<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Odd crypto-map behavior in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871747#M28227</link>
    <description>&lt;P&gt;This look interesting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN overlap conflict (vpn-overlap-conflict) 27770&lt;BR /&gt;VPN decryption missing (vpn-missing-decrypt) 12834&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you mind if you can share the configuration. you can hide the ip addresses or make up to different ip address and also remove the password or any other sensitive information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also when you interesting acl for vpn in place. could you issue the command show crypto ipsec sa peer x.x.x.x and show the output.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jun 2019 13:41:52 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-06-12T13:41:52Z</dc:date>
    <item>
      <title>Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3870356#M28187</link>
      <description>&lt;P&gt;Our IKEv2 VPN is showing some very odd behavior. We have two devices our end that need to be seen as interesting traffic, they are n.n.8.4 and n.n.9.4. When these were configured I put in 8.4 first followed by the 9.4, the tunnel came up, traffic passed through it, but only traffic from 8.4, 9.4 traffic was dropped as "(vpn-context-expired) Expired VPN context". On doing a packet trace I got this message.&lt;BR /&gt;*********************************************************************&lt;BR /&gt;WARNING: An existing decryption SA was not found. Please confirm the&lt;BR /&gt;IPsec Phase 2 SA or Anyconnect Tunnel is established.&lt;BR /&gt;*********************************************************************&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Changing the pack trace to 8.4 gave me traffic all the way through.&lt;/P&gt;&lt;P&gt;By deleting 8.4 from the crypto-map I was able to get 9.4 to use the tunnel, but then even after I added 8.4 back in, it portrayed the same characteristics as 9.4 had at the start.&lt;/P&gt;&lt;P&gt;This is driving me nuts.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 15:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3870356#M28187</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-10T15:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3870500#M28188</link>
      <description>&lt;P&gt;which ASA code you on? and does this ASA is in context mode?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;check this if you hitting a bug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Bug: CSCup37416&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 19:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3870500#M28188</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-10T19:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871016#M28189</link>
      <description>&lt;P&gt;It is running 9.10(1) and is in single context mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 14:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871016#M28189</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-11T14:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871528#M28223</link>
      <description>&lt;P&gt;what does asp drop shows you. also confirm you are using a object network in access-cryto map or you using the ip address in cryto map access-list.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 07:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871528#M28223</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-12T07:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871602#M28224</link>
      <description>&lt;P&gt;Hi Sheraz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using network objects that resolve to an IP address, these are configured as a network group that is called by the crypto map.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 09:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871602#M28224</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-12T09:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871623#M28225</link>
      <description>&lt;P&gt;share the output command of show asp drop&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 10:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871623#M28225</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-12T10:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871711#M28226</link>
      <description>&lt;P&gt;sh asp drop&lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;NAT-T keepalive message (natt-keepalive) 1138&lt;BR /&gt;SVC Module does not have a channel for reinjection (mp-svc-no-channel) 955&lt;BR /&gt;SVC Module does not have a session (mp-svc-no-session) 692&lt;BR /&gt;SVC Module is in flow control (mp-svc-flow-control) 1257304&lt;BR /&gt;SVC Module unable to fragment packet (mp-svc-no-fragment) 7&lt;BR /&gt;Expired VPN context (vpn-context-expired) 25&lt;BR /&gt;Flow is being freed (flow-being-freed) 26&lt;BR /&gt;ttl exceeded (ttl-exceeded) 195494&lt;BR /&gt;Invalid TCP Length (invalid-tcp-hdr-length) 90&lt;BR /&gt;No valid adjacency (no-adjacency) 9493864&lt;BR /&gt;No route to host (no-route) 1647335&lt;BR /&gt;Flow is denied by configured rule (acl-drop) 347562058&lt;BR /&gt;No same-security-traffic configured (no-same-security-traffic) 4586429&lt;BR /&gt;Flow denied due to resource limitation (unable-to-create-flow) 78&lt;BR /&gt;First TCP packet not SYN (tcp-not-syn) 1404901&lt;BR /&gt;Bad TCP checksum (bad-tcp-cksum) 3&lt;BR /&gt;TCP data send after FIN (tcp-data-past-fin) 5&lt;BR /&gt;TCP failed 3 way handshake (tcp-3whs-failed) 75239&lt;BR /&gt;TCP RST/FIN out of order (tcp-rstfin-ooo) 6446971&lt;BR /&gt;TCP SEQ in SYN/SYNACK invalid (tcp-seq-syn-diff) 211&lt;BR /&gt;TCP SYNACK on established conn (tcp-synack-ooo) 334&lt;BR /&gt;TCP packet SEQ past window (tcp-seq-past-win) 54968&lt;BR /&gt;TCP invalid ACK (tcp-invalid-ack) 2215&lt;BR /&gt;TCP Out-of-Order packet buffer timeout (tcp-buffer-timeout) 186&lt;BR /&gt;TCP RST/SYN in window (tcp-rst-syn-in-win) 1731&lt;BR /&gt;TCP dup of packet in Out-of-Order queue (tcp-dup-in-queue) 459&lt;BR /&gt;TCP packet failed PAWS test (tcp-paws-fail) 224&lt;BR /&gt;SSL first record invalid (ssl-first-record-invalid) 30&lt;BR /&gt;CTM returned error (ctm-error) 152&lt;BR /&gt;Slowpath security checks failed (sp-security-failed) 2851032&lt;BR /&gt;IP option drop (invalid-ip-option) 4503&lt;BR /&gt;Expired flow (flow-expired) 