<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Weird One Way VPN tunnel issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815522#M456525</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is that what you are looking for? THANKS!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;Site A HQ ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 match address outside_cryptomap_2&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set peer (Site B ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set reverse-route&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 5 match address outside_cryptomap_3&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 5 set peer (Site C ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 5 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;Site B Branch ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 set peer (Site A ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 set reverse-route&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 match address outside_cryptomap&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set peer (Site C ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set reverse-route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;Site C Branch ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 match address outside_cryptomap&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 set peer (Site A ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 set reverse-route&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 match address outside_cryptomap_1&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 set peer (Site B ISP IP)&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 set reverse-route&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Jan 2012 22:32:38 GMT</pubDate>
    <dc:creator>IT Dept</dc:creator>
    <dc:date>2012-01-18T22:32:38Z</dc:date>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815516#M456519</link>
      <description>&lt;P&gt;Site A ASA5550 with vlan1, vlan2, and vlan3 &amp;lt;~~ Headquarter&lt;/P&gt;&lt;P&gt;Site B ASA5510 with vlan1&lt;/P&gt;&lt;P&gt;Site C ASA5505 with vlan1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A is a HQ and we have Site-to-Site VPN set for all sites with IPsec IKEv1 IPsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A &amp;lt;--&amp;gt; Site B&lt;/P&gt;&lt;P&gt;Site A &amp;lt;--&amp;gt; Site C&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem is on Site A HQ to Site B. For some reason VPN tunnel only establishes in one direction Site B to Site A but not Site A to Site B. When I logout the Site-to-Site VPN for Site A &amp;lt;-&amp;gt; Site B, there is no way for Site A to ping or connect to any server to Site B unless Site B ping or establish connections to Site A first, then Site A can ping or connect to Site B afterwards. The get around right now is I will need to ask someone from SIte B to ping Site A vlan1, vlan2, and vlan3 so that I can connect from Site A to Site B. All ASA is on the latest 8.4(3) version. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A &amp;lt;~&amp;gt; Site C works perfect fine without any probelm!! When I logout the Site-to-Site VPN for Site A &amp;lt;~&amp;gt; SIte C, the VPN tunnel established right away from either Site A to Site C or Site C to Site A. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion on what should I look for before posting any configurations? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance. &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815516#M456519</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2019-03-11T22:16:16Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815517#M456520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First, please check whether you have a static route pushing site B traffic toward to default gateway on Site "A " ASA5550.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if that does not help, please copy your config on the forum for easy of trouble shooting from ASA5550.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815517#M456520</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-01-18T20:10:01Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815518#M456521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check the crypto ACL configuration on both sides and paste it in here so we can take a look at it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815518#M456521</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T20:13:49Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815519#M456522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for your quick reply rizwanr74! Yes we do have static routes setup on Site A ASA5550 and both Site B and Site C outside interface are there with Site A Gateway IP on it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 21:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815519#M456522</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-18T21:14:12Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815520#M456523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply Julio. What command should I type in to show just the cryptop ACL configuration? I'm doing my best to show just the information you guys are looking for instead of the whole configuration file.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 21:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815520#M456523</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-18T21:27:04Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815521#M456524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under the crypto maps, you will see a match x.x.x.x ( where the x.x.x is the ACL that we are looking for)&lt;/P&gt;&lt;P&gt;We need both sites ACL (Branch and Site C)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 21:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815521#M456524</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T21:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815522#M456525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is that what you are looking for? THANKS!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;Site A HQ ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 match address outside_cryptomap_2&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set peer (Site B ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set reverse-route&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 5 match address outside_cryptomap_3&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 5 set peer (Site C ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 5 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;Site B Branch ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 set peer (Site A ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 1 set reverse-route&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 match address outside_cryptomap&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set peer (Site C ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map 3 set reverse-route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;&lt;STRONG&gt;Site C Branch ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 match address outside_cryptomap&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 set peer (Site A ISP IP) &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 1 set reverse-route&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 match address outside_cryptomap_1&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 set peer (Site B ISP IP)&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;crypto map outside_map0 2 set reverse-route&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 22:32:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815522#M456525</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-18T22:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815523#M456527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now on the ASA on Site A, please get the following&lt;/P&gt;&lt;P&gt;show run access-list outside_cryptomap_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now on the ASA on Site B, please get the following&lt;/P&gt;&lt;P&gt;show run access-list address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 23:06:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815523#M456527</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T23:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815524#M456528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Site A HQ ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;show run access-list outside_cryptomap_2&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_2 extended permit ip object-group DM_INLINE_NETWORK_11 object-group DM_INLINE_NETWORK_12 &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site B Branch ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;show run access-list outside_1_cryptomap&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip object-group DM_INLINE_NETWORK_3 object-group SiteA-Network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thank You!!