<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ask the Expert - Firewall Security and Troubleshooting VPN f in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099691#M392062</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi, i have a problem with my asa's 5505 in l2l vpn.configuration of my network is&lt;/P&gt;&lt;P&gt;LAN(192.168.5.0)&amp;gt;asa192.168.5.1&amp;gt;asa10.15.100.15&amp;gt;router10.15.100.1&amp;gt;8 routers&amp;gt;router10.13.74.1&amp;gt;asa10.13.74.50&amp;gt;asa192.168.0.15&amp;gt;LAN192.168.0.0&lt;/P&gt;&lt;P&gt;configurations of asa&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh ru"&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password csq7sfr0bQJqMGET encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 10.15.100.15 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network Makenzijeva-site&lt;/P&gt;&lt;P&gt;subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Palata-site&lt;/P&gt;&lt;P&gt;subnet 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Sharepoint&lt;/P&gt;&lt;P&gt;host 192.168.5.37&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip object Palata-site object Makenzijeva-site &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip object Palata-site any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Palata-site Palata-site destination static Makenzijeva-site Makenzijeva-site no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network Sharepoint&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 10.15.100.20 dns&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.15.100.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.5.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.13.74.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http 10.15.100.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt;protocol esp encryption des&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt;protocol esp encryption 3des&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt;protocol esp encryption aes&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt;protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt;protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 10.13.74.50 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 20&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 30&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 40&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 50&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 60&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 70&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 80&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 90&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 100&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 110&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 120&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 130&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 140&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 150&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.5.5-192.168.5.132 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_10.13.74.50 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_10.13.74.50 attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ikev1 ikev2 &lt;/P&gt;&lt;P&gt;tunnel-group 10.13.74.50 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 10.13.74.50 general-attributes&lt;/P&gt;&lt;P&gt;default-group-policy GroupPolicy_10.13.74.50&lt;/P&gt;&lt;P&gt;tunnel-group 10.13.74.50 ipsec-attributes&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;ikev2 remote-authentication pre-shared-key *****&lt;/P&gt;&lt;P&gt;ikev2 local-authentication pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:e3e17805aa26e1eb7c41c6ea3334a35f&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(4)1 &lt;BR /&gt;!&lt;BR /&gt;hostname asa-makenzijeva&lt;BR /&gt;enable password csq7sfr0bQJqMGET encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.15 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.13.74.50 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network FIREWALL-MAKENZIJEVA-LAN&lt;BR /&gt;host 192.168.0.15&lt;BR /&gt;object network MAKENZIJEVA-site&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network PALATA-site&lt;BR /&gt;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network DRI-AD&lt;BR /&gt;host 192.168.0.20&lt;BR /&gt;object network DRI-VM&lt;BR /&gt;host 192.168.0.28&lt;BR /&gt;object network UPRAVA-Router&lt;BR /&gt;host 10.13.74.1&lt;BR /&gt;access-list outside_cryptomap extended permit ip object MAKENZIJEVA-site object PALATA-site &lt;BR /&gt;access-list INTERESTING-VPN-TRAFFIC extended permit ip object MAKENZIJEVA-site object PALATA-site &lt;BR /&gt;access-list inside_access_in extended permit ip object MAKENZIJEVA-site any &lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static MAKENZIJEVA-site MAKENZIJEVA-site destination static PALATA-site PALATA-site no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network DRI-AD&lt;BR /&gt;nat (inside,outside) static 10.13.74.51 dns&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.13.74.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.13.74.0 255.255.255.0 outside&lt;BR /&gt;http 10.15.100.0 255.255.255.0 outside&lt;BR /&gt;http 192.168.5.0 255.255.255.0 outside&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer 10.15.100.15 &lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 6ecc7aa5a7032009b8cebcf4e952d491&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63cd1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 02030100 01a38201 df308201 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; db303406 082b0601 05050701 01042830 26302406 082b0601 05050730 01861868 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1d130101 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ff040830 060101ff 02010030 70060355 1d200469 30673065 060b6086 480186f8 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 45010717 03305630 2806082b 06010505 07020116 1c687474 70733a2f 2f777777 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e766572 69736967 6e2e636f 6d2f6370 73302a06 082b0601 05050702 02301e1a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1c687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03551d1f 042d302b 3029a027 a0258623 68747470 3a2f2f63 726c2e76 65726973 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69676e2e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02010630 6d06082b 