<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: L2L Ipsec issue: 0 Decrypt pkts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4010775#M23274</link>
    <description>&lt;P&gt;On my ASDM it shows #pkts encrypt: 5 and #pkts decrypt: 0 , Byte Tx: 0 and Bytes Rx: 180&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;seem ASDM ASA running version 7 is encrypt the traffic but does not decry the traffic. double check the routing/staic route are in place accordingly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If an ASA is getting encaps but not decaps, this means it is encrypting the data and sending it but has not received anything to decrypt in return. Verify the other end has a route outside for the interesting traffic. Check that both VPN ACL’s are not mismatched. Double check NAT’s to make sure the traffic is not NAT’ing correctly.&lt;BR /&gt;Is what you are trying to ping even responding back? Often what you’re sending traffic to is not able to accept or is not responding to this traffic. I prefer to put a packet capture on the remote end firewall to see if the traffic is coming back into that firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;instead of icmp have to try any other protocol.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on ASA give it a command&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ASA(config)# fixup protocol icmp&lt;BR /&gt;ASA(config)# fix protocol icmp error&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;also use this command and share the output&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp x.x.x.x x.x.x.x 80 det&lt;/P&gt;</description>
    <pubDate>Mon, 13 Jan 2020 21:39:56 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2020-01-13T21:39:56Z</dc:date>
    <item>
      <title>L2L Ipsec issue: 0 Decrypt pkts</title>
      <link>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4008290#M23271</link>
      <description>&lt;P&gt;Scenario is like this:&lt;BR /&gt;I have site A and Site B. I am trying to get connectivity between Site A and site B by configuring IPSEC site-to-site tunnel. On site-A I am using cisco asa 5510 ver 7.0 and on site-B cisco asa 5500 ver 9.2. In short one FW is running old version while the second one is running newer version. 2 hosts(192.168.10.41 and 192.168.10.42 from site-A should be able to connect to host(10.10.10.20) of site-B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;: From site-A, on my ASDM when I ping from site A to site B or vice-versa the &lt;STRONG&gt;tunnel goes up but I don't see any ping reply&lt;/STRONG&gt;. Neither it could ping from site-A to site-B nor from site-B to site-A. But the tunnels between the site-A and B shows up without any errors.&lt;/P&gt;&lt;P&gt;Notes to be taken while you suggest any solutions:&lt;BR /&gt;1. I have another site-to-site IPSEC vpn configured on the same firewall and it works fine. I am able to ping the remote host. It is just that I have excluded from the below posted configuration.&lt;BR /&gt;2. Tried rebooting the firewall, clearing xlate, ipsec sa, isakmp sa but no luck.&lt;BR /&gt;3. Double checked NAT exempt and ACL on both firewalls&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site A:&lt;BR /&gt;Public IP - 1.2.3.4&lt;BR /&gt;Private - 192.168.10.0/24&lt;/P&gt;&lt;P&gt;Site B:&lt;BR /&gt;Public IP - X.X.X.X&lt;BR /&gt;Private - 10.10.10.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site-A Configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.0(8)&lt;BR /&gt;!&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 1.2.3.4 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;!&lt;BR /&gt;access-list OUTSIDE_IN extended permit icmp any interface ISP echo-reply&lt;BR /&gt;access-list INSIDE_nat0_outbound extended permit ip host 192.168.10.41 host 10.10.10.20&lt;BR /&gt;access-list INSIDE_nat0_outbound extended permit ip host 192.168.10.42 host 10.10.10.20&lt;BR /&gt;access-list OUTSIDE_cryptomap_20 extended permit ip host 192.168.10.41 host 10.10.10.20&lt;BR /&gt;access-list OUTSIDE_cryptomap_20 extended permit ip host 192.168.10.42 host 10.10.10.20&lt;BR /&gt;!&lt;BR /&gt;icmp deny any OUTSIDE&lt;BR /&gt;!