<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic unable to establish IPSec site to site  vpn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869264#M28203</link>
    <description>&lt;P&gt;Hello guys&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I styuding for the ccna securiy and I tried to establish a site to site vpn between an ASA 5506 and a 2911. I followed the configuration guide from the documentation and from INE but phase 2 of is not coming up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the logs I got from ASA and hope you can help me out with this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%ASA-5-713119: Group = 20.0.0.1, IP = 20.0.0.1, PHASE 1 COMPLETED&lt;BR /&gt;%ASA-7-713121: IP = 20.0.0.1, Keep-alive type for this connection: DPD&lt;BR /&gt;%ASA-7-715080: Group = 20.0.0.1, IP = 20.0.0.1, Starting P1 rekey timer: 64800 seconds.&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Add to IKEv1 Tunnel Table succeeded for SA with logical ID 32768&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Add to IKEv1 MIB Table succeeded for SA with logical ID 32768&lt;BR /&gt;%ASA-7-713906: IKE Receiver: Packet received on 20.0.0.254:500 from 20.0.0.1:500&lt;BR /&gt;%ASA-7-714003: IP = 20.0.0.1, IKE Responder starting QM: msg id = 46012aa5&lt;BR /&gt;%ASA-7-713236: IP = 20.0.0.1, IKE_DECODE RECEIVED Message (msgid=46012aa5) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 168&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing SA payload&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing nonce payload&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing ID payload&lt;BR /&gt;%ASA-7-714011: Group = 20.0.0.1, IP = 20.0.0.1, ID_IPV4_ADDR ID received&lt;BR /&gt;2.2.2.2&lt;BR /&gt;%ASA-7-713025: Group = 20.0.0.1, IP = 20.0.0.1, Received remote Proxy Host data in ID Payload: Address 2.2.2.2, Protocol 0, Port 0&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing ID payload&lt;BR /&gt;%ASA-7-714011: Group = 20.0.0.1, IP = 20.0.0.1, ID_IPV4_ADDR_SUBNET ID received--10.0.0.0--255.255.255.0&lt;BR /&gt;%ASA-7-713034: Group = 20.0.0.1, IP = 20.0.0.1, Received local IP Proxy Subnet data in ID Payload: Address 10.0.0.0, Mask 255.255.255.0, Protocol 0, Port 0&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, QM IsRekeyed old sa not found by addr&lt;BR /&gt;%ASA-7-713221: Group = 20.0.0.1, IP = 20.0.0.1, Static Crypto Map check, checking map = outside_map0, seq = 1...&lt;BR /&gt;%ASA-7-713223: Group = 20.0.0.1, IP = 20.0.0.1, Static Crypto Map check, map = outside_map0, seq = 1, no ACL configured&lt;BR /&gt;%ASA-3-713061: Group = 20.0.0.1, IP = 20.0.0.1, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 2.2.2.2/255.255.255.255/0/0 local proxy 10.0.0.0/255.255.255.0/0/0 on interface outside&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, sending notify message&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Sending p2 'Invalid ID info' notify message with SPI zero.&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing blank hash payload&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, constructing ipsec notify payload for msg id 46012aa5&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 20.0.0.1, IKE_DECODE SENDING Message (msgid=7f86d5ba) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 212&lt;BR /&gt;%ASA-3-713902: Group = 20.0.0.1, IP = 20.0.0.1, QM FSM error (P2 struct &amp;amp;0x00002aaac0cba570, mess id 0x46012aa5)!&lt;BR /&gt;%ASA-7-715065: Group = 20.0.0.1, IP = 20.0.0.1, IKE QM Responder FSM error history (struct &amp;amp;0x00002aaac0cba570) &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;: QM_DONE, EV_ERROR--&amp;gt;QM_BLD_MSG2, EV_NEGO_SA--&amp;gt;QM_BLD_MSG2, EV_IS_REKEY--&amp;gt;QM_BLD_MSG2, EV_CONFIRM_SA--&amp;gt;QM_BLD_MSG2, EV_PROC_MSG--&amp;gt;QM_BLD_MSG2, EV_HASH_OK--&amp;gt;QM_BLD_MSG2, NullEvent--&amp;gt;QM_BLD_MSG2, EV_COMP_HASH&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, sending delete/delete with reason message&lt;BR /&gt;%ASA-3-713902: Group = 20.0.0.1, IP = 20.0.0.1, Removing peer from correlator table failed, no match!