<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Opening ipsec tunnel flow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995137#M1107866</link>
    <description>&lt;P&gt;***Policy based vpn (using acl) have one status&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ipsec is active or not&lt;/P&gt;
&lt;P&gt;This need as I mention before ping from lan to lan to make ipsec active&amp;nbsp;&lt;/P&gt;
&lt;P&gt;***route-based vpn&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This have two status&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tunnel is up or down&lt;/P&gt;
&lt;P&gt;Ipsec ove this tunnel is active or not&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here tunnel status depend on reachability of tunnel destination&amp;nbsp; if not reachable then it down&lt;/P&gt;
&lt;P&gt;And about ipsec&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you mention we can use static or igp to direct traffic through tunnel&lt;/P&gt;
&lt;P&gt;If we use static and we dont use keepalive then ipsec is not active and we need ping to make it active&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we use igp then ipsec is active since the tunnel need ipsec to protect the igp packet between two end&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jan 2024 11:56:35 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-01-12T11:56:35Z</dc:date>
    <item>
      <title>Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994423#M1107811</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;i have a question&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;how Opening ipsec tunnel flow?&amp;nbsp; and what are the steps ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 15:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994423#M1107811</guid>
      <dc:creator>dhikra-marghli8</dc:creator>
      <dc:date>2024-01-11T15:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994449#M1107814</link>
      <description>&lt;P&gt;I dont full get your Q&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But we ping from lan to lan to make ipsec tunnel up.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 15:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994449#M1107814</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-11T15:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994454#M1107816</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1651856"&gt;@dhikra-marghli8&lt;/a&gt; to establish an IPSec VPN - if using a policy based VPN you need to generate interesting traffic from an IP address defined in the crypto ACL, this should then establish the VPN. If using a route based VPN then the tunnel should automatically be established.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 15:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994454#M1107816</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-11T15:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994481#M1107821</link>
      <description>&lt;P&gt;its all depends what VPN we are discussion here, you need to put more information here to address correctly&lt;/P&gt;
&lt;P&gt;as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; mentioned - you need intiate the traffic for the traffic flow end to end.&lt;/P&gt;
&lt;P&gt;adding other note, if you using ASA you can use packet tracer also i guess.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 16:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994481#M1107821</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-11T16:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994503#M1107827</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1651856"&gt;@dhikra-marghli8&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; summarize perfectlu.&lt;/P&gt;&lt;P&gt;In policy-based VPNs, the tunnel is established based on defined policies. The initiation of the VPN tunnel is triggered by interesting traffic that matches the criteria specified in the crypto ACL. This traffic is then encrypted and sent through the VPN tunnel.&lt;/P&gt;&lt;P&gt;On the other hand, in route-based VPNs, the tunnel is typically always up, and it's associated with specific routes rather than traffic characteristics. This means that any traffic destined for the specified remote networks will automatically be directed through the established VPN tunnel. Route-based VPNs often use tunnel interfaces and are more flexible in handling various types of traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 16:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4994503#M1107827</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-01-11T16:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995119#M1107864</link>
      <description>&lt;P&gt;&lt;SPAN&gt;first question : &lt;STRONG&gt;route-based VPNs&amp;nbsp; what's mean ?&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;we use route statique ou&amp;nbsp;we will use routing protocols to open a flow between two networks ?? or GRE&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;second question :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;policy-based VPNs&amp;nbsp; means tunnel ipsec use policy firewall ? to open a&amp;nbsp;flow ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i wait a reply&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 11:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995119#M1107864</guid>
      <dc:creator>dhikra-marghli8</dc:creator>
      <dc:date>2024-01-12T11:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995131#M1107865</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1651856"&gt;@dhikra-marghli8&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a route-based VPN, the establishment of the VPN connection is based on the routing table. This means that the decision to send traffic through the VPN tunnel is made based on the destination address of the packet and the entries in the routing table.&lt;BR /&gt;Route-based VPNs use routes or policies to determine which traffic should be encrypted and sent through the VPN tunnel. This can involve static routes or dynamic routing protocols.&lt;BR /&gt;GRE can be used in conjunction with route-based VPNs to create a tunnel, but the actual routing decisions are made based on the routing table.&lt;/P&gt;&lt;P&gt;In a policy-based VPN, the decision to encrypt and send traffic through the VPN tunnel is based on specific policies or rules configured on the firewall.&lt;BR /&gt;IPsec, a commonly used protocol for VPNs, is often associated with policy-based VPNs. The policies define which traffic should be protected and how it should be protected (encryption parameters, authentication, etc.).&lt;BR /&gt;These policies are often tied to specific criteria such as source/destination IP addresses, protocols, or application types.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 11:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995131#M1107865</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-01-12T11:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995137#M1107866</link>
      <description>&lt;P&gt;***Policy based vpn (using acl) have one status&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ipsec is active or not&lt;/P&gt;
&lt;P&gt;This need as I mention before ping from lan to lan to make ipsec active&amp;nbsp;&lt;/P&gt;
&lt;P&gt;***route-based vpn&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This have two status&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tunnel is up or down&lt;/P&gt;
&lt;P&gt;Ipsec ove this tunnel is active or not&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here tunnel status depend on reachability of tunnel destination&amp;nbsp; if not reachable then it down&lt;/P&gt;
&lt;P&gt;And about ipsec&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you mention we can use static or igp to direct traffic through tunnel&lt;/P&gt;
&lt;P&gt;If we use static and we dont use keepalive then ipsec is not active and we need ping to make it active&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we use igp then ipsec is active since the tunnel need ipsec to protect the igp packet between two end&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 11:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995137#M1107866</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-12T11:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Opening ipsec tunnel flow</title>
      <link>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995140#M1107867</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1651856"&gt;@dhikra-marghli8&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Côté FortiGate voilà une documentation intéressante:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Route-based-VPN-can-establish-an-IPsec-tunnel-with/ta-p/246669" target="_blank"&gt;https://community.fortinet.com/t5/FortiGate/Technical-Tip-Route-based-VPN-can-establish-an-IPsec-tunnel-with/ta-p/246669&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 12:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-ipsec-tunnel-flow/m-p/4995140#M1107867</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-01-12T12:06:48Z</dc:date>
    </item>
  </channel>
</rss>