06010505 07010c04 61305fa1 5da05b30 59305730 55160969 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6d616765 2f676966 3021301f 30070605 2b0e0302 1a04148f e5d31a86 ac8d8e6b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1b311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301d0603 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 551d0e04 1604140d 445c1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1d230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300d0609 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2a864886 f70d0101 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b2227055 d9203340 3307c265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6decd018 7d494aca 99c71928 a2bed877 24f78526 866d8705 404167d1 273aeddc &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6c2527b9 deb78458 c61f381e a4c4cb66&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;telnet 10.15.100.0 255.255.255.0 outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy GroupPolicy_10.15.100.15 internal&lt;BR /&gt;group-policy GroupPolicy_10.15.100.15 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;tunnel-group 10.15.100.15 type ipsec-l2l&lt;BR /&gt;tunnel-group 10.15.100.15 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_10.15.100.15&lt;BR /&gt;tunnel-group 10.15.100.15 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no protocol-enforcement&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:9494301458b776d0bc2326c26692b4fc&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;i configured l2l vpn over site to site wizard, but traffic does not goes through tunnel. there's tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;i used commands&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show isakmp sa"&lt;/P&gt;&lt;P&gt;There are no IKEv1 SAs&lt;/P&gt;&lt;P&gt;IKEv2 SAs:&lt;/P&gt;&lt;P&gt;Session-id:4, Status:UP-ACTIVE, IKE count:1, CHILD count:1&lt;/P&gt;&lt;P&gt;Tunnel-id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Role&lt;BR /&gt;1744962893&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.15.100.15/500&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.13.74.50/500&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; READY&amp;nbsp;&amp;nbsp;&amp;nbsp; INITIATOR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encr: AES-CBC, keysize: 256, Hash: SHA96, DH Grp:5, Auth sign: PSK, Auth verify: PSK &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Life/Active Time: 86400/2831 sec&lt;BR /&gt;Child sa: local selector&amp;nbsp; 192.168.5.0/0 - 192.168.5.255/65535&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote selector 192.168.0.0/0 - 192.168.0.255/65535&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ESP spi in/out: 0xef9aeee/0x6cbcf15b&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result of the command: "show isakmp sa"&lt;/P&gt;&lt;P&gt;There are no IKEv1 SAs&lt;/P&gt;&lt;P&gt;IKEv2 SAs:&lt;/P&gt;&lt;P&gt;Session-id:13, Status:UP-ACTIVE, IKE count:1, CHILD count:1&lt;/P&gt;&lt;P&gt;Tunnel-id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Role&lt;BR /&gt;588528855&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.13.74.50/500&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.15.100.15/500&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; READY&amp;nbsp;&amp;nbsp;&amp;nbsp; RESPONDER&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encr: AES-CBC, keysize: 256, Hash: SHA96, DH Grp:5, Auth sign: PSK, Auth verify: PSK&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Life/Active Time: 86400/2884 sec&lt;BR /&gt;Child sa: local selector&amp;nbsp; 192.168.0.0/0 - 192.168.0.255/65535&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote selector 192.168.5.0/0 - 192.168.5.255/65535&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ESP spi in/out: 0x6cbcf15b/0xef9aeee&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result of the command: "show ipsec sa"&lt;/P&gt;&lt;P&gt;interface: outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: outside_map, seq num: 1, local addr: 10.13.74.50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside_cryptomap extended permit ip 192.168.0.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (192.168.5.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 10.15.100.15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 214, #pkts encrypt: 214, #pkts digest: 214&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 1441, #pkts decrypt: 1441, #pkts verify: 1441&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 214, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 10.13.74.50/500, remote crypto endpt.: 10.15.100.15/500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 74, media mtu 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0EF9AEEE&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : 6CBCF15B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x6CBCF15B (1824321883)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-hmac no compression &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 102400, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4193137/25899)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xFFFFFFFF 0xFFFFFFFF&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x0EF9AEEE (251244270)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-hmac no compression &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 102400, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4239344/25899)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;esult of the command: "show ipsec sa"&lt;/P&gt;&lt;P&gt;interface: outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: outside_map, seq num: 1, local addr: 10.15.100.15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside_cryptomap extended permit ip 192.168.5.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (192.168.5.