&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 23:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815524#M456528</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-18T23:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815525#M456530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello IT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA HQ Site A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Site A HQ ASA&lt;/P&gt;&lt;P&gt;Can you look for the configuration of this Object group DM_INLINE_NETWORK_12, Is this the network on the other site ( Site B) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 23:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815525#M456530</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T23:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815526#M456531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DM_INLINE_NETWORK_12 is only exited on Site A HQ ASA under outside_cryptomap_2&lt;/P&gt;&lt;P&gt;Source: Site A vlan1, Site A vlan2, Site A vlan3&lt;/P&gt;&lt;P&gt;Destination: Site B Network&lt;/P&gt;&lt;P&gt;Service: IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see any DM_INLINE_NETWORK_12 under Site B ASA. I believed DM_INLINE_NETWORK_12 was created automatically by using the ASDM wizard (some one else created long ago) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 00:22:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815526#M456531</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-19T00:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815527#M456532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Site A: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp x.x.x.x (Host ip on vlan A&amp;nbsp; site A) 1025 x.x.x.x (Host on other site of the tunnel-SiteB) 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 00:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815527#M456532</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-19T00:51:36Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815528#M456533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Site A HQ ASA:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp x.x.x.x (VLAN1 IP on Site A) 1025 x.x.x.x (Host IP on Site B) 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 1&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Implicit Rule&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 2&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: input&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;in&amp;nbsp;&amp;nbsp; SiteB-network 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 3&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 4&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: FILTER&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: filter-ftp&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 5&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: FILTER&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: filter-url&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 6&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 7&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: NAT&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;nat (inside,outside) source static DM_INLINE_NETWORK_8 DM_INLINE_NETWORK_8&amp;nbsp;&amp;nbsp; destination static DM_INLINE_NETWORK_10 DM_INLINE_NETWORK_10&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Static translate x.x.x.x (VLAN1 IP Address)/1025 to x.x.x.x (VLAN1 IP Address)/1025&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 8&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: VPN&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: encrypt&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 9&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: VPN&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 10&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Phase: 11&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Subtype: &lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result: ALLOW&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Config:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Additional Information:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;New flow created with id 644050669, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Result:&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;input-interface: inside&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;input-status: up&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;input-line-status: up&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;output-interface: outside&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;output-status: up&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;output-line-status: up&lt;/P&gt;&lt;P style="margin-bottom: 0pt;"&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 01:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815528#M456533</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-19T01:06:09Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815529#M456534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the packet tracer we can see is hitting a static rule, thing that should not happen!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we see the show run static, show run nat, sh run global.. And the ACLs for the nat 0( you will see a nat statement with an ID of 0 holding an ACL, I would like to see that acl-Show run acl xxxx (name)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 02:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815529#M456534</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-19T02:25:04Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815530#M456535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tired show run-config static and show run-config global but both doesn't work... not sure why... I did not see any NAT 0 on my configure file or what exact command do I need to type in to find out? Please see below for everything I found related to NAT and ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all of your help!&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site A ASA show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static DM_INLINE_NETWORK_8 DM_INLINE_NETWORK_8&amp;nbsp;&amp;nbsp; destination static DM_INLINE_NETWORK_10 DM_INLINE_NETWORK_10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-network&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic outside-defaultnat&amp;nbsp; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_3 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_8 object-group DM_INLINE_NETWORK_10 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_2 extended permit ip object-group DM_INLINE_NETWORK_11 object-group DM_INLINE_NETWORK_12 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 17:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815530#M456535</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-19T17:55:38Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815531#M456537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the nat is properly configured, can you check the show run route?&lt;/P&gt;&lt;P&gt;There got a be a route going to the DM_INLINE_NETWORK_10 going to the outside ( it my be a route outside 0.0.0.0 0.0.0.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 18:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815531#M456537</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-19T18:26:34Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815532#M456540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site A ASA show run route&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;route inside inside-network 255.255.252.0 10.255.255.254 1&lt;/P&gt;&lt;P&gt;route inside x.x.x.x (VLAN 1 IP) 255.255.0.0 10.255.255.254 1&lt;/P&gt;&lt;P&gt;route inside x.x.x.x (VLAN 2 IP) 255.255.0.0 10.255.255.254 1&lt;/P&gt;&lt;P&gt;route inside x.x.x.x (VLAN 3 IP) 255.255.0.0 10.255.255.254 1&lt;/P&gt;&lt;P&gt;route outside Site B-network 255.255.0.0 x.x.x.x 1 (Site A Host)&lt;/P&gt;&lt;P&gt;route outside Site C-network 255.255.0.0 x.x.x.x 1 (Site A Host)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's the thing I don't understand.. Site C network got similar setting as Site B on Site A ASA and it is working fine... =(&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 18:46:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815532#M456540</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-19T18:46:30Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815533#M456542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I understand what you mean. Can you check the transform-set used on the Site A with the Site B transform set?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 18:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815533#M456542</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-19T18:55:11Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815534#M456545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What command do you want me to type in to check on the transform set?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thants the thing.. I don't think the probelm is on the site-to-site VPN settings because the tunnel works fine as long as Site B established the connections first by Pinging/connectiong to anything from Site A. Site B and Site C are using the same Site to site VPN Group Policy on Site A ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 19:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815534#M456545</guid>
      <dc:creator>IT Dept</dc:creator>
      <dc:date>2012-01-19T19:21:47Z</dc:date>
    </item>
    <item>
      <title>Weird One Way VPN tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815535#M456547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello IT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct, but the thing is the packet tracer shows that everything is working fine on this site (A). So my next question would be:&lt;/P&gt;&lt;P&gt;Is site B receiving the traffic?&lt;/P&gt;&lt;P&gt;For that you can do a capture from one host on site A to one host on site B&lt;/P&gt;&lt;P&gt;access-list test permit ip host_A_ip host_b_ip &lt;/P&gt;&lt;P&gt;access-list test permit ip host_b_ip&amp;nbsp; host_A_ip &lt;/P&gt;&lt;P&gt;capture capin access-list test interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should do this configuration on both ASAS.&lt;/P&gt;&lt;P&gt;Then do a Show cap capin on both ASAs, and provide the output.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 21:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-one-way-vpn-tunnel-issue/m-p/1815535#M456547</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-19T21:21:34Z</dc:date>
    </item>
  </channel>
</rss>

