<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ah ok, I believe the issue is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834796#M177535</link>
    <description>&lt;P&gt;Ah ok, I believe the issue is that some of the management packets / keepalive packets are going through the VPN tunnel... so in hindsite, I do not think this is going to work after all.&lt;/P&gt;
&lt;P&gt;You would need to have a different IP to source packets from than the interface onwhich you are terminating the VPN&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Mon, 16 Nov 2015 18:15:01 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2015-11-16T18:15:01Z</dc:date>
    <item>
      <title>IPSEC Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834791#M177530</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;It might be stupid question but want to clarify, I am creating a ipsec tunnel between a voice router and cucm to secure from internal LAN users, but they both are in same premises and in same subnet,10.10.10.1 is for voice gateway and for cucm it is 10.10.10.2. Is this possible to build a ipsec tunnel within the subnet between the 2 devices.??&lt;/P&gt;
&lt;P&gt;I can understant that i can keep it in different subnet but it is possible within the same subnet.??&lt;/P&gt;
&lt;P&gt;Also i tried building the tunnel but when i execute the command show crypto ipsec sa i didnt saw any packet encrypted of voice signalling&amp;nbsp;but the isakmp tunnel was showing me active.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834791#M177530</guid>
      <dc:creator>jeniferdcosta1</dc:creator>
      <dc:date>2019-03-12T06:53:26Z</dc:date>
    </item>
    <item>
      <title>As long as you have IP</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834792#M177531</link>
      <description>&lt;P&gt;As long as you have IP connectivity between the devices you can build an IPsec VPN tunnel between them.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 15 Nov 2015 05:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834792#M177531</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-11-15T05:13:03Z</dc:date>
    </item>
    <item>
      <title>Dear Marius,</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834793#M177532</link>
      <description>&lt;P&gt;Dear Marius,&lt;/P&gt;
&lt;P&gt;attached is the snapshot for &amp;nbsp;configuration on CUCM.&lt;/P&gt;
&lt;P&gt;Also i tried building the tunnel but when i execute the command show crypto ipsec sa i didnt saw any packet encrypted of voice signalling&amp;nbsp;but the isakmp tunnel was showing me active.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;#sh run | b crypto&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;encr aes 256&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 3600&lt;BR /&gt;crypto isakmp key cisco address 10.10.4.2 no-xauth&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set IPSEC-SET esp-aes 256 esp-sha-hmac&lt;BR /&gt;!&lt;BR /&gt;crypto map MGCP-MAP 10 ipsec-isakmp&lt;BR /&gt;&amp;nbsp;set peer 10.10.4.2&lt;BR /&gt;&amp;nbsp;set transform-set IPSEC-SET&lt;BR /&gt;&amp;nbsp;set pfs group2&lt;BR /&gt;&amp;nbsp;match address 110&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;sh crypto ipsec sa&lt;/P&gt;
&lt;P&gt;interface: GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: MGCP-MAP, local addr 10.229.4.8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; protected vrf: (none)&lt;BR /&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (10.10.4.8/255.255.255.255/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.10.4.2/255.255.255.255/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp; current_peer 10.10.4.2 port 500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 0, #recv errors 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 10.229.4.8, remote crypto endpt.: 10.229.4.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0x0(0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PFS (Y/N): N, DH group: none&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound ah sas:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound pcp sas:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound ah sas:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound pcp sas:&lt;/P&gt;
&lt;P&gt;sh crypto isakmp sa&lt;BR /&gt;IPv4 Crypto ISAKMP SA&lt;BR /&gt;dst&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-id status&lt;BR /&gt;10.10.4.8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.4.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MM_NO_STATE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 ACTIVE (deleted)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Nov 2015 05:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834793#M177532</guid>
      <dc:creator>jeniferdcosta1</dc:creator>
      <dc:date>2015-11-15T05:26:16Z</dc:date>
    </item>
    <item>
      <title>I am no expert on CUCM but it</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834794#M177533</link>
      <description>&lt;P&gt;I am no expert on CUCM but it looks like you are missing the hash in your crypto isakmp policy&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;hash sha256&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Also you have it set to transport mode on the CUCM or transport on the router side. default on the router is tunneled mode.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;crypto ipsec transform-set IPSEC-SET esp-aes 256 esp-sha-hmac&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; mode transport&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Try adding that and see if the tunnel comes up.&lt;/P&gt;
