<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC site to site VPN Issues (lab recreating real issue) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711256#M12202</link>
    <description>&lt;P&gt;Same configs in the OP except also including nat (inside,outside) source static local-subnet local-subnet destination static remote-subnet remote-subnet no-proxy-arp route-lookup.&lt;BR /&gt;&lt;BR /&gt;I think its just a bug though, because I can ping all the way over the the other ASA, and when I remove the access-list for interesting traffic it shows to have killed the ikev1 session via debug, and I see those packets in wireshark. But when I added the acl back in it does not show the SA still, even though I can then ping again.&lt;BR /&gt;&lt;BR /&gt;It also increments the show crypto protocol statistics all when I do that as well.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Sep 2018 17:12:38 GMT</pubDate>
    <dc:creator>Ninjabean</dc:creator>
    <dc:date>2018-09-21T17:12:38Z</dc:date>
    <item>
      <title>IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710530#M12187</link>
      <description>&lt;P&gt;I am new to the security world, and am having a bit of trouble.&lt;BR /&gt;&lt;BR /&gt;We are trying to set up a VPN for a customer to a new vendor - and it is quite a complex (to me) design.&amp;nbsp; They have a DMZ, and basically we are trying to give the 10.2.0.0 remote subnet access to the local 10.1.1.1 machine. In the lab, I am just trying to get the basics and work up from there.&lt;BR /&gt;&lt;BR /&gt;I was able to get phase 1 going, but then phase 2 said it had a mismatch.&amp;nbsp; I tried to recreate this in packet tracer, and no matter what I do I cannot get phase 2 set up in packet tracer either.&amp;nbsp; Even following step by step guides, or copying the solution from a packet tracer lab, I cannot get it to work.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I feel like I am missing a piece - what I have&amp;nbsp;so far, and I have changed this setup many many times just trying to get it work:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;attached configs&amp;nbsp;are a lab environment and IPs are not real.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710530#M12187</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2020-02-21T16:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710567#M12189</link>
      <description>&lt;P&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;Hi,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;Well you've got a dynamic nat rule which would nat the traffic to the remote subnet, so you'll need a no nat rule to ensure the original source network is used rather than natting behind the outside interface.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;E.g:-&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;nat (inside,outside) source static local_subnet local_subnet destination static remote_subnet remote_subnet&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;HTH&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 16:15:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710567#M12189</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-20T16:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710581#M12190</link>
      <description>&lt;P&gt;Gotcha.&amp;nbsp; Now this may just be a Packet Tracer limitation, but I can't seem to do NAT from global config mode. Is there any other way to do it? Or maybe does something else need to be enabled before I can use that command?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 16:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710581#M12190</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-20T16:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710588#M12191</link>
      <description>It might well be a limitation of Packet Tracer, I haven't used it tbh. What version of ASA is running on it 8.x or 9.x? In version 8.2 the commands were different.</description>
      <pubDate>Thu, 20 Sep 2018 16:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710588#M12191</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-20T16:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710590#M12194</link>
      <description>&lt;P&gt;9.6.&amp;nbsp; This is a 5506, which the only ASA PT offers where you can put addresses on the actual interfaces.&amp;nbsp; I did try it on the other available 5505 and the command is not there either.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I may revert to an older version of PT to see if its possible. Unfortunately I don't have the lab equipment to do this for real, and the customer needs to maintain 100% uptime.&amp;nbsp; I have implemented a nat rule before that took down a different organization's network, so I am worried about doing that again :P.&amp;nbsp; I do appreciate your help regardless!&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 16:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710590#M12194</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-20T16:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710594#M12196</link>
      <description>Use GNS3 instead of PT</description>
      <pubDate>Thu, 20 Sep 2018 16:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710594#M12196</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-20T16:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710599#M12197</link>
      <description>&lt;P&gt;Fair point.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 17:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3710599#M12197</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-20T17:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711242#M12198</link>
      <description>&lt;P&gt;So I recreated everything in GNS3 (whew was that a pain to get going). Now I can ping from ASA 1 all the way across to ASA 2, but it wont even get phase one up. In wireshark I am seeing no ISAKMP or IPSec packets at all, and also none show up in counters, and debug gives no information.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 16:55:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711242#M12198</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-21T16:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711253#M12201</link>
      <description>Post the configs please</description>
      <pubDate>Fri, 21 Sep 2018 17:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711253#M12201</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-21T17:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711256#M12202</link>
      <description>&lt;P&gt;Same configs in the OP except also including nat (inside,outside) source static local-subnet local-subnet destination static remote-subnet remote-subnet no-proxy-arp route-lookup.&lt;BR /&gt;&lt;BR /&gt;I think its just a bug though, because I can ping all the way over the the other ASA, and when I remove the access-list for interesting traffic it shows to have killed the ikev1 session via debug, and I see those packets in wireshark. But when I added the acl back in it does not show the SA still, even though I can then ping again.&lt;BR /&gt;&lt;BR /&gt;It also increments the show crypto protocol statistics all when I do that as well.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 17:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711256#M12202</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-21T17:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711259#M12203</link>
      <description>Any hits on the new nat rule, when you run "show nat"?&lt;BR /&gt;Have you run a packet trace?&lt;BR /&gt;What subnet are you sourcing the ping from?</description>
      <pubDate>Fri, 21 Sep 2018 17:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711259#M12203</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-21T17:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711260#M12204</link>
      <description>&lt;P&gt;There are actually no hits on the rule. And the ping hits from outside but not inside.. didnt think to try that.&amp;nbsp; Seems like there is still something going on &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 17:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711260#M12204</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-21T17:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711264#M12205</link>
      <description>Are you pinging from the ASA? Ping from something inside the network on the correct subnet, to another device (not the ASA) that should bring up the vpn and there should be some matches on the nat rule.</description>
      <pubDate>Fri, 21 Sep 2018 17:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711264#M12205</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-21T17:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711266#M12219</link>
      <description>&lt;P&gt;&amp;nbsp;Oh good lord. That was it. I didnt know the SA wouldnt be brought up until you hit it from the inside subnet. You are a life saver! I really appreciate all your help.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 17:26:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711266#M12219</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-21T17:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711273#M12220</link>
      <description>Good to hear!&lt;BR /&gt;&lt;BR /&gt;Yes, what ever you define in the ACL is referred to as interesting traffic, only traffic matching source and destination will bring up the tunnel.</description>
      <pubDate>Fri, 21 Sep 2018 17:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711273#M12220</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-21T17:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site to site VPN Issues (lab recreating real issue)</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711278#M12221</link>
      <description>&lt;P&gt;That makes a lot of sense! I have definitely learned a lot throughout this process. Nothing like a trial by fire&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 17:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site-vpn-issues-lab-recreating-real-issue/m-p/3711278#M12221</guid>
      <dc:creator>Ninjabean</dc:creator>
      <dc:date>2018-09-21T17:39:06Z</dc:date>
    </item>
  </channel>
</rss>

