<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832423#M174129</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is this ASA serving as VPN endpoint as well? If not I think you can disable the isakmp process on the interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;no crypto isakmp enable outside or&amp;nbsp;&lt;SPAN&gt;no crypto ikev1 enable outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
    <pubDate>Fri, 11 Dec 2015 00:43:34 GMT</pubDate>
    <dc:creator>rvarelac</dc:creator>
    <dc:date>2015-12-11T00:43:34Z</dc:date>
    <item>
      <title>IPSEC Tunnel Passthrough with ASA 5540</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832420#M174125</link>
      <description>&lt;P&gt;I'm looking for a configuration option on my ASA 5540 that will allow an IPSEC tunnel to pass thru the ASA from an external IP address to an internal router. &amp;nbsp;The ASA also provides AnyConnect VPN access for mobile and external hosts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to bring in Verizon Private Network IPSEC tunnel to an internal router, but I believe the ASA is trying to terminate that session rather than allow it through to the internal router.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there a config command I can reference for enabling this?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;External IP address &amp;nbsp; -----&amp;gt; &amp;nbsp; ASA &amp;nbsp;--------&amp;gt; internal router&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;---IPSEC Tunnel----&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance for any help with this!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832420#M174125</guid>
      <dc:creator>lacasamiller</dc:creator>
      <dc:date>2019-03-12T07:01:28Z</dc:date>
    </item>
    <item>
      <title>Hi, </title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832421#M174126</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The ports you need to allow the VPN accross the ASA are:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;UDP 500&lt;/P&gt;
&lt;P&gt;UDP 4500&lt;/P&gt;
&lt;P&gt;protocol 50 ESP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;access-list inside udp permit host 192.168.0.1 any eq 500&lt;/P&gt;
&lt;P&gt;access-list inside udp permit host 192.168.0.1 any eq 4500&lt;/P&gt;
&lt;P&gt;access-group inside interface inside in interface inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And is recommended to enable the inspection for this traffic as well.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;class inspection_default&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;inspect ipsec-pass-thru&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps,&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2015 16:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832421#M174126</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2015-12-10T16:42:44Z</dc:date>
    </item>
    <item>
      <title>Randy, thanks for this!</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832422#M174127</link>
      <description>&lt;P&gt;Randy, thanks for this!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have added this config but it seems the ASA is still trying to process the GRE tunnel. &amp;nbsp;The log shows:&lt;/P&gt;
&lt;P&gt;SYSLOG ID 713903: &amp;nbsp;Group = 66.174.x.x, IP= 66.174.x.x, Can't find a valid tunnel group, aborting...!&lt;BR /&gt;&lt;BR /&gt;SYSLOG ID 713903: &amp;nbsp;IP = 66.174.x.x, Header invalid, missing SA payload! (next payload = 4)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If I can get some way to force IP traffic from 66.174.x.x to bypass the ASA...&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2015 19:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832422#M174127</guid>
      <dc:creator>lacasamiller</dc:creator>
      <dc:date>2015-12-10T19:43:28Z</dc:date>
    </item>
    <item>
      <title>Hi, </title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832423#M174129</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is this ASA serving as VPN endpoint as well? If not I think you can disable the isakmp process on the interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;no crypto isakmp enable outside or&amp;nbsp;&lt;SPAN&gt;no crypto ikev1 enable outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2015 00:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-passthrough-with-asa-5540/m-p/2832423#M174129</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2015-12-11T00:43:34Z</dc:date>
    </item>
  </channel>
</rss>

