<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I don´t see any filtering on in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816073#M173189</link>
    <description>&lt;P&gt;I don´t see any filtering on the vpn traffic.&lt;/P&gt;
&lt;P&gt;Whats means the phase 11 and why the src ip and dst ip are swapped.&lt;/P&gt;
&lt;P&gt;Phase: 11 &lt;BR /&gt;Type: VPN &lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: DROP &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; out id=0xcbcb1b18, priority=70, domain=encrypt, deny=false&lt;BR /&gt; hits=1, user_data=0x0, cs_id=0xcb43a1c8, reverse, flags=0x0, protocol=0&lt;BR /&gt; &lt;STRONG&gt;src ip/id=10.15.15.1, mask=255.255.255.255, port=0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; dst ip/id=10.1.0.0, mask=255.255.0.0, port=0, dscp=0x0&lt;/STRONG&gt;&lt;BR /&gt; input_ifc=any, output_ifc=outside&lt;/P&gt;</description>
    <pubDate>Thu, 21 Jan 2016 02:23:34 GMT</pubDate>
    <dc:creator>Rafael Jimenez</dc:creator>
    <dc:date>2016-01-21T02:23:34Z</dc:date>
    <item>
      <title>Problems with VPN-SITE-TO-SITE interesting traffic.</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816061#M173177</link>
      <description>&lt;P&gt;There is an existing network, The HQ and two BR. Each BR is connected to the HQ via site-to-site vpn and are working fine.&lt;/P&gt;
&lt;P&gt;I had to add a third BR. Currently the vpn tunnel is up, but I’m unable to get traffic pass through the tunnel.&lt;/P&gt;
&lt;P&gt;I need your help guys, I´m out of ideas.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816061#M173177</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2019-03-12T07:10:18Z</dc:date>
    </item>
    <item>
      <title>We need a lot more</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816062#M173178</link>
      <description>&lt;P&gt;We need a lot more information.&lt;/P&gt;
&lt;P&gt;Perhaps post relevant configurations ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2016 23:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816062#M173178</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-20T23:13:33Z</dc:date>
    </item>
    <item>
      <title>attached the relevand config</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816063#M173179</link>
      <description>&lt;P&gt;attached the relevant config for HQ and new BR.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;public ips changed.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 00:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816063#M173179</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T00:26:08Z</dc:date>
    </item>
    <item>
      <title>the ACL in HQ related with</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816064#M173180</link>
      <description>&lt;P&gt;the ACL in HQ related with the new BR site.&lt;/P&gt;
&lt;P&gt;HQ Access-list&lt;/P&gt;
&lt;P&gt;access-list outside2_access_in extended permit ip object-group Remote-networks object-group internal-networks &lt;BR /&gt;access-list outside2_access_in extended permit ip object-group Remote-networks object-group Remote-networks &lt;BR /&gt;access-list outside2_access_in extended permit ip object-group VPNPOOLS object-group DM_INLINE_NETWORK_2 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group outside2_access_in in interface outside2&lt;/P&gt;
&lt;P&gt;ASA Version 9.1(6)4 &amp;nbsp;in both appliances, 5510 and 5505.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 00:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816064#M173180</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T00:26:09Z</dc:date>
    </item>
    <item>
      <title>Are you trying to send</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816065#M173181</link>
      <description>&lt;P&gt;Are you trying to send traffic between the new BR and other BRs or just from the BR to HQ ?&lt;/P&gt;
&lt;P&gt;What are the source and destination IPs you are testing with ?&lt;/P&gt;
&lt;P&gt;I'm assuming if you have any acls applied to other interfaces ie. not the crypto map interface you have allowed the relevant traffic ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 00:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816065#M173181</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-21T00:27:30Z</dc:date>