75876&lt;BR /&gt;ICMP Inspect bad icmp code (inspect-icmp-bad-code) 1236&lt;BR /&gt;ICMP Inspect seq num not matched (inspect-icmp-seq-num-not-matched) 1420&lt;BR /&gt;ICMP Error Inspect no existing conn (inspect-icmp-error-no-existing-conn) 25&lt;BR /&gt;DNS Inspect invalid packet (inspect-dns-invalid-pak) 7&lt;BR /&gt;DNS Inspect invalid domain label (inspect-dns-invalid-domain-label) 5&lt;BR /&gt;DNS Inspect id not matched (inspect-dns-id-not-matched) 8806&lt;BR /&gt;FP L2 rule drop (l2_acl) 95&lt;BR /&gt;Interface is down (interface-down) 320&lt;BR /&gt;Dropped pending packets in a closed socket (np-socket-closed) 24212&lt;BR /&gt;NAT failed (nat-xlate-failed) 702&lt;BR /&gt;Connection to PAT address without pre-existing xlate (nat-no-xlate-to-pat-pool) 844124&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;&lt;P&gt;Flow drop:&lt;BR /&gt;Tunnel being brought up or torn down (tunnel-pending) 62&lt;BR /&gt;Need to start IKE negotiation (need-ike) 12&lt;BR /&gt;SVC spoof packet detected (svc-spoof-detect) 4&lt;BR /&gt;SVC replacement connection established (svc-replacement-conn) 1128&lt;BR /&gt;VPN overlap conflict (vpn-overlap-conflict) 27770&lt;BR /&gt;VPN decryption missing (vpn-missing-decrypt) 12834&lt;BR /&gt;Flow is denied by access rule (acl-drop) 428156&lt;BR /&gt;NAT reverse path failed (nat-rpf-failed) 114&lt;BR /&gt;Inspection failure (inspect-fail) 968834&lt;BR /&gt;SSL bad record detected (ssl-bad-record-detect) 1249&lt;BR /&gt;SSL handshake failed (ssl-handshake-failed) 9137&lt;BR /&gt;DTLS hello processed and closed (dtls-hello-close) 3279&lt;BR /&gt;SSL record decryption failed (ssl-record-decrypt-error) 4&lt;/P&gt;&lt;P&gt;Last clearing: Never&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 13:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871711#M28226</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-12T13:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871747#M28227</link>
      <description>&lt;P&gt;This look interesting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN overlap conflict (vpn-overlap-conflict) 27770&lt;BR /&gt;VPN decryption missing (vpn-missing-decrypt) 12834&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you mind if you can share the configuration. you can hide the ip addresses or make up to different ip address and also remove the password or any other sensitive information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also when you interesting acl for vpn in place. could you issue the command show crypto ipsec sa peer x.x.x.x and show the output.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 13:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871747#M28227</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-12T13:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871811#M28228</link>
      <description>&lt;P&gt;Thanks for your help and interest in this Sheraz, afraid I can't post the sh run output as we have too much sensitive information here but the output of "sh crypto ipsec sa peer&amp;nbsp; n.n.8.4 and 9.4" is the same. "There are no ipsec sa for peer n.n.8.4" and&amp;nbsp;"There are no ipsec sa for peer n.n.9.4"&lt;/P&gt;&lt;P&gt;The fact that I can get 8.4 working by deleting the re-adding 9.4&amp;nbsp; or get 9.4 working by doing the same with 8.4 just seems to point to a bug rather than a config error.&amp;nbsp; I have tried deleting the config and re installing by CLI and have also tried making a new object group with IP addresses rather than object names.&amp;nbsp; Neither of these have worked.&amp;nbsp; I still only see one working at a time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 14:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871811#M28228</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-12T14:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871818#M28229</link>
      <description>&lt;P&gt;This is the output of "packet trace input WAN-New tcp A.B.C.D sql n.n.8.4 sql decrypt detail."&lt;/P&gt;&lt;P&gt;*********************************************************************&lt;BR /&gt;WARNING: An existing decryption SA was not found. Please confirm the&lt;BR /&gt;IPsec Phase 2 SA or Anyconnect Tunnel is established.&lt;BR /&gt;*********************************************************************&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc771e20ac0, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=202804823, user_data=0x7fc7792b7ed0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc76efc2110, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=104853406, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop x.x.x.254 using egress ifc INSIDE&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (BRS-INSIDE-75,WAN-New) source static DM_INLINE_NETWORK_33 DM_INLINE_NETWORK_33 destination static ACL-remote ACL-remote no-proxy-arp route-lookup description ACL IPsec Link&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface BRS-INSIDE-75&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; Untranslate n.n.8.4/1521 to n.n.8.4/1521&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: WAN-New&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (vpn-context-expired) Expired VPN context&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 14:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871818#M28229</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-12T14:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871828#M28230</link>
      <description>&lt;P&gt;And this is from the working 9.4.