&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, IKE SA MM:cf91e172 rcv'd Terminate: state MM_ACTIVE flags 0x00018042, refcnt 1, tuncnt 0&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Remove from IKEv1 Tunnel Table succeeded for SA with logicalId 32768&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Remove from IKEv1 MIB Table succeeded for SA with logical ID 32768&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, IKE SA MM:cf91e172 terminating: flags 0x01018002, refcnt 0, tuncnt 0&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, sending delete/delete with reason message&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing IKE delete payload&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 20.0.0.1, IKE_DECODE SENDING Message (msgid=cb126761) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;%ASA-5-713259: Group = 20.0.0.1, IP = 20.0.0.1, Session is being torn down. Reason: crypto map policy not found&lt;BR /&gt;%ASA-4-113019: Group = 20.0.0.1, Username = 20.0.0.1, IP = 20.0.0.1, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: crypto map policy not found&lt;BR /&gt;%ASA-7-713906: Ignoring msg to mark SA with dsID 32768 dead because SA deleted&lt;BR /&gt;%ASA-7-713906: IKE Receiver: Packet received on 20.0.0.254:500 from 20.0.0.1:500&lt;BR /&gt;%ASA-5-713904: IP = 20.0.0.1, Received encrypted packet with no matching SA, dropping&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 8 for outside:20.0.0.1/500 to identity:20.0.0.254/500 duration 0:03:40 bytes 6720&lt;BR /&gt;%ASA-7-609002: Teardown local-host outside:20.0.0.1 duration 0:03:40&lt;BR /&gt;%ASA-7-609002: Teardown local-host identity:20.0.0.254 duration 0:03:40&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jun 2019 03:09:51 GMT</pubDate>
    <dc:creator>jomoca1990</dc:creator>
    <dc:date>2019-06-07T03:09:51Z</dc:date>
    <item>
      <title>unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869264#M28203</link>
      <description>&lt;P&gt;Hello guys&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I styuding for the ccna securiy and I tried to establish a site to site vpn between an ASA 5506 and a 2911. I followed the configuration guide from the documentation and from INE but phase 2 of is not coming up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the logs I got from ASA and hope you can help me out with this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%ASA-5-713119: Group = 20.0.0.1, IP = 20.0.0.1, PHASE 1 COMPLETED&lt;BR /&gt;%ASA-7-713121: IP = 20.0.0.1, Keep-alive type for this connection: DPD&lt;BR /&gt;%ASA-7-715080: Group = 20.0.0.1, IP = 20.0.0.1, Starting P1 rekey timer: 64800 seconds.&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Add to IKEv1 Tunnel Table succeeded for SA with logical ID 32768&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Add to IKEv1 MIB Table succeeded for SA with logical ID 32768&lt;BR /&gt;%ASA-7-713906: IKE Receiver: Packet received on 20.0.0.254:500 from 20.0.0.1:500&lt;BR /&gt;%ASA-7-714003: IP = 20.0.0.1, IKE Responder starting QM: msg id = 46012aa5&lt;BR /&gt;%ASA-7-713236: IP = 20.0.0.1, IKE_DECODE RECEIVED Message (msgid=46012aa5) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 168&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing hash payload&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing SA payload&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing nonce payload&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing ID payload&lt;BR /&gt;%ASA-7-714011: Group = 20.0.0.1, IP = 20.0.0.1, ID_IPV4_ADDR ID received&lt;BR /&gt;2.2.2.2&lt;BR /&gt;%ASA-7-713025: Group = 20.0.0.1, IP = 20.0.0.1, Received remote Proxy Host data in ID Payload: Address 2.2.2.2, Protocol 0, Port 0&lt;BR /&gt;%ASA-7-715047: Group = 20.0.0.1, IP = 20.0.0.1, processing ID payload&lt;BR /&gt;%ASA-7-714011: Group = 20.0.0.1, IP = 20.0.0.1, ID_IPV4_ADDR_SUBNET ID received--10.0.0.0--255.255.255.0&lt;BR /&gt;%ASA-7-713034: Group = 20.0.0.1, IP = 20.0.0.1, Received local IP Proxy Subnet data in ID Payload: Address 10.0.0.0, Mask 255.255.255.0, Protocol 0, Port 0&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, QM IsRekeyed old sa not found by addr&lt;BR /&gt;%ASA-7-713221: Group = 20.0.0.1, IP = 20.0.0.1, Static Crypto Map check, checking map = outside_map0, seq = 1...&lt;BR /&gt;%ASA-7-713223: Group = 20.0.0.1, IP = 20.0.0.1, Static Crypto Map check, map = outside_map0, seq = 1, no ACL configured&lt;BR /&gt;%ASA-3-713061: Group = 20.0.0.1, IP = 20.0.0.1, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 2.2.2.2/255.255.255.255/0/0 local proxy 10.0.0.0/255.255.255.0/0/0 on interface outside&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, sending notify message&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Sending p2 'Invalid ID info' notify message with SPI zero.