    </item>
    <item>
      <title>You read my mind :)</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816066#M173182</link>
      <description>&lt;P&gt;You read my mind &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;By default IPSEC traffic should be allowed through without an acl although it depends on what you set on the ASA.&lt;/P&gt;
&lt;P&gt;Can you answer other points in my last post.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 00:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816066#M173182</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-21T00:29:24Z</dc:date>
    </item>
    <item>
      <title>initially I need send traffic</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816067#M173183</link>
      <description>&lt;P&gt;initially I need send traffic between the BR and HQ.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Im initiating https traffic from 10.9.1.xx to 10.1.2.10. in the first attempt the vpn goes up, the show crypto ikev1 sa show the MM_ACTIVE.&lt;/P&gt;
&lt;P&gt;1 IKE Peer: x.x.x.x&lt;BR /&gt; Type : L2L Role : initiator &lt;BR /&gt; Rekey : no State : MM_ACTIVE&lt;/P&gt;
&lt;P&gt;The acl posted latter is one located in the HQ ASA. (i don't have rights to modify anything at the HQ&amp;nbsp;for the moment)&lt;/P&gt;
&lt;P&gt;the crypto map address use this acl :&lt;/P&gt;
&lt;P&gt;@HQ:&lt;/P&gt;
&lt;P&gt;access-list HH-BAQ-cryptomap extended permit ip object-group HH-VPN_BAQ object-group HH-BAQ &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;@BR&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HH-BAQ-cryptomap extended permit ip object-group HH-BAQ object-group HH-VPN_BAQ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 00:58:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816067#M173183</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T00:58:57Z</dc:date>
    </item>
    <item>
      <title>Thanks Jon, I appreciate your</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816068#M173184</link>
      <description>&lt;P&gt;Thanks Jon, I appreciate your help with this issue.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 01:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816068#M173184</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T01:00:25Z</dc:date>
    </item>
    <item>
      <title>I am a bit confused with the</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816069#M173185</link>
      <description>&lt;P&gt;Sorry, ignore that, just noticed you are ping 10.1.2.10.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 01:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816069#M173185</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-21T01:05:53Z</dc:date>
    </item>
    <item>
      <title>Can you run a packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816070#M173186</link>
      <description>&lt;P&gt;Can you run&amp;nbsp;a packet tracer from the BR site to an IP at the HQ site and post output.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 01:07:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816070#M173186</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-21T01:07:06Z</dc:date>
    </item>
    <item>
      <title>unfortunately I dont have</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816071#M173187</link>
      <description>&lt;P&gt;unfortunately I dont have access to the BR right now. &lt;BR /&gt;I´m posting an packet tracer that I did some days before. &lt;BR /&gt;may be help for the moment, I always receive a drop in the encryp phase.&lt;/P&gt;
