<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC tunnel Issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836786#M13482</link>
    <description>&lt;P&gt;You mention that&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; perhaps I am overlooking but nothing shows up when doing show run | grep keep or similar type searches. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;and I want to respond to that. On ASA dpd is enabled by default. So unless the config changes the default parameters it is expected that nothing would show up in show run.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point I believe that debug crypto isakmp will be the best tool to investigate this problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[edit] it occurs to me to ask how frequently does this happen? Is it daily? Weekly? or what?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Apr 2019 13:08:08 GMT</pubDate>
    <dc:creator>Richard Burts</dc:creator>
    <dc:date>2019-04-11T13:08:08Z</dc:date>
    <item>
      <title>IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836109#M13309</link>
      <description>&lt;P&gt;Have an ISPEC tunnel between an ASA and Router that will go down periodically and not be able to be brought back up and/or both sites can't reach each other unless the SAs are manually renegotiated on my end. Below is debug for platform/protocol 127 (changed IPs for security).&lt;/P&gt;&lt;P&gt;I am also looking for good docs in regards to reading IPSEC debugs or logs in general to be more familiar with the IPSEC commication process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# IKEv2-PROTO-7: (27628): Timer expired, Sending DPD&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000001 CurState: READY Event: EV_SEND_DPD&lt;BR /&gt;IKEv2-PROTO-7: (27628): Action: Action_Null&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000001 CurState: INFO_I_BLD_INFO Event: EV_SEND_DPD&lt;BR /&gt;IKEv2-PROTO-4: (27628): Sending DPD/liveness query&lt;BR /&gt;IKEv2-PROTO-4: (27628): Building packet for encryption.&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000001 CurState: INFO_I_BLD_INFO Event: EV_ENCRYPT_MSG&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000001 CurState: INFO_I_BLD_INFO Event: EV_NO_EVENT&lt;BR /&gt;IKEv2-PLAT-4: (27628): Encrypt success status returned via ipc 1&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000001 CurState: INFO_I_BLD_INFO Event: EV_OK_ENCRYPT_RESP&lt;BR /&gt;IKEv2-PROTO-7: (27628): Action: Action_Null&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000001 CurState: INFO_I_BLD_INFO Event: EV_TRYSEND&lt;BR /&gt;IKEv2-PROTO-4: (27628): Checking if request will fit in peer window&lt;BR /&gt;(27628):&lt;BR /&gt;IKEv2-PROTO-4: (27628): Sending Packet [To 100.1.1.1:500/From 200.1.1.1:500/VRF i0:f0]&lt;BR /&gt;(27628): Initiator SPI : B537105995B57695 - Responder SPI : 65C53893C7ED92A9 Message id: 337&lt;BR /&gt;(27628): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (27628): Next payload: ENCR, version: 2.0 (27628): Exchange type: INFORMATIONAL, flags: INITIATOR (27628): Message id: 337, length: 88(27628):&lt;BR /&gt;Payload contents:&lt;BR /&gt;(27628): ENCR(27628): Next payload: NONE, reserved: 0x0, length: 60&lt;BR /&gt;(27628): Encrypted data: 56 bytes&lt;BR /&gt;(27628):&lt;BR /&gt;IKEv2-PLAT-5: (27628): SENT PKT [INFORMATIONAL] [200.1.1.1]:500-&amp;gt;[100.1.1.1]:500 InitSPI=0xb537105995b57695 RespSPI=0x65c53893c7ed92a9 MID=00000151&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000151 CurState: INFO_I_BLD_INFO Event: EV_CHK_INFO_TYPE&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000151 CurState: INFO_I_WAIT Event: EV_NO_EVENT&lt;BR /&gt;(27628):&lt;BR /&gt;IKEv2-PROTO-4: (27628): Received Packet [From 100.1.1.1:500/To 200.1.1.1:500/VRF i0:f0]&lt;BR /&gt;(27628): Initiator SPI : B537105995B57695 - Responder SPI : 65C53893C7ED92A9 Message id: 337&lt;BR /&gt;(27628): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (27628): Next payload: ENCR, version: 2.0 (27628): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-RESPONSE (27628): Message id: 337, length: 88(27628):&lt;BR /&gt;Payload contents:&lt;BR /&gt;(27628):&lt;BR /&gt;(27628): Decrypted packet:(27628): Data: 88 bytes&lt;BR /&gt;IKEv2-PLAT-4: (27628): Decrypt success status returned via ipc 1&lt;BR /&gt;(27628): REAL Decrypted packet:(27628): Data: 0 bytes&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000151 CurState: INFO_I_WAIT Event: EV_RECV_INFO_ACK&lt;BR /&gt;IKEv2-PROTO-4: (27628): Processing ACK to informational exchange&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000151 CurState: INFO_I_WAIT Event: EV_CHK_INFO_TYPE&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000151 CurState: EXIT Event: EV_CHK_PENDING&lt;BR /&gt;IKEv2-PROTO-7: (27628): Processed response with message id 337, Requests can be sent from range 338 to 342&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000151 CurState: EXIT Event: EV_NO_EVENT&lt;BR /&gt;IKEv2-PROTO-7: (27628): SM Trace-&amp;gt; SA: I_SPI=B537105995B57695 R_SPI=65C53893C7ED92A9 (I) MsgID = 00000151 CurState: EXIT Event: EV_FREE_NEG&lt;BR /&gt;IKEv2-PROTO-7: (27628): Deleting negotiation context for my message ID: 0x151&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:01:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836109#M13309</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T17:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836125#M13339</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What are the lifetime timers configured on both the Router and ASA? They should be configured the same&lt;/P&gt;
&lt;P&gt;I can see from the output above DPD is configured on one device, is it also configured on the other device?&lt;/P&gt;
&lt;P&gt;Are you able to get the debugs from the other device at the sametime?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html" target="_self"&gt;IPSec Troubleshooting and debug commands&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/internet-key-exchange-ike/115934-technote-ikev2-00.html" target="_self"&gt;IOS IKEv2 debug troubleshooting technote&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115935-asa-ikev2-debugs.html" target="_self"&gt;ASA IKEv2 Debugs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.html" target="_self"&gt;Common ASA VPN troubleshooting&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 15:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836125#M13339</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-10T15:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836199#M13366</link>