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 10.13.74.50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 1472, #pkts encrypt: 1472, #pkts digest: 1472&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 1472, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 10.15.100.15/500, remote crypto endpt.: 10.13.74.50/500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 74, media mtu 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 6CBCF15B&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : 0EF9AEEE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x0EF9AEEE (251244270)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-hmac no compression &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, PFS Group 2, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 110592, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (3916800/25843)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x6CBCF15B (1824321883)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-hmac no compression &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, PFS Group 2, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 110592, crypto-map: outside_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4054895/25843)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;all is tryed but nothing, plz help me&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;where is mistake?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;then, tunnel is up, but traffic is not working&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 May 2013 10:06:16 GMT</pubDate>
    <dc:creator>goran ljubic</dc:creator>
    <dc:date>2013-05-10T10:06:16Z</dc:date>
    <item>
      <title>Ask the Expert - Firewall Security and Troubleshooting VPN for Adaptive Security Appliance(ASA)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099662#M392028</link>
      <description>&lt;P&gt;Learn and ask questions regarding Firewall Security and&amp;nbsp; Troubleshooting VPN for Adaptive Security Appliance(ASA) . This event&amp;nbsp; will be a continuation of the live Facebook Forum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bhavik&amp;nbsp; Joshi is a Network Consulting Engineer with Service Provider Delivery&amp;nbsp; team in Bangalore and has more than 3 years of experience working with&amp;nbsp; security solutions implementation and troubleshooting network issues. &lt;/P&gt;&lt;P&gt;He&amp;nbsp; has been actively working on multi-vendor security device and migration&amp;nbsp; of multi-vendor security devices with cisco security solution. He also&amp;nbsp; holds a CCIE Security certification #26263.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Where: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Please go to Cisco Support Facebook Page on the event day: &lt;A href="http://www.facebook.com/CiscoSupportCommunity" rel="nofollow" target="_blank"&gt;http://www.facebook.com/CiscoSupportCommunity&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;When: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;8:00 AM PST (San Francisco; UTC -7 hrs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This corresponds to:&lt;/P&gt;&lt;P&gt;5:00 PM CET(Paris; UTC +1 hr)&lt;/P&gt;&lt;P&gt;9:00 PM PKT (Pakistan, UTC +5 hrs) &lt;/P&gt;&lt;P&gt;9:30 PM IST (India; UTC +5:30 hrs)&lt;/P&gt;&lt;P&gt;11:00 PM (Indonesia; UTC +7 hrs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What is Facebook Forum?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Facebook&amp;nbsp; forums are online conversations, held at a pre-arranged time on our&amp;nbsp; Facebook page. It gives you an opportunity to interact with a live Cisco&amp;nbsp; expert and get more information about a particular technology, service&amp;nbsp; or product.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099662#M392028</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2019-03-12T00:53:50Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099663#M392029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bhavik ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm happy that this topic came up in Ask The Expert section.Most of my work involves setting up Site to Site VPN tunnels to securely access client locations. We have a Cisco ASA 5505 in place. Is it possible that I can restrict communication from client end to our location through the tunnel , ie , restrict access for client location machines from accessing our network? Can I use access lists for the same ? What access lists should I be configuring ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anup&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 18:50:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099663#M392029</guid>
      <dc:creator>Anup Sasikumar</dc:creator>
      <dc:date>2013-01-29T18:50:22Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099664#M392030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Bhavik ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm interested in learning how to troubleshoot Site-To-Site VPN's, IPSec and Web VPN. What material would you recommend to assist in this adventure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 12:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099664#M392030</guid>
      <dc:creator>JOHN MURPHY</dc:creator>
      <dc:date>2013-01-30T12:23:03Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099665#M392031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bhavik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have to configure two cisco ASA 5520 in a redundant mode with IPv4 &amp;amp; IPv6 support for our VPN clients (runs Cisco ANy connect).&amp;nbsp; My questions are &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Is IPv6 support available in the above setup ? if yes please share document.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Can it be possible to run both ASAs in Active-Active state. In case the one goes down, shall the associated vpn clients needs reconnection ?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Can you share helpful document for confguring ASA in redundant mode.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Thanks !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Umair&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2013 13:38:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099665#M392031</guid>
      <dc:creator>kthned</dc:creator>
