt;P&gt;Can you help me?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 08:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803583#M1099070</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-29T08:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803585#M1099071</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1318234"&gt;@angelito_mas&lt;/a&gt; Please run "show crypto ipsec sa" and provide the full output.&lt;/P&gt;
&lt;P&gt;Do you have a NAT exemption rule to ensure the VPN traffic is not unintentially translated?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 08:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803585#M1099071</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-29T08:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803590#M1099072</link>
      <description>&lt;P&gt;Here you are:&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;PCO-N-FWRA1# show crypto ipsec sa&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;interface: WAN&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Crypto map tag: CSM_WAN_map, seq num: 1, local addr: 190.216.126.130&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;access-list CSM_IPSEC_ACL_2 extended permit ip 10.86.170.0 255.255.255.0 10.38.220.192 255.255.255.192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;local ident (addr/mask/prot/port): (10.86.170.0/255.255.255.0/0/0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;remote ident (addr/mask/prot/port): (10.38.220.192/255.255.255.192/0/0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current_peer: 150.238.239.218&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#TFC rcvd: 0, #TFC sent: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#send errors: 0, #recv errors: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;local crypto endpt.: 190.216.126.130/0, remote crypto endpt.: 150.238.239.218/0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;PMTU time remaining (sec): 0, DF policy: clear-df&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;ICMP error validation: disabled, TFC packets: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current outbound spi: C21F04A2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current inbound spi : 4D1402FD&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;inbound esp sas:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;spi: 0x4D1402FD (1293157117)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;SA State: active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;transform: esp-aes-256 esp-sha-hmac no compression&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;slot: 0, conn_id: 203, crypto-map: CSM_WAN_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;sa timing: remaining key lifetime (kB/sec): (4374000/2400)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;IV size: 16 bytes&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;replay detection support: Y&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Anti replay bitmap:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0x00000000 0x00000001&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;outbound esp sas:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;spi: 0xC21F04A2 (3256812706)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;SA State: active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;transform: esp-aes-256 esp-sha-hmac no compression&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;slot: 0, conn_id: 203, crypto-map: CSM_WAN_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;sa timing: remaining key lifetime (kB/sec): (4374000/2400)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;IV size: 16 bytes&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;replay detection support: Y&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Anti replay bitmap:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0x00000000 0x00000001&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Crypto map tag: CSM_WAN_map, seq num: 1, local addr: 190.216.126.130&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;access-list CSM_IPSEC_ACL_2 extended permit ip 10.124.170.0 255.255.255.0 10.38.220.192 255.255.255.192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;local ident (addr/mask/prot/port): (10.124.170.0/255.255.255.0/0/0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;remote ident (addr/mask/prot/port): (10.38.220.192/255.255.255.192/0/0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current_peer: 150.238.239.218&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#TFC rcvd: 0, #TFC sent: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#send errors: 0, #recv errors: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;local crypto endpt.: 190.216.126.130/0, remote crypto endpt.: 150.238.239.218/0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;PMTU time remaining (sec): 0, DF policy: clear-df&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;ICMP error validation: disabled, TFC packets: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current outbound spi: CAA5EEE9&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current inbound spi : C2A97AE0&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;inbound esp sas:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;spi: 0xC2A97AE0 (3265886944)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;SA State: active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;transform: esp-aes-256 esp-sha-hmac no compression&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;slot: 0, conn_id: 203, crypto-map: CSM_WAN_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;sa timing: remaining key lifetime (kB/sec): (4374000/2400)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;IV size: 16 bytes&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;replay detection support: Y&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Anti replay bitmap:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0x00000000 0x00000001&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;outbound esp sas:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;spi: 0xCAA5EEE9 (3399872233)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;SA State: active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;transform: esp-aes-256 esp-sha-hmac no compression&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;slot: 0, conn_id: 203, crypto-map: CSM_WAN_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;sa timing: remaining key lifetime (kB/sec): (4374000/2400)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;IV size: 16 bytes&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;replay detection support: Y&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Anti replay