      <description>&lt;P&gt;I found the posted debug output difficult to interpret. The one thing that is clear is that this device sent an encrypted packet and successfully received and de-encrypted a packet from the peer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The question about lifetime timers is a good one. If there is a period where there is not interesting traffic to send through the vpn then the timers may expire and the vpn comes down. It should come back up if there is interesting traffic to send through the vpn. Your comment that when the vpn is down that it must be brought back up from your end is interesting. It suggests that perhaps your end has a dynamically assigned IP address and the remote peer has a static IP. That is a valid configuration but one result of that is that the vpn must be initiated from the peer with the dynamic address and can not be initiated from the peer with the static IP. We can discuss why that is the case if your want. But for now I will not get into those details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For purposes of troubleshooting I would suggest that you enable debug for isakmp. And as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;suggests it would be nice to see debug output from both sides.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 17:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836199#M13366</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-04-10T17:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836259#M13385</link>
      <description>&lt;P&gt;Awesome RIchard!&lt;/P&gt;&lt;P&gt;No all peer addresses are static. To clarify, I am the only one who brings the tunnel back up as I don't handle the remote end device, so getting debugs on that end is not easy at this point.&lt;/P&gt;&lt;P&gt;There are no manually configured dpd/keep-alives for the tunnel on my end so I assume it is just the default timers?? I do know the remote router has: dpd 10 2 on-demand - could that play a factor?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I could run a debug for isakmp I will get back on that.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 18:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836259#M13385</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-04-10T18:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836262#M13406</link>
      <description>&lt;P&gt;Per my message to Richard, just to help you clarify all peer addresses are static. I am the only one who brings the tunnel back up as I don't handle the remote end device, so getting debugs on that end is not easy at this point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are no manually configured dpd/keep-alives for the tunnel on my end so I assume it is just the default timers?? I do know the remote router has: dpd 10 2 on-demand - could that play a factor?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I could run a debug for isakmp I will get back on that.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 18:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836262#M13406</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-04-10T18:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836280#M13415</link>
      <description>The debug output on your end indicates it sent a DPD query, so I imagine your device is configured to send DPD.&lt;BR /&gt;&lt;BR /&gt;Do you mean your device is literally the only peer that can bring the tunnel up? When the VPN was down did the 3rd party attempt to bring up the tunnel and fail? The remote device may have configured the VPN to respond/answer only, therefore your device can only initiate the establishment of the VPN tunnel. It's a long shot, but worth checking.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 10 Apr 2019 19:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836280#M13415</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-10T19:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836349#M13426</link>
      <description>&lt;P&gt;DPD is enabled on ASA by default. So if there is no manual configuration then the default timers are used, which is idle for 10 seconds initiates the query and retries every 2 seconds. The threshold (how long idle) and retry values can be changed. For Cisco to Cisco site to site vpn both peers must enable DPD or both peers must disable DPD. It is possible to set it up so that a peer will respond to DPD query but will not send DPD query (set the threshold to infinite on the peer who will only respond).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See this link for documentation about DPD on ASA&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/cli/vpn/asa-94-vpn-config/vpn-groups.html?bookSearch=true" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/cli/vpn/asa-94-vpn-config/vpn-groups.html?bookSearch=true&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I do not believe that DPD would cause problems. DPD was designed to identify and deal with a peer which has become unresponsive. If debug for ISAKMP shows that DPD is terminating sessions it is not the case that DPD caused the problem. What caused the problem was that the peer became unresponsive and DPD identified that situation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So please do run the debug for ISAKMP and post the output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 21:19:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836349#M13426</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-04-10T21:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836358#M13435</link>