&lt;BR /&gt;global (OUTSIDE) 100 interface&lt;BR /&gt;nat (INSIDE) 0 access-list INSIDE_nat0_outbound&lt;BR /&gt;nat (INSIDE) 100 192.168.10.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;BR /&gt;!&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 1.2.3.4 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;BR /&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map OUTSIDE_map 20 match address OUTSIDE_cryptomap_20&lt;BR /&gt;crypto map OUTSIDE_map 20 set peer X.X.X.X&lt;BR /&gt;crypto map OUTSIDE_map 20 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map OUTSIDE_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map OUTSIDE_map 20 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map OUTSIDE_map 20 set nat-t-disable&lt;BR /&gt;!&lt;BR /&gt;isakmp identity address&lt;BR /&gt;isakmp enable OUTSIDE&lt;BR /&gt;isakmp policy 20 authentication pre-share&lt;BR /&gt;isakmp policy 20 encryption aes-256&lt;BR /&gt;isakmp policy 20 hash sha&lt;BR /&gt;isakmp policy 20 group 5&lt;BR /&gt;isakmp policy 20 lifetime 86400&lt;BR /&gt;!&lt;BR /&gt;tunnel-group X.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group X.X.X.X ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my ASDM it shows #pkts encrypt: 5 and #pkts decrypt: 0 , Byte Tx: 0 and Bytes Rx: 180&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help, I am new to the Cisco Firewall.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 17:56:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4008290#M23271</guid>
      <dc:creator>patelparth3</dc:creator>
      <dc:date>2020-01-08T17:56:23Z</dc:date>
    </item>
    <item>
      <title>Re: L2L Ipsec issue: 0 Decrypt pkts</title>
      <link>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4008360#M23272</link>
      <description>&lt;P&gt;Would you be able to post the Site-B configuration also as it is quite difficult to troubleshoot a VPN connection with only one side of the configuration?&lt;/P&gt;
&lt;P&gt;When the tunnel is up, could you please provide the output of &lt;STRONG&gt;show crypto isakmp sa&lt;/STRONG&gt;&amp;nbsp;(for older ASA version) and&amp;nbsp;&lt;STRONG&gt;show crypto ikev1 sa &lt;/STRONG&gt;(for newer ASA version)&amp;nbsp;for both ASAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, run a debug and teardown the tunnel and reestablish the tunnel.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;debug crypto condition peer x.x.x.x&lt;/STRONG&gt;&amp;nbsp; (replace x.x.x.x with the peer IP)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;debug crypto ikev1 sa 127&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;debug crypto ipsec 127&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This should give you a slightly better idea of where the issue is located.&amp;nbsp; If phase one is being established you should see a message saying something like &lt;STRONG&gt;Phase1 complete&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A message saying something like &lt;STRONG&gt;QM FSM Error&lt;/STRONG&gt; indicates an issue with your IPsec / phase 2 configuration&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 19:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4008360#M23272</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-01-08T19:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: L2L Ipsec issue: 0 Decrypt pkts</title>
      <link>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4010757#M23273</link>
      <description>&lt;P&gt;Thank you Marius for your reply.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. &lt;STRONG&gt;Would you be able to post the Site-B configuration also as it is quite difficult to troubleshoot a VPN connection with only one side of the configuration?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I won't be able to post Site-B configuration as this the B2B(Business to business) VPN. So, I dont have access to Site-B.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2.&lt;STRONG&gt;debug crypto condition peer x.x.x.x&lt;/STRONG&gt;&amp;nbsp; (replace x.x.x.x with the peer IP)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can not run this command as I am using the old Cisco ASA.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3.