      <dc:date>2013-01-30T13:38:26Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099666#M392032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bhavik,&lt;/P&gt;&lt;P&gt;My ASA5505 does not work properly when I click AJAX button; it should reload the new pages when I changed the contents. But not responding and nothing happen.　I checked through the Cisco support community, I found some questions and answers related this problem, but not quietly solvedas the following links;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ASA5505 Clientless SSL and Ajax issue&lt;BR /&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3187376#3187376"&gt;https://supportforums.cisco.com/message/3187376#3187376&lt;/A&gt;&lt;BR /&gt;CISCO ASA 5505 SSL VPN not able to display web pages properly with &lt;BR /&gt;Javascript&lt;BR /&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3143207#3143207"&gt;https://supportforums.cisco.com/message/3143207#3143207&lt;/A&gt;&lt;BR /&gt;WebVPN - SSL Portal - URL Rewrite&lt;BR /&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3609935#3609935"&gt;https://supportforums.cisco.com/message/3609935#3609935&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCub09280" target="_blank"&gt;CSCub09280&lt;/A&gt; ASA Content rewrite HTML content was treated as ajax response&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCtk95435" target="_blank"&gt;CSCtk95435&lt;/A&gt; ASA rewriter: radcontrols based AJAX/ASP website not working properly&lt;/P&gt;&lt;P&gt;My question is: if I update the ASA-5505's ASA OS and the ASDM,&lt;BR /&gt;that would fix the problem?&lt;/P&gt;&lt;P&gt;Please help me!!&lt;/P&gt;&lt;P&gt;Here is the current ASA OS and ASDM version and I will try to the update version.&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;Cisco ASA-5505&lt;BR /&gt;ASA OS&lt;BR /&gt;current:8.4(2)&lt;BR /&gt;⇒to：9.1(1)&lt;/P&gt;&lt;P&gt;ASDM&lt;BR /&gt;current:6.4(5）&lt;BR /&gt;⇒to：7.1(1)&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 8.4(2)&lt;BR /&gt;Device Manager Version 6.4(5)&lt;BR /&gt;Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;BIOS Flash M50FW016 @ 0xfff00000, 2048KB&lt;BR /&gt;Encryption hardware device : Cisco ASA-5505&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2013 08:46:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099666#M392032</guid>
      <dc:creator>deansakai1</dc:creator>
      <dc:date>2013-01-31T08:46:27Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099667#M392033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx for such kind of easy support community!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We support&amp;nbsp; VERY CRITICAL business process and we need to replace ASA5510&amp;nbsp; 8.0&amp;nbsp;&amp;nbsp; to&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA5540&amp;nbsp; 9.1 version&lt;/P&gt;&lt;P&gt;we have very large config file&amp;nbsp; need minimum downtime.&lt;/P&gt;&lt;P&gt;What is ur reccomendation ?&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;apply&amp;nbsp; old config to new ASA&amp;nbsp; with same IOS (8.0)&amp;nbsp;&amp;nbsp; , then upgade it&amp;nbsp; to new one&amp;nbsp; (9.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or backup from ASA5510 (8.0)&amp;nbsp; with ASDM and restore it at&amp;nbsp; 5540 (9.1) ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx beforehand &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2013 13:14:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099667#M392033</guid>
      <dc:creator>elmayir777</dc:creator>
      <dc:date>2013-01-31T13:14:53Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099668#M392034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Bhavik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to find the answer if the ASA can perform load balancing per-packet or per-destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a situation where I have an ASA ver8.4.4.1 and load balance two routers (two default routes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2013 21:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099668#M392034</guid>
      <dc:creator>gaboughanem</dc:creator>
      <dc:date>2013-01-31T21:31:29Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099669#M392035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can actually do that very easily using the ACL for the the site to site VPN.&amp;nbsp; You can even get it down to the port level.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2013 19:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099669#M392035</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-02-01T19:07:05Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099670#M392036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a pretty cool site for troubleshooting VPN's &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2013 19:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099670#M392036</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-02-01T19:08:08Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099671#M392037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mohamad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's a very useful one ! Thanks for sharing !&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;Regards, &lt;BR /&gt;Anup &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Feb 2013 05:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099671#M392037</guid>
      <dc:creator>Anup Sasikumar</dc:creator>
      <dc:date>2013-02-02T05:05:09Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099672#M392038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mohammad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great ! I should be reconfiguring&amp;nbsp; the access lists which defines the " interesting" traffic through the tunnel , right? &lt;/P&gt;&lt;P&gt;But I am just wondering , Let's say if I have the following setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;LAN1&lt;/STRONG&gt; (192.168.1.X)-&amp;gt;(192.168.1.1- Inside) &lt;STRONG&gt;MainASA&lt;/STRONG&gt; (Outside -1.1.1.1) ----- Internet -------(Outside -2.2.2.2) &lt;STRONG&gt;BranchASA&amp;nbsp; &lt;/STRONG&gt;( Inside - 192.168.2.1) -&amp;gt;&lt;STRONG&gt;LAN 2&lt;/STRONG&gt;(192.168.2.X)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I configure access lists for intresting traffic in Crypto map configuration , Is it necessary that I should be allowing traffic between ASA Inside IP address to establish a tunnel or since we are already specifying the Remote Peer details with the public IP of the ASA on the other end , allowing traffic to ASA Inside IP address is not required?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I need to meet the follwing conidtions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. All nodes in the main location should be able to access all nodes in Branch location &lt;/P&gt;&lt;P&gt;2. Branch location nodes should only be able access node 192.168.1.100 in Main location &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would the access list for interesting traffic to be defined in Cryptomap configuratios be &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Main location&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list MAIN2BRANCH extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Branch location&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list BRANCH2MAIN extended permit ip 192.168.2.0 255.255.255.0 host 192.168.1.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would that also prevent the return traffic (lets say , ping reply ) from 192.168.2.X network when trying to access any node on Branch from Main location , which is not desired ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, &lt;BR /&gt;Anup &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Feb 2013 05:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099672#M392038</guid>
