<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic vpn traffic &amp; fields in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957640#M435008</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks for the update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 17 Jun 2012 03:59:14 GMT</pubDate>
    <dc:creator>secureIT</dc:creator>
    <dc:date>2012-06-17T03:59:14Z</dc:date>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957628#M434990</link>
      <description>&lt;P&gt;Hi Netpro Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please answer the queries...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Query1 :- May i know what are the fields get attached to, while a vpn traffic is passing through a tunnel....&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Query2 :- which is the mechanism used to calculate the number of ACLs in asa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Query3 :- Difference between router and firewall ACL..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards()&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957628#M434990</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2019-03-11T23:15:04Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957629#M434996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Query 1: do you mean which protocol and ports is VPN traffic? I assume that you mean IPSec VPN, so they are normally UDP/500, UDP/4500, ESP, and/or AH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Query 2: the number of lines in the output of "show access-list", which includes the expansion of ACL if object-group is created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Query 3: cisco router uses wild card mask while cisco firewall uses netmask. Router ACL is stateless, while Firewall ACL is stateful, which means you only need to configure ACL in one direction, ie: where the traffic is initiated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that answers your questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 12:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957629#M434996</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-04T12:50:51Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957630#M434998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was looking for the answer - Router ACL is stateless, while Firewall ACL is stateful !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the first query, please confirm if the below would suit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ipheader] + [AH-ESP] + [Payload]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; where ipheader = ip.src + ip.srcport + ip.dst + ip.dstport&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the traffic flow of an ipsec traffic would be as given below ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;reciev-pkt -&amp;gt; ingress interface -&amp;gt; received pkt-&amp;gt; check conn table -&amp;gt; check xlate-&amp;gt;check acl-&amp;gt; vpn-crypto-match -&amp;gt; check inpsect-csc-&amp;gt;check nat-ip-header-&amp;gt;check ips-&amp;gt;egress interface-&amp;gt;check routing-&amp;gt;check L2-addr -&amp;gt; transmit packet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 12:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957630#M434998</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2012-06-05T12:40:51Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957631#M434999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;[ipheader] only includes ip.src + ip.dst as IP doesn't have ports &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a doc on AH and ESP packet for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2"&gt;http://www.cisco.com/en/US/partner/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a packet flow through ASA firewall:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 13:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957631#M434999</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-05T13:54:13Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957632#M435000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; ooops sorry..i knew. ip header will have only ip and tcp header has ports..sorry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below link is not working..for ah/esp&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2"&gt;http://www.cisco.com/en/US/partner/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 13:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957632#M435000</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2012-06-05T13:57:58Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957633#M435001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2"&gt;http://www.cisco.com/en/US/customer/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 14:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957633#M435001</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-05T14:20:54Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957634#M435002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry, it does not open, it gives Forbidden File or Application..&lt;/P&gt;&lt;P&gt;could you pls download the same and share...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 16:48:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957634#M435002</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2012-06-05T16:48:42Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957635#M435003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls try to close your browser, or try with another browser as that URL is public and you should be able to access it:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/customer/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2" rel="nofollow"&gt;http://www.cisco.com/en/US/customer/tech/tk543/tk757/technologies_tech_note09186a00800b3d15.shtml#t2&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2012 01:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957635#M435003</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-06T01:36:43Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957636#M435004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you please tell me, what are the field get attached to the ipheader, when the ipsec traffic is going thru a GRE tunnel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2012 13:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957636#M435004</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2012-06-07T13:28:29Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957637#M435005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For GRE over IPSec, it would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ipheader] + [ESP] + [GRE] + [Payload]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 01:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957637#M435005</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-08T01:01:28Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957638#M435006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the update...&lt;/P&gt;&lt;P&gt;if we talk more specifically, for example, there is a gre tunnel with the peers, 172.16.1.1-2 and the two networks in both ends are 10.10.1.0/24 and 10.10.2.0/24 with ospf running.. Then what are all the fields get added in here if we go in deep...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 03:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957638#M435006</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2012-06-17T03:51:43Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957639#M435007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With GRE tunnels, it would be:&lt;/P&gt;&lt;P&gt;[GRE: source: 172.16.1.1 destination: 172.16.1.2] + [Payload: source: 10.10.1.0/24 + destination: 10.10.2.0/24]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic will be routed through the GRE tunnel, and at the remote GRE tunnel interface will strip off the GRE header, and will be routed towards the destination subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 03:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957639#M435007</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-17T03:57:14Z</dc:date>
    </item>
    <item>
      <title>vpn traffic &amp; fields</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957640#M435008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks for the update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 03:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-fields/m-p/1957640#M435008</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2012-06-17T03:59:14Z</dc:date>
    </item>
  </channel>
</rss>