&lt;P&gt;But to be perfectly honost, you should set this up on its own VLAN.&amp;nbsp; Doing this via a VPN on the same network is a bit messy and uneeded.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 15 Nov 2015 05:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834794#M177533</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-11-15T05:51:25Z</dc:date>
    </item>
    <item>
      <title>Dear thanks for the reply.</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834795#M177534</link>
      <description>&lt;P&gt;Dear thanks for the reply.&lt;/P&gt;
&lt;P&gt;now the status&amp;nbsp;i snot steady on the below&amp;nbsp;it wait for sometime and then again it goes to MM_NO_STATE&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;sh crypto isakmp sa&lt;BR /&gt;IPv4 Crypto ISAKMP SA&lt;BR /&gt;dst&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-id status&lt;BR /&gt;10.10.4.8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.4.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; QM_IDLE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1016 ACTIVE&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;i dont get any option for hash256 except only the below&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;VG_01(config)#crypto isakmp policy 10&lt;/P&gt;
&lt;P&gt;_VG_01(config-isakmp)#hash sha ?&lt;BR /&gt;&amp;nbsp; &amp;lt;cr&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;001332: Nov 13 08:10:48.287: ISAKMP:(1014):beginning Quick Mode exchange, M-ID of 2237452007&lt;BR /&gt;001333: Nov 13 08:10:48.287: ISAKMP:(1014):QM Initiator gets spi&lt;BR /&gt;001334: Nov 13 08:10:48.287: ISAKMP:(1014): sending packet to 10.10.4.2 my_port 500 peer_port 500 (I) QM_IDLE&lt;BR /&gt;001335: Nov 13 08:10:48.287: ISAKMP:(1014):Sending an IKE IPv4 Packet.&lt;BR /&gt;001336: Nov 13 08:10:48.287: ISAKMP:(1014):Node 2237452007, Input = IKE_MESG_INTERNAL, IKE_INIT_QM&lt;BR /&gt;001337: Nov 13 08:10:48.287: ISAKMP:(1014):Old State = IKE_QM_READY&amp;nbsp; New State = IKE_QM_I_QM1&lt;BR /&gt;001338: Nov 13 08:10:48.287: ISAKMP:(1014):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;BR /&gt;001339: Nov 13 08:10:48.287: ISAKMP:(1014):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;
&lt;P&gt;001340: Nov 13 08:10:48.287: ISAKMP (1014): received packet from 10.10.4.2 dport 500 sport 500 Global (I) QM_IDLE&lt;BR /&gt;001341: Nov 13 08:10:48.287: ISAKMP: set new node -1502355529 to QM_IDLE&lt;BR /&gt;001342: Nov 13 08:10:48.287: ISAKMP:(1014): processing HASH payload. message ID = 2792611767&lt;BR /&gt;001343: Nov 13 08:10:48.287: ISAKMP:(1014): processing NOTIFY INVALID_ID_INFO protocol 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi 0, message ID = 2792611767, sa = 0x31B85428&lt;BR /&gt;001344: Nov 13 08:10:48.287: ISAKMP:(1014):peer does not do paranoid keepalives.&lt;/P&gt;
&lt;P&gt;001345: Nov 13 08:10:48.287: ISAKMP:(1014):deleting SA reason "Recevied fatal informational" state (I) QM_IDLE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (peer 10.10.4.2)&lt;BR /&gt;001346: Nov 13 08:10:48.287: ISAKMP:(1014):deleting node -1502355529 error FALSE reason "Informational (in) state 1"&lt;BR /&gt;001347: Nov 13 08:10:48.287: ISAKMP:(1014):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY&lt;BR /&gt;001348: Nov 13 08:10:48.287: ISAKMP:(1014):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_P1_COMPLETE&lt;/P&gt;
&lt;P&gt;001349: Nov 13 08:10:48.287: ISAKMP: set new node 1147210847 to QM_IDLE&lt;BR /&gt;001350: Nov 13 08:10:48.291: ISAKMP:(1014): sending packet to 10.10.4.2 my_port 500 peer_port 500 (I) QM_IDLE&lt;BR /&gt;001351: Nov 13 08:10:48.291: ISAKMP:(1014):Sending an IKE IPv4 Packet.&lt;BR /&gt;001352: Nov 13 08:10:48.291: ISAKMP:(1014):purging node 1147210847&lt;BR /&gt;001353: Nov 13 08:10:48.291: ISAKMP:(1014):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL&lt;BR /&gt;001354: Nov 13 08:10:48.291: ISAKMP:(1014):Old State = IKE_P1_COMPLETE&amp;nbsp; New State = IKE_DEST_SA&lt;/P&gt;
&lt;P&gt;001355: Nov 13 08:10:48.291: ISAKMP:(1014):deleting SA reason "Recevied fatal informational" state (I) QM_IDLE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (peer 10.10.4.2)&lt;BR /&gt;001356: Nov 13 08:10:48.291: ISAKMP: Unlocking peer struct 0x3230D2F8 for isadb_mark_sa_deleted(), count 0&lt;BR /&gt;001357: Nov 13 08:10:48.291: ISAKMP: Deleting peer node by peer_reap for 10.10.4.2: 3230D2F8&lt;BR /&gt;001358: Nov 13 08:10:48.291: ISAKMP:(1014):deleting node -2057515289 error FALSE reason "IKE deleted"&lt;BR /&gt;001359: Nov 13 08:10:48.291: ISAKMP:(1014):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH&lt;BR /&gt;001360: Nov 13 08:10:48.291: ISAKMP:(1014):Old State = IKE_DEST_SA&amp;nbsp; New State = IKE_DEST_SA&lt;/P&gt;
&lt;P&gt;001361: Nov 13 08:10:48.291: ISAKMP (1014): received packet from 10.10.4.2 dport 500 sport 500 Global (I) MM_NO_STATE&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Nov 2015 18:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834795#M177534</guid>
      <dc:creator>jeniferdcosta1</dc:creator>
      <dc:date>2015-11-15T18:14:46Z</dc:date>
    </item>
    <item>
      <title>Ah ok, I believe the issue is</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834796#M177535</link>
      <description>&lt;P&gt;Ah ok, I believe the issue is that some of the management packets / keepalive packets are going through the VPN tunnel... so in hindsite, I do not think this is going to work after all.&lt;/P&gt;
&lt;P&gt;You would need to have a different IP to source packets from than the interface onwhich you are terminating the VPN&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 16 Nov 2015 18:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel/m-p/2834796#M177535</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-11-16T18:15:01Z</dc:date>
    </item>
  </channel>
</rss>