&lt;P&gt;fw1# packet-tracer input outside tcp 10.1.2.254 5060 10.15.15.1 5060 de$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 10.15.15.1 255.255.255.255 inside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static HH-BAQ HH-BAQ destination static HH-VPN_BAQ HH-VPN_BAQ no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 10.15.15.1/5060 to 10.15.15.1/5060&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_IN extended permit ip object-group HH-VPN_BAQ object-group HH-BAQ &lt;BR /&gt;object-group network HH-VPN_BAQ&lt;BR /&gt; network-object 10.1.0.0 255.255.0.0&lt;BR /&gt; network-object 10.2.0.0 255.255.0.0&lt;BR /&gt; network-object 10.3.0.0 255.255.0.0&lt;BR /&gt; network-object 10.4.0.0 255.255.0.0&lt;BR /&gt; network-object 10.5.0.0 255.255.0.0&lt;BR /&gt;object-group network HH-BAQ&lt;BR /&gt; network-object 10.9.1.0 255.255.255.0&lt;BR /&gt; network-object 10.15.15.1 255.255.255.255&lt;BR /&gt; network-object 192.168.0.0 255.255.255.0&lt;BR /&gt; network-object 10.10.10.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xcb4b05c0, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=0, user_data=0xc96190a0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=10.1.0.0, mask=255.255.0.0, port=0&lt;BR /&gt; dst ip/id=10.15.15.1, mask=255.255.255.255, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt; &lt;BR /&gt;Phase: 4 &lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xcb4c1238, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=355, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt; &lt;BR /&gt;Phase: 5 &lt;BR /&gt;Type: INSPECT &lt;BR /&gt;Subtype: inspect-sip&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xcbdca550, priority=70, domain=inspect-sip, deny=false&lt;BR /&gt; hits=2, user_data=0xcbdc9730, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=5060, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt; &lt;BR /&gt;Phase: 6 &lt;BR /&gt;Type: VPN &lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xcb3e68b0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt; hits=17, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt; &lt;BR /&gt;Phase: 7 &lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xcb49d130, priority=0, domain=host-limit, deny=false&lt;BR /&gt; hits=332, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt; &lt;BR /&gt;Phase: 8 &lt;BR /&gt;Type: NAT &lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config: &lt;BR /&gt;nat (inside,outside) source static HH-BAQ HH-BAQ destination static HH-VPN_BAQ HH-VPN_BAQ no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xcb4f1280, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt; hits=1, user_data=0xcb4dc918, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=10.1.0.0, mask=255.255.0.0, port=0&lt;BR /&gt; dst ip/id=10.15.15.1, mask=255.255.255.255, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=inside&lt;BR /&gt; &lt;BR /&gt;Phase: 9 &lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xcbdd2268, priority=0, domain=user-statistics, deny=false&lt;BR /&gt; hits=325, user_data=0xcbdb1d48, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=inside&lt;BR /&gt; &lt;BR /&gt;Phase: 10 &lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0xcb4997d8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=442, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;BR /&gt; &lt;BR /&gt;Phase: 11 &lt;BR /&gt;Type: VPN &lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: DROP &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; out id=0xcbcb1b18, priority=70, domain=encrypt, deny=false&lt;BR /&gt; hits=1, user_data=0x0, cs_id=0xcb43a1c8, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=10.15.15.1, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip/id=10.1.0.0, mask=255.255.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=outside&lt;BR /&gt; &lt;BR /&gt;Result: &lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop &lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 01:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816071#M173187</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T01:22:49Z</dc:date>
    </item>
    <item>
      <title>Assuming the tunnel is fully</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816072#M173188</link>
      <description>&lt;P&gt;Assuming the tunnel is fully up I suggest running debugging on IPSEC when you get access to the BR and see if you get any error messages that would indicate anything.&lt;/P&gt;
