<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa ipsec problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978186#M419515</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I can, but i don't understand the target of &lt;/P&gt;&lt;P&gt;this action.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I execute statements from your post with 'no' it will not be any changes, because this predefined values in ASA software. &lt;/P&gt;&lt;P&gt;I've tryed to change this values to be equal to ISR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISR# sh cry ipsec security-association&lt;/P&gt;&lt;P&gt;Security association lifetime: 4608000 kilobytes/3600 seconds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh run cry | i ^crypto_.*_lifetime&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and nothing is happend:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC# ping -c 2 10.10.10.10&lt;/P&gt;&lt;P&gt;PING 10.10.10.10 (10.10.10.10) 56(84) bytes of data.&lt;/P&gt;&lt;P&gt;--- 10.10.10.10 ping statistics ---&lt;/P&gt;&lt;P&gt;2 packets transmitted, 0 received, 100% packet loss, time 999ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug from ASA:&lt;/P&gt;&lt;P&gt;Jun 03 07:19:28 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;Jun 03 07:19:29 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;/P&gt;&lt;P&gt;Jun 03 07:19:29 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;Jun 03 07:19:34 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;/P&gt;&lt;P&gt;Jun 03 07:19:34 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;Jun 03 07:19:35 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;/P&gt;&lt;P&gt;Jun 03 07:19:35 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Jun 2008 14:31:49 GMT</pubDate>
    <dc:creator>salexanov</dc:creator>
    <dc:date>2008-06-03T14:31:49Z</dc:date>
    <item>
      <title>asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978182#M419511</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While configuring ipsec tunnel between ASA and ISR 1811 I've got some&lt;/P&gt;&lt;P&gt;negative issues:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pc host (192.168.56.1) &amp;lt;-----&amp;gt; (inside 192.168.56.56) ASA (outside x.x.x.56)&lt;/P&gt;&lt;P&gt;&amp;lt;-------&amp;gt; (outside x.x.x.55) ISR (lo 192.168.55.55)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping from ISR to ASA everyting is ok:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISR# ping ip 192.168.56.1 source 192.168.55.55&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.56.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;Packet sent with a source address of 192.168.55.55&lt;/P&gt;&lt;P&gt;.!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh isa sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   Active SA: 1&lt;/P&gt;&lt;P&gt;    Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;/P&gt;&lt;P&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1   IKE Peer: x.x.x.55&lt;/P&gt;&lt;P&gt;    Type    : L2L             Role    : responder&lt;/P&gt;&lt;P&gt;    Rekey   : no              State   : MM_ACTIVE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in vise versa ipsec tunnel is not established:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# clear isa sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC host# ping -c 2 192.168.55.55&lt;/P&gt;&lt;P&gt;PING 192.168.55.55 (192.168.55.55) 56(84) bytes of data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- 192.168.55.55 ping statistics ---&lt;/P&gt;&lt;P&gt;2 packets transmitted, 0 received, 100% packet loss, time 1010ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and on the ASA I have seen follow debug messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jun 02 03:18:07 [IKEv1]: IKE Initiator unable to find policy: Intf inside,&lt;/P&gt;&lt;P&gt;Src: 192.168.56.1, Dst: 192.168.55.55&lt;/P&gt;&lt;P&gt;Jun 02 03:18:16 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi&lt;/P&gt;&lt;P&gt;0x0&lt;/P&gt;&lt;P&gt;Jun 02 03:18:16 [IKEv1]: IKE Initiator unable to find policy: Intf inside,&lt;/P&gt;&lt;P&gt;Src: 192.168.56.1, Dst: 192.168.55.55&lt;/P&gt;&lt;P&gt;Jun 02 03:18:17 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi&lt;/P&gt;&lt;P&gt;0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody help me with this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 10:02:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978182#M419511</guid>
      <dc:creator>salexanov</dc:creator>
      <dc:date>2020-02-21T10:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978183#M419512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you post the ASA configuration or at least the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run crypto all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run tunnel-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jun 2008 13:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978183#M419512</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-03T13:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978184#M419513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Of course, yes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh run cry&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 match address VPN&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set peer x.x.x.55&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set transform-set ESP-AES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map VPN-MAP1 1 ipsec-isakmp dynamic DYN-VPN-MAP1&lt;/P&gt;&lt;P&gt;crypto map VPN-MAP1 interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp am-disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh run tun&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.55 