<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec VPN traffic issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082776#M394784</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic you mention shouldnt be forwarded to the VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you perhaps share your configuration (remove any sensitive information where needed) and we could check if there is any clear reason for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a possiblity (atleast if you are using a very new software version) that a NAT rule is overriding the routing table in your case. You might have a NAT rule that determines the eggress interface for example. &lt;EM&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Didnt think before writing again &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt; Seems that you are using below 8.3 software atleast since you have a NAT0 rule access-list. In the newer software it isnt done in that way anymore.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If in doubt you could also use the "packet-tracer" to see what rules are being applied to the traffic you mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command format is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;SOURCE interface=""&gt; &lt;PROCOTOL&gt; &lt;SOURCE address=""&gt; &lt;RANDON source="" port=""&gt; &lt;DESTINATION address=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/RANDON&gt;&lt;/SOURCE&gt;&lt;/PROCOTOL&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above command the ASA should list what happens to that type of connection when it enters the ASA in the specified input interface. Copy the output here if you use the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Dec 2012 07:42:40 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2012-12-04T07:42:40Z</dc:date>
    <item>
      <title>IPSec VPN traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082775#M394783</link>
      <description>&lt;P&gt;I have a site to site VPN configured on a asa5505. The tunnel is up and the interesting traffic is successfully being encrypted. The issue is that when inbound traffic originating from a subnet outside of the encrypted range destin to the subnet within the encrypted range, the return traffic is sent into the tunnel and obviously fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My access-list&lt;/P&gt;&lt;P&gt;access-list inside_1_cryptomap extended permit ip 10.1.2.0 255.255.255.224 10.2.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list pci_nat0_outbound extended permit ip 10.1.2.0 255.255.255.224 10.2.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When traffic from 1.1.1.0/24 to 10.2.2.0/24 traverse the firewall the return traffic goes into the tunnel but it doesn't have the correct match parameters?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something?&amp;nbsp; I'm expecting that only traffic matching the crypto map will use the tunnel and all other traffic will utilize the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082775#M394783</guid>
      <dc:creator>cperkins22</dc:creator>
      <dc:date>2019-03-12T00:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082776#M394784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic you mention shouldnt be forwarded to the VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you perhaps share your configuration (remove any sensitive information where needed) and we could check if there is any clear reason for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a possiblity (atleast if you are using a very new software version) that a NAT rule is overriding the routing table in your case. You might have a NAT rule that determines the eggress interface for example. &lt;EM&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Didnt think before writing again &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt; Seems that you are using below 8.3 software atleast since you have a NAT0 rule access-list. In the newer software it isnt done in that way anymore.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If in doubt you could also use the "packet-tracer" to see what rules are being applied to the traffic you mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command format is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;SOURCE interface=""&gt; &lt;PROCOTOL&gt; &lt;SOURCE address=""&gt; &lt;RANDON source="" port=""&gt; &lt;DESTINATION address=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/RANDON&gt;&lt;/SOURCE&gt;&lt;/PROCOTOL&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above command the ASA should list what happens to that type of connection when it enters the ASA in the specified input interface. Copy the output here if you use the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2012 07:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082776#M394784</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-04T07:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082777#M394785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply Jouni,&amp;nbsp; Yes I'm running 8.2.5 FIPS.&amp;nbsp; Below is my packet tracker, notice that phase 4 appears to hit the vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW-1# packet-tracer input inside tcp 1.1.1.13 1024 10.1.2.5 139&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.1.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.224 pci&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 1.1.1.13 10.1.2.0 255.255.255.224 eq netbios-ssn&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 449106, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: pci&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2012 15:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082777#M394785</guid>
      <dc:creator>cperkins22</dc:creator>
      <dc:date>2012-12-04T15:19:41Z</dc:date>
    </item>
    <item>
      <title>IPSec VPN traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082778#M394786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it be possible to get the configuration of the firewall (minus any sensitive information) so I can go through it? Would be much easier to look through the whole situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2012 16:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-traffic-issue/m-p/2082778#M394786</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-04T16:55:25Z</dc:date>
    </item>
  </channel>
</rss>