bitmap:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0x00000000 0x00000001&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Crypto map tag: CSM_WAN_map, seq num: 1, local addr: 190.216.126.130&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;access-list CSM_IPSEC_ACL_2 extended permit ip 10.125.170.0 255.255.255.0 10.38.220.192 255.255.255.192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;local ident (addr/mask/prot/port): (10.125.170.0/255.255.255.0/0/0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;remote ident (addr/mask/prot/port): (10.38.220.192/255.255.255.192/0/0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current_peer: 150.238.239.218&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#TFC rcvd: 0, #TFC sent: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;#send errors: 0, #recv errors: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;local crypto endpt.: 190.216.126.130/0, remote crypto endpt.: 150.238.239.218/0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;PMTU time remaining (sec): 0, DF policy: clear-df&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;ICMP error validation: disabled, TFC packets: disabled&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current outbound spi: C80A954D&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;current inbound spi : 4FE23246&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;inbound esp sas:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;spi: 0x4FE23246 (1340224070)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;SA State: active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;transform: esp-aes-256 esp-sha-hmac no compression&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;slot: 0, conn_id: 203, crypto-map: CSM_WAN_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;sa timing: remaining key lifetime (kB/sec): (4374000/2401)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;IV size: 16 bytes&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;replay detection support: Y&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Anti replay bitmap:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0x00000000 0x00000001&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;outbound esp sas:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;spi: 0xC80A954D (3356136781)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;SA State: active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;transform: esp-aes-256 esp-sha-hmac no compression&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;slot: 0, conn_id: 203, crypto-map: CSM_WAN_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;sa timing: remaining key lifetime (kB/sec): (4374000/2401)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;IV size: 16 bytes&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;replay detection support: Y&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Anti replay bitmap:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0x00000000 0x00000001&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 08:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803590#M1099072</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-29T08:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803592#M1099073</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1318234"&gt;@angelito_mas&lt;/a&gt; ok so the IPSec SA are established, but the encap|decaps counters have not increased.&lt;/P&gt;
&lt;P&gt;Is this Firewall the default gateway for all traffic or a dedicated VPN concentrator? Is traffic for those remote VPN networks even routed to this Firewall?&lt;/P&gt;
&lt;P&gt;Are you generating traffic as defined in the crypto ACL?&lt;/P&gt;
&lt;P&gt;What about the NAT question asked previously?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 09:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803592#M1099073</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-29T09:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803643#M1099074</link>
      <description>&lt;P&gt;The 3 protected subnets are configured on 3 different routers that have a static route with the FW as next-hop to the protected network on the other side.&lt;/P&gt;
&lt;P&gt;On the FW there is a static route for the 10.0.0.0/8 to the WAN interface (the same which I configured the tunnel vpn) and there is a NAT rule that translate the whole net to the public IP.&lt;BR /&gt;I cannot verify if there is a NAT exeempion.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 09:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803643#M1099074</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-29T09:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803674#M1099075</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1318234"&gt;@angelito_mas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1318234"&gt;@angelito_mas&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;and there is a &lt;EM&gt;&lt;U&gt;&lt;STRONG&gt;NAT rule that translate the whole net to the public IP.&lt;/STRONG&gt;&lt;/U&gt;&lt;/EM&gt;&lt;BR /&gt;I cannot verify if there is a NAT exeempion.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;well if you are translating the whole network to the public IP address, then the source IP address will be the public IP address and not the real IP of the networks defined as interesting traffic, so the traffic would not match the crypto ACL and therefore not encrypted.&lt;/P&gt;
&lt;P&gt;You either need to define change the crypto ACL to use the public IP address as the source network or define a NAT exemption rule to ensure the traffic is not translated and is routed. This ensures the real IP address is sent over the tunnel and would therefore match the crypto ACL.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 09:50:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803674#M1099075</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-29T09:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803746#M1099076</link>
      <description>&lt;P&gt;With nat exeemption enabled these 3 subnet will have access to internet?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 10:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803746#M1099076</guid>
      <dc:creator>angelito_mas</dc:creator>
      <dc:date>2023-03-29T10:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTD - IPSec failed</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803781#M1099077</link>
      <description>&lt;P&gt;check below comment.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 10:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-failed/m-p/4803781#M1099077</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-29T10:27:53Z</dc:date>
    </item>
  </channel>
</rss>