&amp;nbsp;&lt;STRONG&gt;debug crypto iskamp sa&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Active SA: 1&lt;BR /&gt;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;1 IKE Peer: X.X.X.X&lt;BR /&gt;Type : L2L Role : initiator&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4.&amp;nbsp;&lt;STRONG&gt;debug crypto iskamp sa 127&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Jan 13 15:20:21 [IKEv1]: Group = X.X.X.X, IP = X.X.X.X, PHASE 1 COMPLETED&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5.&amp;nbsp;&lt;STRONG&gt;debug crypto ipsec 127&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;IPSEC: New embryonic SA created @ 0x03AF0230,&lt;BR /&gt;SCB: 0x03B1F9B0,&lt;BR /&gt;Direction: inbound&lt;BR /&gt;SPI : 0xDDC49DD6&lt;BR /&gt;Session ID: 0x0000001E&lt;BR /&gt;VPIF num : 0x00000001&lt;BR /&gt;Tunnel type: l2l&lt;BR /&gt;Protocol : esp&lt;BR /&gt;Lifetime : 240 seconds&lt;BR /&gt;IPSEC: New embryonic SA created @ 0x03AE26F0,&lt;BR /&gt;SCB: 0x03B03D08,&lt;BR /&gt;Direction: outbound&lt;BR /&gt;SPI : 0xB31AF406&lt;BR /&gt;Session ID: 0x0000001E&lt;BR /&gt;VPIF num : 0x00000001&lt;BR /&gt;Tunnel type: l2l&lt;BR /&gt;Protocol : esp&lt;BR /&gt;Lifetime : 240 seconds&lt;BR /&gt;IPSEC: Completed host OBSA update, SPI 0xB31AF406&lt;BR /&gt;IPSEC: Creating outbound VPN context, SPI 0xB31AF406&lt;BR /&gt;Flags: 0x00000005&lt;BR /&gt;SA : 0x03AE26F0&lt;BR /&gt;SPI : 0xB31AF406&lt;BR /&gt;MTU : 1500 bytes&lt;BR /&gt;VCID : 0x00000000&lt;BR /&gt;Peer : 0x00000000&lt;BR /&gt;SCB : 0x03B03D08&lt;BR /&gt;Channel: 0x01135E58&lt;BR /&gt;IPSEC: Completed outbound VPN context, SPI 0xB31AF406&lt;BR /&gt;VPN handle: 0x03A982A0&lt;BR /&gt;IPSEC: New outbound encrypt rule, SPI 0xB31AF406&lt;BR /&gt;Src addr: 192.168.10.42&lt;BR /&gt;Src mask: 255.255.255.255&lt;BR /&gt;Dst addr: 10.10.10.20&lt;BR /&gt;Dst mask: 255.255.255.255&lt;BR /&gt;Src ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Dst ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Protocol: 0&lt;BR /&gt;Use protocol: false&lt;BR /&gt;SPI: 0x00000000&lt;BR /&gt;Use SPI: false&lt;BR /&gt;IPSEC: Completed outbound encrypt rule, SPI 0xB31AF406&lt;BR /&gt;Rule ID: 0x03A83638&lt;BR /&gt;IPSEC: New outbound permit rule, SPI 0xB31AF406&lt;BR /&gt;Src addr: 1.2.3.4&lt;BR /&gt;Src mask: 255.255.255.255&lt;BR /&gt;Dst addr: X.X.X.X&lt;BR /&gt;Dst mask: 255.255.255.255&lt;BR /&gt;Src ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Dst ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Protocol: 50&lt;BR /&gt;Use protocol: true&lt;BR /&gt;SPI: 0xB31AF406&lt;BR /&gt;Use SPI: true&lt;BR /&gt;IPSEC: Completed outbound permit rule, SPI 0xB31AF406&lt;BR /&gt;Rule ID: 0x0196A9A0&lt;BR /&gt;IPSEC: Completed host IBSA update, SPI 0xDDC49DD6&lt;BR /&gt;IPSEC: Creating inbound VPN context, SPI 0xDDC49DD6&lt;BR /&gt;Flags: 0x00000006&lt;BR /&gt;SA : 0x03AF0230&lt;BR /&gt;SPI : 0xDDC49DD6&lt;BR /&gt;MTU : 0 bytes&lt;BR /&gt;VCID : 0x00000000&lt;BR /&gt;Peer : 0x03A982A0&lt;BR /&gt;SCB : 0x03B1F9B0&lt;BR /&gt;Channel: 0x01135E58&lt;BR /&gt;IPSEC: Completed inbound VPN context, SPI 0xDDC49DD6&lt;BR /&gt;VPN handle: 0x03AE0878&lt;BR /&gt;IPSEC: Updating outbound VPN context 0x03A982A0, SPI 0xB31AF406&lt;BR /&gt;Flags: 0x00000005&lt;BR /&gt;SA : 0x03AE26F0&lt;BR /&gt;SPI : 0xB31AF406&lt;BR /&gt;MTU : 1500 bytes&lt;BR /&gt;VCID : 0x00000000&lt;BR /&gt;Peer : 0x03AE0878&lt;BR /&gt;SCB : 0x03B03D08&lt;BR /&gt;Channel: 0x01135E58&lt;BR /&gt;IPSEC: Completed outbound VPN context, SPI 0xB31AF406&lt;BR /&gt;VPN handle: 0x03A982A0&lt;BR /&gt;IPSEC: Completed outbound inner rule, SPI 0xB31AF406&lt;BR /&gt;Rule ID: 0x03A83638&lt;BR /&gt;IPSEC: Completed outbound outer SPD rule, SPI 0xB31AF406&lt;BR /&gt;Rule ID: 0x0196A9A0&lt;BR /&gt;IPSEC: New inbound tunnel flow rule, SPI 0xDDC49DD6&lt;BR /&gt;Src addr: 10.10.10.20&lt;BR /&gt;Src mask: 255.255.255.255&lt;BR /&gt;Dst addr: 192.168.10.42&lt;BR /&gt;Dst mask: 255.255.255.255&lt;BR /&gt;Src ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Dst ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Protocol: 0&lt;BR /&gt;Use protocol: false&lt;BR /&gt;SPI: 0x00000000&lt;BR /&gt;Use SPI: false&lt;BR /&gt;IPSEC: Completed inbound tunnel flow rule, SPI 0xDDC49DD6&lt;BR /&gt;Rule ID: 0x03B50C78&lt;BR /&gt;IPSEC: New inbound decrypt rule, SPI 