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.55 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh access-l VPN&lt;/P&gt;&lt;P&gt;access-list VPN; 1 elements&lt;/P&gt;&lt;P&gt;access-list VPN line 1 extended permit ip 192.168.56.0 255.255.255.0 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And some ipsec related parts from ISR config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISR# sh run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 5007 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key KEY1 address x.x.x.56&lt;/P&gt;&lt;P&gt;crypto isakmp aggressive-mode disable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP1 1 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer x.x.x.56&lt;/P&gt;&lt;P&gt; set transform-set ESP-AES-MD5&lt;/P&gt;&lt;P&gt; match address VPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback10&lt;/P&gt;&lt;P&gt; ip address 10.10.10.10 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; description External-&amp;gt;ASA&lt;/P&gt;&lt;P&gt; ip address 82.x.x.55 255.255.255.192&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt; crypto map VPN_MAP1&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended VPN&lt;/P&gt;&lt;P&gt; permit ip 10.10.10.0 0.0.0.255 192.168.56.0 0.0.0.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jun 2008 13:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978184#M419513</guid>
      <dc:creator>salexanov</dc:creator>
      <dc:date>2008-06-03T13:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978185#M419514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try to remove the following four commands and then check:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800 &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000 &lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime seconds 28800 &lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime kilobytes 4608000 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jun 2008 14:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978185#M419514</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-03T14:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978186#M419515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I can, but i don't understand the target of &lt;/P&gt;&lt;P&gt;this action.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I execute statements from your post with 'no' it will not be any changes, because this predefined values in ASA software. &lt;/P&gt;&lt;P&gt;I've tryed to change this values to be equal to ISR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISR# sh cry ipsec security-association&lt;/P&gt;&lt;P&gt;Security association lifetime: 4608000 kilobytes/3600 seconds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh run cry | i ^crypto_.*_lifetime&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN-VPN-MAP1 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and nothing is happend:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC# ping -c 2 10.10.10.10&lt;/P&gt;&lt;P&gt;PING 10.10.10.10 (10.10.10.10) 56(84) bytes of data.&lt;/P&gt;&lt;P&gt;--- 10.10.10.10 ping statistics ---&lt;/P&gt;&lt;P&gt;2 packets transmitted, 0 received, 100% packet loss, time 999ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug from ASA:&lt;/P&gt;&lt;P&gt;Jun 03 07:19:28 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;Jun 03 07:19:29 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;/P&gt;&lt;P&gt;Jun 03 07:19:29 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;Jun 03 07:19:34 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;/P&gt;&lt;P&gt;Jun 03 07:19:34 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;Jun 03 07:19:35 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;/P&gt;&lt;P&gt;Jun 03 07:19:35 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: 192.168.56.1, Dst: 10.10.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jun 2008 14:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978186#M419515</guid>
      <dc:creator>salexanov</dc:creator>
      <dc:date>2008-06-03T14:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978187#M419516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, I just noticed you are using a dynamic map, may I ask the reason for that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think you can be the 'initiator' of a VPN session when using dynamic crypto maps, if you are putting the address of the remote peer, what benefit are you gaining by using the dynamic crypto map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jun 2008 16:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978187#M419516</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-03T16:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978188#M419517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You've absolutely was right about this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"I don't think you can be the 'initiator' of a VPN session when using dynamic crypto maps"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jun 2008 09:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978188#M419517</guid>
      <dc:creator>salexanov</dc:creator>
      <dc:date>2008-06-04T09:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: asa ipsec problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978189#M419518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its great to know your problem is solved now, I'm glad I could help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jun 2008 10:44:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-problem/m-p/978189#M419518</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-04T10:44:05Z</dc:date>
    </item>
  </channel>
</rss>