&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing blank hash payload&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, constructing ipsec notify payload for msg id 46012aa5&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 20.0.0.1, IKE_DECODE SENDING Message (msgid=7f86d5ba) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 212&lt;BR /&gt;%ASA-3-713902: Group = 20.0.0.1, IP = 20.0.0.1, QM FSM error (P2 struct &amp;amp;0x00002aaac0cba570, mess id 0x46012aa5)!&lt;BR /&gt;%ASA-7-715065: Group = 20.0.0.1, IP = 20.0.0.1, IKE QM Responder FSM error history (struct &amp;amp;0x00002aaac0cba570) &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;: QM_DONE, EV_ERROR--&amp;gt;QM_BLD_MSG2, EV_NEGO_SA--&amp;gt;QM_BLD_MSG2, EV_IS_REKEY--&amp;gt;QM_BLD_MSG2, EV_CONFIRM_SA--&amp;gt;QM_BLD_MSG2, EV_PROC_MSG--&amp;gt;QM_BLD_MSG2, EV_HASH_OK--&amp;gt;QM_BLD_MSG2, NullEvent--&amp;gt;QM_BLD_MSG2, EV_COMP_HASH&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, sending delete/delete with reason message&lt;BR /&gt;%ASA-3-713902: Group = 20.0.0.1, IP = 20.0.0.1, Removing peer from correlator table failed, no match!&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, IKE SA MM:cf91e172 rcv'd Terminate: state MM_ACTIVE flags 0x00018042, refcnt 1, tuncnt 0&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Remove from IKEv1 Tunnel Table succeeded for SA with logicalId 32768&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, Remove from IKEv1 MIB Table succeeded for SA with logical ID 32768&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, IKE SA MM:cf91e172 terminating: flags 0x01018002, refcnt 0, tuncnt 0&lt;BR /&gt;%ASA-7-713906: Group = 20.0.0.1, IP = 20.0.0.1, sending delete/delete with reason message&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing blank hash payload&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing IKE delete payload&lt;BR /&gt;%ASA-7-715046: Group = 20.0.0.1, IP = 20.0.0.1, constructing qm hash payload&lt;BR /&gt;%ASA-7-713236: IP = 20.0.0.1, IKE_DECODE SENDING Message (msgid=cb126761) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;%ASA-5-713259: Group = 20.0.0.1, IP = 20.0.0.1, Session is being torn down. Reason: crypto map policy not found&lt;BR /&gt;%ASA-4-113019: Group = 20.0.0.1, Username = 20.0.0.1, IP = 20.0.0.1, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: crypto map policy not found&lt;BR /&gt;%ASA-7-713906: Ignoring msg to mark SA with dsID 32768 dead because SA deleted&lt;BR /&gt;%ASA-7-713906: IKE Receiver: Packet received on 20.0.0.254:500 from 20.0.0.1:500&lt;BR /&gt;%ASA-5-713904: IP = 20.0.0.1, Received encrypted packet with no matching SA, dropping&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 8 for outside:20.0.0.1/500 to identity:20.0.0.254/500 duration 0:03:40 bytes 6720&lt;BR /&gt;%ASA-7-609002: Teardown local-host outside:20.0.0.1 duration 0:03:40&lt;BR /&gt;%ASA-7-609002: Teardown local-host identity:20.0.0.254 duration 0:03:40&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 03:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869264#M28203</guid>
      <dc:creator>jomoca1990</dc:creator>
      <dc:date>2019-06-07T03:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869294#M28207</link>
      <description>&lt;P&gt;The logs show there is no crypto map entry and no ACL configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure your acl mirror both sides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you share both router and Asa config.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 05:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869294#M28207</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-07T05:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869780#M28209</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the configuration I have for the extenal router and the ASA. Thanks for the quick response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router#show run | section isakmp&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 2&lt;BR /&gt;crypto isakmp key cisco address 20.0.0.254&lt;BR /&gt;crypto map MAP1 10 ipsec-isakmp&lt;BR /&gt;set peer 20.0.0.254&lt;BR /&gt;set transform-set ESP-AES-256-MD5&lt;BR /&gt;match address CRYPTO&lt;BR /&gt;Router#show ru&lt;BR /&gt;Router#show run&lt;BR /&gt;Router#show running-config | sec&lt;BR /&gt;Router#show running-config | section acc&lt;BR /&gt;Router#show running-config | section access-list&lt;BR /&gt;ip access-list extended CRYPTO&lt;BR /&gt;permit ip host 2.2.2.2 10.0.0.0 0.0.0.255&lt;BR /&gt;Router#show running-config | section transform&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes 256 esp-md5-hmac&lt;BR /&gt;mode tunnel&lt;BR /&gt;set transform-set ESP-AES-256-MD5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show running-config crypto&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map0 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map0 1 set peer 20.0.0.1&lt;BR /&gt;crypto map outside_map0 1 set ikev1 transform-set ESP-AES-256-MD5&lt;BR /&gt;crypto map outside_map0 interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip 10.0.0.0 255.255.255.0 host 2.2.2.2&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2019 11:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869780#M28209</guid>
      <dc:creator>jomoca1990</dc:creator>
      <dc:date>2019-06-08T11:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869858#M28210</link>
      <description>&lt;P&gt;curious if you doing nat on the ASA as you have not mentioned in your post. if nat is in place than you have to apply identity nat on the ASA to exempt the interesting traffic.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2019 15:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869858#M28210</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-08T15:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869929#M28211</link>
      <description>&lt;P&gt;Hello Sheraz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a basic setup just to get familiar with the concept. NAT is not being implemented.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm attaching the network diagram and the configuration for the routers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OUTSIDE ROUTER&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 2&lt;BR /&gt;crypto isakmp key cisco address 20.0.0.254&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes 256 esp-md5-hmac&lt;BR /&gt;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map MAP1 10 ipsec-isakmp&lt;BR /&gt;set peer 20.0.0.254&lt;BR /&gt;set transform-set ESP-AES-256-MD5&lt;BR /&gt;match address CRYPTO&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Loopback0&lt;BR /&gt;ip address 2.2.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;ip address 20.0.0.1 255.255.255.0&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;crypto map MAP1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface Serial0/0/0:0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 20.0.0.254&lt;BR /&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended CRYPTO&lt;BR /&gt;permit ip host 2.2.2.2 10.0.0.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;INSIDE Router&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;ip ospf 1 area 0&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;router ospf 1&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip route 20.0.0.0 255.255.255.0 10.0.0.254&lt;BR /&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA 5506&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 20.0.0.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.0.0.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif Management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 1.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list outside_cryptomap extended permit ip 10.0.0.0 255.255.255.0 host 2.2.2.2&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;router ospf 1&lt;BR /&gt;network 10.0.0.0 255.255.255.0 area 0&lt;BR /&gt;log-adj-changes&lt;BR /&gt;!&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 1.1.1.0 255.255.255.0 Management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map0 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map0 1 set peer 20.0.0.1&lt;BR /&gt;crypto map outside_map0 1 set ikev1 transform-set ESP-AES-256-MD5&lt;BR /&gt;crypto map outside_map0 interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config inside&lt;BR /&gt;!&lt;BR /&gt;group-policy L2L internal&lt;BR /&gt;group-policy L2L attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username Hokage password LImfc4qf/4kWPos8 encrypted privilege 15&lt;BR /&gt;tunnel-group 20.0.0.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 20.0.0.1 general-attributes&lt;BR /&gt;default-group-policy L2L&lt;BR /&gt;tunnel-group 20.0.0.1 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:590240c9eed298d57c795e5995562fcb&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2019 02:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869929#M28211</guid>