0xDDC49DD6&lt;BR /&gt;Src addr: X.X.X.X&lt;BR /&gt;Src mask: 255.255.255.255&lt;BR /&gt;Dst addr: 1.2.3.4&lt;BR /&gt;Dst mask: 255.255.255.255&lt;BR /&gt;Src ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Dst ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Protocol: 50&lt;BR /&gt;Use protocol: true&lt;BR /&gt;SPI: 0xDDC49DD6&lt;BR /&gt;Use SPI: true&lt;BR /&gt;IPSEC: Completed inbound decrypt rule, SPI 0xDDC49DD6&lt;BR /&gt;Rule ID: 0x02E35FF8&lt;BR /&gt;IPSEC: New inbound permit rule, SPI 0xDDC49DD6&lt;BR /&gt;Src addr: X.X.X.X&lt;BR /&gt;Src mask: 255.255.255.255&lt;BR /&gt;Dst addr: 1.2.3.4&lt;BR /&gt;Dst mask: 255.255.255.255&lt;BR /&gt;Src ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Dst ports&lt;BR /&gt;Upper: 0&lt;BR /&gt;Lower: 0&lt;BR /&gt;Op : ignore&lt;BR /&gt;Protocol: 50&lt;BR /&gt;Use protocol: true&lt;BR /&gt;SPI: 0xDDC49DD6&lt;BR /&gt;Use SPI: true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6.&amp;nbsp;&lt;STRONG&gt;A message saying something like&amp;nbsp;&lt;U&gt;QM FSM Error&lt;/U&gt;&amp;nbsp;indicates an issue with your IPsec / phase 2 configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I checked ASDM logs and could not find this QM FSM error.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 20:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4010757#M23273</guid>
      <dc:creator>patelparth3</dc:creator>
      <dc:date>2020-01-13T20:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: L2L Ipsec issue: 0 Decrypt pkts</title>
      <link>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4010775#M23274</link>
      <description>&lt;P&gt;On my ASDM it shows #pkts encrypt: 5 and #pkts decrypt: 0 , Byte Tx: 0 and Bytes Rx: 180&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;seem ASDM ASA running version 7 is encrypt the traffic but does not decry the traffic. double check the routing/staic route are in place accordingly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If an ASA is getting encaps but not decaps, this means it is encrypting the data and sending it but has not received anything to decrypt in return. Verify the other end has a route outside for the interesting traffic. Check that both VPN ACL’s are not mismatched. Double check NAT’s to make sure the traffic is not NAT’ing correctly.&lt;BR /&gt;Is what you are trying to ping even responding back? Often what you’re sending traffic to is not able to accept or is not responding to this traffic. I prefer to put a packet capture on the remote end firewall to see if the traffic is coming back into that firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;instead of icmp have to try any other protocol.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on ASA give it a command&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ASA(config)# fixup protocol icmp&lt;BR /&gt;ASA(config)# fix protocol icmp error&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;also use this command and share the output&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp x.x.x.x x.x.x.x 80 det&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 21:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4010775#M23274</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-13T21:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: L2L Ipsec issue: 0 Decrypt pkts</title>
      <link>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4010963#M23275</link>
      <description>&lt;P&gt;As Sheraz has mentioned, verify the remote side configuration.&amp;nbsp; Have the network team at site B check that routing to Site A is in place and, if there are any firewalls between the ASAs and the subnets in the encryption domain, make sure that traffic is allowed through these firewalls.&amp;nbsp; Also, If you are using NAT on the ASAs, make sure that you have a twice-NAT rule / NAT-exempt rule for the interesting traffic as well as check to make sure that this traffic flow is not hitting another NAT rule.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 06:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-ipsec-issue-0-decrypt-pkts/m-p/4010963#M23275</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-01-14T06:02:17Z</dc:date>
    </item>
  </channel>
</rss>