      <description>&lt;P&gt;After posting my response I re-read the discussion and want to respond to this statement&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;the remote router has: dpd 10 2 on-demand - could that play a factor?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The router implementation is different from the ASA implementation, particularly in the option for on-demand (which is the default for IOS routers). When the router is operating on-demand it will respond to any DPD query it receives. But it does not send query on a periodic basis. Instead the router will only send the DPD query when it has something to send to the peer and has not received anything from the peer in a while.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I certainly do not believe that the router being configured dpd 10 2 on-demand is a factor in this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 21:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836358#M13435</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-04-10T21:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836365#M13448</link>
      <description>Just to clarify, I was not implying DPD was the issue, merely attempting to confirm whether both devices had DPD configured as this would help resolve any issue.</description>
      <pubDate>Wed, 10 Apr 2019 21:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836365#M13448</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-10T21:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836369#M13457</link>
      <description>&lt;P&gt;I appreciate the clarification. And I agree. I was responding more to the question from the original poster about whether dpd 10 2 on-demand might be a factor in the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 21:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836369#M13457</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-04-10T21:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836444#M13462</link>
      <description>Yes it sent it but perhaps I am overlooking but nothing shows up when doing show run | grep keep or similar type searches. I will double check.&lt;BR /&gt;&lt;BR /&gt;Third party has never tried. Help desk typically calls me and I bring it up. I will have to try and check to see if it is configured for respond/answer only. Not sure about the config so I have to look it up I guess.</description>
      <pubDate>Thu, 11 Apr 2019 02:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836444#M13462</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-04-11T02:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836445#M13466</link>
      <description>Ok I will do that when possible and get back to you.</description>
      <pubDate>Thu, 11 Apr 2019 02:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836445#M13466</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-04-11T02:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836446#M13476</link>
      <description>Right gotcha. I was not sure.</description>
      <pubDate>Thu, 11 Apr 2019 02:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836446#M13476</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-04-11T02:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836786#M13482</link>
      <description>&lt;P&gt;You mention that&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; perhaps I am overlooking but nothing shows up when doing show run | grep keep or similar type searches. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;and I want to respond to that. On ASA dpd is enabled by default. So unless the config changes the default parameters it is expected that nothing would show up in show run.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point I believe that debug crypto isakmp will be the best tool to investigate this problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[edit] it occurs to me to ask how frequently does this happen? Is it daily? Weekly? or what?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2019 13:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836786#M13482</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-04-11T13:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836928#M13487</link>
      <description>Thanks!&lt;BR /&gt;So I don't quite have the ISAKMP option - I was going to set a condition to show only debug for the trouble VPN. Shall I choose ikev2? See below:&lt;BR /&gt;ASA# debug crypto ?&lt;BR /&gt;&lt;BR /&gt;ca Set PKI debug levels&lt;BR /&gt;condition Set IPSec/ISAKMP debug filters&lt;BR /&gt;engine Set crypto engine debug levels&lt;BR /&gt;goid Set crypto map GOID debug levels&lt;BR /&gt;ike-common Set IKE common debug levels&lt;BR /&gt;ikev1 Set IKEV1 debug levels&lt;BR /&gt;ikev2 Set IKEV2 debug levels&lt;BR /&gt;ipsec Set IPSec debug levels&lt;BR /&gt;ss-api Set Crypto Secure Socket API debug levels&lt;BR /&gt;vpnclient Set EasyVPN client debug levels&lt;BR /&gt;</description>
      <pubDate>Thu, 11 Apr 2019 15:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836928#M13487</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-04-11T15:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836944#M13492</link>
      <description>Your debugs indicate you are using IKEv2, so debug crypto ikev2&lt;BR /&gt;&lt;BR /&gt;FYI, on newer firmware ISAKMP = IKEv1&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 11 Apr 2019 15:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3836944#M13492</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-11T15:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3837142#M13495</link>
      <description>&lt;P&gt;This is an interesting question whether to specify ikev1 or ikev2. My instinct was to suggest ikev1 since in my &amp;nbsp;experience this is more widely used. But I looked at the debug in the original post. And as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;says, it is quite clear that this implementation is using ikev2. So +5 for that observation. I wonder if there are other helpful things we might learn if we saw a sanitized copy of the ASA config?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2019 21:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/3837142#M13495</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-04-11T21:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/4762539#M1097202</link>
      <description>&lt;P&gt;What was the fix here&amp;nbsp; ?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 02:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-issues/m-p/4762539#M1097202</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2023-01-26T02:04:35Z</dc:date>
    </item>
  </channel>
</rss>