      <dc:creator>jomoca1990</dc:creator>
      <dc:date>2019-06-09T02:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869978#M28212</link>
      <description>&lt;P&gt;could you please share the output of these commands.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on routers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;show crypto isakmp sa&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;show crypto ipsec sa&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;show crypto ikev1 sa&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;show crypto ipsec sa&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you have an issue with R2 (Inside) router. why you having a route&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 20.0.0.0 255.255.255.0 10.0.0.254&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;change this to &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 0.0.0.0 0.0.0.0 10.0.0.254&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2019 08:42:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3869978#M28212</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-09T08:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3870321#M28213</link>
      <description>&lt;P&gt;Hello Sheraz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks you were right, the issue was on the internal router. I changed the static route and it worked, but I;m curious about the issue because the log I was getting from the ASA was saying that there was no policy. Why do you consider the static route was causing the conflict.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for help&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 14:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3870321#M28213</guid>
      <dc:creator>jomoca1990</dc:creator>
      <dc:date>2019-06-10T14:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3870495#M28214</link>
      <description>&lt;P&gt;now taking a step back and let consider the route "ip route 20.0.0.0 255.255.255.0 10.0.0.254".&lt;BR /&gt;this route say if destination is 20.0.0.0 255.255.255.0 than use next hop 10.0.0.254.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;at R1(outside) you have configured ip route 0.0.0.0 0.0.0.0 20.0.0.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FROM R2 perspective,&lt;BR /&gt;Step.1 (A packet is manufactured in R2 Engine) example below -------------------------------------------------------------------&lt;BR /&gt;|Dest Add 2.2.2.2|Dest port 80|Source Add 10.0.0.1 Source|Port 12345|&lt;BR /&gt;-------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Step 2.&lt;/P&gt;&lt;P&gt;R2 check its routing table and it has a OSPF configured but does not have route for 2.2.2.2 so R2 has no idea how to&lt;BR /&gt;forward traffic destin to 2.2.2.2. at the same time R2 have a static route 20.0.0.0/24. but your destin traffic is 2.2.2.2&lt;BR /&gt;not 20.0.0.0/24. to fix this you have to tell any destination address with next hope (ip route 0.0.0.0 0.0.0.0 10.0.0.254)&lt;/P&gt;&lt;P&gt;however, at the same time you have configured a ip address 2.2.2.2 and 10.0.0.0/24 on the ASA for the VPN purpose. now with&lt;BR /&gt;having a static route on R2 (ip route 20.0.0.0/24 10.0.0.1) if you issue a command on ASA "show crypto ipsec sa detail" you&lt;BR /&gt;will notice that there are not decapsulation. At the same time you issue command on R1 "show crypto ipsec sa detail" you will&lt;BR /&gt;notice that there are encapsulation. which point that there is a issue with routing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 19:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3870495#M28214</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-10T19:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: unable to establish IPSec site to site  vpn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3870527#M28215</link>
      <description>Thanks for the help and the explanation Sheraz</description>
      <pubDate>Mon, 10 Jun 2019 21:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-establish-ipsec-site-to-site-vpn/m-p/3870527#M28215</guid>
      <dc:creator>jomoca1990</dc:creator>
      <dc:date>2019-06-10T21:26:00Z</dc:date>
    </item>
  </channel>
</rss>