&lt;P&gt;Other than that I can't see anything wrong with the configuration you posted unless the HQ ASA is doing some other filtering on the VPN traffic.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 01:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816072#M173188</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-21T01:43:53Z</dc:date>
    </item>
    <item>
      <title>I don´t see any filtering on</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816073#M173189</link>
      <description>&lt;P&gt;I don´t see any filtering on the vpn traffic.&lt;/P&gt;
&lt;P&gt;Whats means the phase 11 and why the src ip and dst ip are swapped.&lt;/P&gt;
&lt;P&gt;Phase: 11 &lt;BR /&gt;Type: VPN &lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: DROP &lt;BR /&gt;Config: &lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; out id=0xcbcb1b18, priority=70, domain=encrypt, deny=false&lt;BR /&gt; hits=1, user_data=0x0, cs_id=0xcb43a1c8, reverse, flags=0x0, protocol=0&lt;BR /&gt; &lt;STRONG&gt;src ip/id=10.15.15.1, mask=255.255.255.255, port=0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; dst ip/id=10.1.0.0, mask=255.255.0.0, port=0, dscp=0x0&lt;/STRONG&gt;&lt;BR /&gt; input_ifc=any, output_ifc=outside&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 02:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816073#M173189</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T02:23:34Z</dc:date>
    </item>
    <item>
      <title>Hello Jon,</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816074#M173190</link>
      <description>&lt;P&gt;Hello Jon,&lt;/P&gt;
&lt;P&gt;everything looks good, but I don´t know why I can´t access the HQ servers (https://10.1.2.10, or ssh 10.1.2.254).&lt;/P&gt;
&lt;P&gt;fw1# sh vpn-sessiondb detail l2l&lt;/P&gt;
&lt;P&gt;Session Type: LAN-to-LAN Detailed&lt;/P&gt;
&lt;P&gt;Connection : HQ.HQ.HQ.HQ&lt;BR /&gt;Index : 1 IP Addr : HQ.HQ.HQ.HQ&lt;BR /&gt;Protocol : IKEv1 IPsec&lt;BR /&gt;Encryption : IKEv1: (1)AES128 IPsec: (1)AES128&lt;BR /&gt;Hashing : IKEv1: (1)SHA1 IPsec: (1)SHA1&lt;BR /&gt;Bytes Tx : 917461 Bytes Rx : 3707195&lt;BR /&gt;Login Time : 07:21:10 PEST Thu Jan 21 2016&lt;BR /&gt;Duration : 1h:51m:42s&lt;BR /&gt;IKEv1 Tunnels: 1&lt;BR /&gt;IPsec Tunnels: 1&lt;/P&gt;
&lt;P&gt;IKEv1:&lt;BR /&gt; Tunnel ID : 1.1&lt;BR /&gt; UDP Src Port : 500 UDP Dst Port : 500&lt;BR /&gt; IKE Neg Mode : Main Auth Mode : preSharedKeys&lt;BR /&gt; Encryption : AES128 Hashing : SHA1&lt;BR /&gt; Rekey Int (T): 86400 Seconds Rekey Left(T): 79698 Seconds&lt;BR /&gt; D/H Group : 5&lt;BR /&gt; Filter Name :&lt;/P&gt;
&lt;P&gt;IPsec:&lt;BR /&gt; Tunnel ID : 1.3&lt;BR /&gt; Local Addr : 10.9.0.0/255.255.0.0/0/0&lt;BR /&gt; Remote Addr : 10.1.0.0/255.255.0.0/0/0&lt;BR /&gt; Encryption : AES128 Hashing : SHA1&lt;BR /&gt; Encapsulation: Tunnel&lt;BR /&gt; Rekey Int (T): 28800 Seconds Rekey Left(T): 22345 Seconds&lt;BR /&gt; Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4603853 K-Bytes&lt;BR /&gt; Idle Time Out: 30 Minutes Idle TO Left : 30 Minutes&lt;BR /&gt; Bytes Tx : 940236 Bytes Rx : 4246718&lt;BR /&gt; Pkts Tx : 8288 Pkts Rx : 10163&lt;/P&gt;
&lt;P&gt;NAC:&lt;BR /&gt; Reval Int (T): 0 Seconds Reval Left(T): 0 Seconds&lt;BR /&gt; SQ Int (T) : 0 Seconds EoU Age(T) : 6747 Seconds&lt;BR /&gt; Hold Left (T): 0 Seconds Posture Token:&lt;BR /&gt; Redirect URL :&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;fw1# sh crypto ipsec sa detail&lt;BR /&gt;interface: outside&lt;BR /&gt; Crypto map tag: outside_map, seq num: 100, local addr: &amp;lt;MY-PUBLIC-IP&amp;gt;&lt;/P&gt;
&lt;P&gt;access-list &amp;lt;BR-cryptomap&amp;gt; extended permit ip 10.9.0.0 255.255.0.0 10.1.0.0 255.255.0.0&lt;BR /&gt; local ident (addr/mask/prot/port): (10.9.0.0/255.255.0.0/0/0)&lt;BR /&gt; remote ident (addr/mask/prot/port): (10.1.0.0/255.255.0.0/0/0)&lt;BR /&gt; current_peer: &amp;lt;HQ-PUBLICIP&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt; #pkts encaps: 11317, #pkts encrypt: 11317, #pkts digest: 11317&lt;BR /&gt; #pkts decaps: 13288, #pkts decrypt: 13288, #pkts verify: 13288&lt;BR /&gt; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt; #pkts not compressed: 