<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Decaps and Decrypts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3700031#M12551</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;It worked after we reconfigured and retyped the corresponding tunnel-group.. exactly the same.&lt;BR /&gt;We are using pre-shared key, not sure it was the key, but a mismatched key should be visible in the debug, and tunnel should not form from the start. This one the tunnel stood up and was stable, it's just the decrypt is not incrementing&lt;BR /&gt;Thanks for the input though&lt;/P&gt;</description>
    <pubDate>Tue, 04 Sep 2018 00:52:26 GMT</pubDate>
    <dc:creator>Jon Eyes</dc:creator>
    <dc:date>2018-09-04T00:52:26Z</dc:date>
    <item>
      <title>VPN Decaps and Decrypts</title>
      <link>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3699309#M12546</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;Any idea what could be causing this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; #pkts encaps: 1181, #pkts encrypt: 1181, #pkts digest: 1181&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; #pkts decaps: 1181, #pkts decrypt: 0, #pkts verify: 0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we usually encounter encaps/encrypts are incrementing, but no decaps/encrypt -- usually is nat issue, but this one is different.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Advance thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3699309#M12546</guid>
      <dc:creator>Jon Eyes</dc:creator>
      <dc:date>2020-02-21T16:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Decaps and Decrypts</title>
      <link>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3699321#M12547</link>
      <description>&lt;P&gt;Look at both the device log output and compare config,&amp;nbsp;&lt;SPAN&gt;This could happen when there's a route problem, NAT problem, or some sort of VPN filter.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check the tunnel configuration on both the devices&amp;nbsp; and check the is the Tunnel up ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="toc-h3"&gt;&lt;STRONG&gt;show crypto isakmp sa&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="toc-h3"&gt;&lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 02 Sep 2018 08:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3699321#M12547</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-09-02T08:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Decaps and Decrypts</title>
      <link>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3699549#M12548</link>
      <description>Make sure that return traffic is routed over the crypto interface. Also,&lt;BR /&gt;run a packet trace while the SA is up to see of the return packet will get&lt;BR /&gt;encrypted by responding device or not&lt;BR /&gt;</description>
      <pubDate>Mon, 03 Sep 2018 07:42:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3699549#M12548</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-09-03T07:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Decaps and Decrypts</title>
      <link>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3700028#M12550</link>
      <description>Hi,&lt;BR /&gt;It worked after we reconfigured and retyped the corresponding tunnel-group.. exactly the same.&lt;BR /&gt;We are using pre-shared key, not sure it was the key, but a mismatched key should be visible in the debug, and tunnel should not form from the start. This one the tunnel stood up and was stable, it's just the decrypt is not incrementing&lt;BR /&gt;Thanks for the input though</description>
      <pubDate>Tue, 04 Sep 2018 00:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3700028#M12550</guid>
      <dc:creator>Jon Eyes</dc:creator>
      <dc:date>2018-09-04T00:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Decaps and Decrypts</title>
      <link>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3700031#M12551</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;It worked after we reconfigured and retyped the corresponding tunnel-group.. exactly the same.&lt;BR /&gt;We are using pre-shared key, not sure it was the key, but a mismatched key should be visible in the debug, and tunnel should not form from the start. This one the tunnel stood up and was stable, it's just the decrypt is not incrementing&lt;BR /&gt;Thanks for the input though&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 00:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-decaps-and-decrypts/m-p/3700031#M12551</guid>
      <dc:creator>Jon Eyes</dc:creator>
      <dc:date>2018-09-04T00:52:26Z</dc:date>
    </item>
  </channel>
</rss>