&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc771e20ac0, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=202780541, user_data=0x7fc7792b7ed0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc76efc2110, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=104841307, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop E.F.H.U using egress ifc INSIDE&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,WAN-New) source static DM_INLINE_NETWORK_33 DM_INLINE_NETWORK_33 destination static ACL-remote ACL-remote no-proxy-arp route-lookup description ACL IPsec Link&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE&lt;BR /&gt;Untranslate n.n.9.4/1521 to n.n.9.4/1521&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,WAN-New) source static DM_INLINE_NETWORK_33 DM_INLINE_NETWORK_33 destination static ACL-remote ACL-remote no-proxy-arp route-lookup description ACL IPsec Link&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate A.B.C.D/1521 to A.B.C.D/1521&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc775478e00, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=516826, user_data=0x7fc767b650b0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=A.B.C.D, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=n.n.9.4, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=WAN-New, output_ifc=INSIDE&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc762057770, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=877943179, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc76af8e080, priority=0, domain=permit, deny=true&lt;BR /&gt;hits=297776, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc7762b7510, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map SFR&lt;BR /&gt;match access-list SFR&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class SFR&lt;BR /&gt;sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc773d09d40, priority=71, domain=sfr, deny=false&lt;BR /&gt;hits=634112, user_data=0x7fc76412e400, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-sqlnet&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc7762c60f0, priority=70, domain=inspect-sqlnet, deny=false&lt;BR /&gt;hits=6, user_data=0x7fc7640ffb30, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=1521, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc7715902f0, priority=70, domain=ipsec-tunnel-flow, deny=false&lt;BR /&gt;hits=1676, user_data=0xe6a34, cs_id=0x7fc77928cf80, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=A.B.C.D, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=n.n.9.4, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=WAN-New, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,WAN-New) source static DM_INLINE_NETWORK_33 DM_INLINE_NETWORK_33 destination static ACL-remote ACL-remote no-proxy-arp route-lookup description ACL IPsec Link&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7fc765ae1f30, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=516826, user_data=0x7fc772801f60, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=A.B.C.D, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=n.n.9.4, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=WAN-New, output_ifc=INSIDE&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7fc764139d60, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=562426620, user_data=0x7fc7640a4f80, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=INSIDE&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc762057770, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=877943181, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 15 Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc762e01d70, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=564379902, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 16&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;out id=0x7fc772776030, priority=70, domain=encrypt, deny=false&lt;BR /&gt;hits=1674, user_data=0xe4efc, cs_id=0x7fc77928cf80, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=n.n.9.4, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=A.B.C.D, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=WAN-New&lt;BR /&gt;&lt;BR /&gt;Phase: 17&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;out id=0x7fc765812000, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=2788553, user_data=0x7fc7640a4f80, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=WAN-New&lt;/P&gt;&lt;P&gt;Phase: 18&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 602131890, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_ipsec_tunnel_flow&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_punt &amp;lt;inspect_sqlnet&amp;gt;&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_punt &amp;lt;inspect_sqlnet&amp;gt;&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_encrypt&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: WAN-New&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 14:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871828#M28230</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-12T14:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871884#M28231</link>
      <description>&lt;P&gt;You need to open a TAC CASE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While looking at the cisco documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it says,&lt;/P&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;BR /&gt;&lt;P&gt;Name: vpn-context-expired&lt;BR /&gt;Expired VPN context:&lt;BR /&gt;This counter will increment when the security appliance receives a packet that requires encryption or decryption, and the ASP VPN context required to perform the operation is no longer valid.&lt;/P&gt;&lt;P&gt;Recommendation:&lt;BR /&gt;This indicates that a software error should be reported to the Cisco TAC.&lt;/P&gt;&lt;P&gt;Syslogs:&lt;BR /&gt;None"&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 12 Jun 2019 16:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3871884#M28231</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-12T16:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3872246#M28232</link>
      <description>&lt;P&gt;Thanks Sheraz&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 07:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3872246#M28232</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-13T07:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3873071#M28234</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try and run it through ASDM Packet Tracer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 12:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3873071#M28234</guid>
      <dc:creator>harveyheer</dc:creator>
      <dc:date>2019-06-14T12:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: Odd crypto-map behavior</title>
      <link>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3873491#M28235</link>
      <description>&lt;P&gt;Harvey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No idea why it worked, but it did.&amp;nbsp; I'd run it through the CLI packet tracer many times, but twice through the ASDM PT and it burst into life.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You sir are a genius.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 09:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-crypto-map-behavior/m-p/3873491#M28235</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-06-15T09:36:04Z</dc:date>
    </item>
  </channel>
</rss>