      <dc:creator>Anup Sasikumar</dc:creator>
      <dc:date>2013-02-02T05:41:18Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099673#M392039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Anup,&lt;/P&gt;&lt;P&gt;You can use the ACL with restricted source and destination IP. This ACL you have to use with you match address statement with the used crypto map&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 13:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099673#M392039</guid>
      <dc:creator>bhavjosh</dc:creator>
      <dc:date>2013-02-04T13:54:44Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099674#M392040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi John,&lt;/P&gt;&lt;P&gt;There are too many technotes and debugging documents available on cisco websites, also refer books like Cisco VPN Troubleshooting &amp;amp; CCNP Security VPN official Cert Guide&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 14:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099674#M392040</guid>
      <dc:creator>bhavjosh</dc:creator>
      <dc:date>2013-02-04T14:03:39Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099675#M392042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Syed,&lt;/P&gt;&lt;P&gt;Please refer the cisco document given below on the link. hope it help you to clear you doubts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/ha_active_active.pdf"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/ha_active_active.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 14:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099675#M392042</guid>
      <dc:creator>bhavjosh</dc:creator>
      <dc:date>2013-02-04T14:09:40Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099676#M392044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sakai,&lt;/P&gt;&lt;P&gt;You have to upgrade on 9.1(1) or 8.4(5) as this is a bug and fixed in this ios.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 14:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099676#M392044</guid>
      <dc:creator>bhavjosh</dc:creator>
      <dc:date>2013-02-04T14:17:07Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099677#M392046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Elmayir,&lt;/P&gt;&lt;P&gt;You should go through the release nots of 9.1, it will help you to and let you know the precautions that should be taken while upgrading from 8.0 to 9.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please go through the below link once.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa91/release/notes/asarn91.html#wp678072"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/release/notes/asarn91.html#wp678072&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 14:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099677#M392046</guid>
      <dc:creator>bhavjosh</dc:creator>
      <dc:date>2013-02-04T14:21:30Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099678#M392048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;You can do the load balancing by configuring cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/vpn_params.html#wp1048834"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/vpn_params.html#wp1048834&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 14:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099678#M392048</guid>
      <dc:creator>bhavjosh</dc:creator>
      <dc:date>2013-02-04T14:25:23Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099679#M392050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well what you can do is try the VPN filter option, check out this link.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9a87.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9a87.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 20:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099679#M392050</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-02-04T20:20:46Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099680#M392051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bhavik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please explain in what scenario we will use MSS (Maximum Segment Size) configuration and its importance in troubleshooting VPN related issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you can please explain NAT traversal configuration ? Where do i need to configure NAT traversal? It should be on NAT device next to Firewall or on Firewall itself. What does this NAT configuration actually do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;IMG ___jive_emoticon_name="happy" jivemacro="emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" /&gt;&lt;/P&gt;&lt;P&gt;Krishnanand Yadav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 04:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099680#M392051</guid>
      <dc:creator>krishnanand.yadav</dc:creator>
      <dc:date>2013-02-05T04:34:11Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Firewall Security and Troubleshooting VPN for Ad</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099681#M392052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Bhavik,&lt;/P&gt;&lt;P&gt;I really appreciated your support, because before you gave me the advice, &lt;/P&gt;&lt;P&gt;I haven't had the confidence to be able to fix this problerm. &lt;/P&gt;&lt;P&gt;Now, I'll try to upgrade the ios. Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Feb 2013 04:02:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-firewall-security-and-troubleshooting-vpn-for/m-p/2099681#M392052</guid>
      <dc:creator>deansakai1</dc:creator>
      <dc:date>2013-02-06T04:02:59Z</dc:date>
    </item>
  </channel>
</rss>