11317, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt; #TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt; #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt; #pkts no sa (send): 0, #pkts invalid sa (rcv): 0&lt;BR /&gt; #pkts encaps failed (send): 0, #pkts decaps failed (rcv): 0&lt;BR /&gt; #pkts invalid prot (rcv): 0, #pkts verify failed: 0&lt;BR /&gt; #pkts invalid identity (rcv): 0, #pkts invalid len (rcv): 0&lt;BR /&gt; #pkts invalid pad (rcv): 0,&lt;BR /&gt; #pkts invalid ip version (rcv): 0,&lt;BR /&gt; #pkts replay rollover (send): 0, #pkts replay rollover (rcv): 0&lt;BR /&gt; #pkts replay failed (rcv): 0&lt;BR /&gt; #pkts min mtu frag failed (send): 0, #pkts bad frag offset (rcv): 0&lt;BR /&gt; #pkts internal err (send): 0, #pkts internal err (rcv): 0&lt;/P&gt;
&lt;P&gt;local crypto endpt.: &amp;lt;MYPUBLICIP&amp;gt;, remote crypto endpt.: &amp;lt;HQ-PUBLICIP&amp;gt;&lt;BR /&gt; path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;BR /&gt; PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt; ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt; current outbound spi: C78F1563&lt;BR /&gt; current inbound spi : C7DBCE13&lt;/P&gt;
&lt;P&gt;inbound esp sas:&lt;BR /&gt; spi: 0xC7DBCE13 (3353071123)&lt;BR /&gt; transform: esp-aes esp-sha-hmac no compression&lt;BR /&gt; in use settings ={L2L, Tunnel, IKEv1, }&lt;BR /&gt; slot: 0, conn_id: 4096, crypto-map: outside_map&lt;BR /&gt; sa timing: remaining key lifetime (kB/sec): (4367833/20502)&lt;BR /&gt; IV size: 16 bytes&lt;BR /&gt; replay detection support: Y&lt;BR /&gt; Anti replay bitmap:&lt;BR /&gt; 0xFF7F77FF 0xF9FFFDFF&lt;BR /&gt; outbound esp sas:&lt;BR /&gt; spi: 0xC78F1563 (3348043107)&lt;BR /&gt; transform: esp-aes esp-sha-hmac no compression&lt;BR /&gt; in use settings ={L2L, Tunnel, IKEv1, }&lt;BR /&gt; slot: 0, conn_id: 4096, crypto-map: outside_map&lt;BR /&gt; sa timing: remaining key lifetime (kB/sec): (4372817/20500)&lt;BR /&gt; IV size: 16 bytes&lt;BR /&gt; replay detection support: Y&lt;BR /&gt; Anti replay bitmap:&lt;BR /&gt; 0x00000000 0x00000001&lt;/P&gt;
&lt;P&gt;======&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 15:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816074#M173190</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T15:04:46Z</dc:date>
    </item>
    <item>
      <title>Apologies for delay in</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816075#M173191</link>
      <description>&lt;P&gt;Apologies for delay in getting back.&lt;/P&gt;
&lt;P&gt;It looks good to me and it suggests packets are getting encrypted and decrypted for the tunnel which is confusing based on your packet tracer output.&lt;/P&gt;
&lt;P&gt;Are you sure it is not a problem at the HQ end on their ASA or even with the device you are trying to connect to ?&lt;/P&gt;
&lt;P&gt;Can you post the same configuration you posted for this BR for a BR that actually works ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 21:45:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816075#M173191</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-21T21:45:03Z</dc:date>
    </item>
    <item>
      <title>Thanks John, your help have</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816076#M173192</link>
      <description>&lt;P&gt;Thanks John, your help have been enormous because I confirmed the config was ok. I requested some info to the HQ and found the problem is a routing problem. They need setup the routes in all L3 devices that are involved.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 22:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816076#M173192</guid>
      <dc:creator>Rafael Jimenez</dc:creator>
      <dc:date>2016-01-21T22:11:35Z</dc:date>
    </item>
    <item>
      <title>Glad to hear you got it</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816077#M173193</link>
      <description>&lt;P&gt;Glad to hear you got it working and thanks for letting me know.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 22:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-site-to-site-interesting-traffic/m-p/2816077#M173193</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-01-21T22:13:31Z</dc:date>
    </item>
  </channel>
</rss>

