<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic-Static IPSEC between the ASA &amp; Router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871722#M456622</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now even though the ping is stopped, the phase I and phase II are complete but still the traffic does'nt pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt; &lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jan 2012 19:32:09 GMT</pubDate>
    <dc:creator>jack samuel</dc:creator>
    <dc:date>2012-01-17T19:32:09Z</dc:date>
    <item>
      <title>Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871715#M456609</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Core-HQ--------------------ASA-------------ISP---------Branch- Router&lt;/P&gt;&lt;P&gt;192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a query regarding the interesting traffic of VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our&amp;nbsp; ASA is on static public IP and the branch router is on dynamic ADSL , when i specify the interesting traffic on ASA&amp;nbsp; i.e&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list abc extended permit ip 192.168.0.0 255.255.0.0 any ----------- &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;it works the tunnel is up when Branch router initiates a ping to 192.168.0.0 network in HQ&amp;nbsp; but when i change the access-list to&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list abc extended permit ip 192.168.0.0 255.255.0.0 172.16.0.0 255.255.0.0 ---------&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;it does'nt works,&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the Capture output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tx&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871715#M456609</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2019-03-11T22:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871716#M456611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is normal.  See the below URL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 07:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871716#M456611</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-17T07:54:15Z</dc:date>
    </item>
    <item>
      <title>Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871717#M456613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the above document, This means interesting traffic should be permited from HQ to anywhere????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;, IF suppose i would have 2 branches with VPN and i want to allow the HQ user A to allow access the branch A and not to Branch B. &lt;/LI&gt;&lt;LI&gt;If suppose i have a user B in HQ&amp;nbsp; and i want to allow him to access the Brach B only &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so in this situation what can be done.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 08:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871717#M456613</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-17T08:08:39Z</dc:date>
    </item>
    <item>
      <title>Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871718#M456617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you change the interesting traffic ACL on the ASA you should do the same on the remote Router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g ASA &lt;/P&gt;&lt;P&gt;access-list abc extended permit ip 192.168.0.0 255.255.0.0 172.16.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;Remote Router&lt;/P&gt;&lt;P&gt;access-list abc extended permit ip 172.16.0.0 255.255.0.0 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rememeber to put this line on your NO-NAT ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using crypto maps or VTI on the router? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 08:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871718#M456617</guid>
      <dc:creator>EliasTlou</dc:creator>
      <dc:date>2012-01-17T08:57:54Z</dc:date>
    </item>
    <item>
      <title>Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871719#M456619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Elias&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done the above b4 but it does'nt work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 11:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871719#M456619</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-17T11:52:05Z</dc:date>
    </item>
    <item>
      <title>Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871720#M456620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After changinig your interesting traffic ACLs, did you clear the crypto SAs and IPSEC SAs and allowed the tunnel to re-establish with the new settings?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, what is the debug saying?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. debug crypto isakmp 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the bebug carefully and see why the tunnel fails to establish. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 12:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871720#M456620</guid>
      <dc:creator>EliasTlou</dc:creator>
      <dc:date>2012-01-17T12:00:08Z</dc:date>
    </item>
    <item>
      <title>Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871721#M456621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should post both end configuration. Also after changing these ACL you should do some crypto debug on router to collect the logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 12:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871721#M456621</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-17T12:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871722#M456622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now even though the ping is stopped, the phase I and phase II are complete but still the traffic does'nt pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt; &lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 19:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871722#M456622</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-17T19:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871723#M456623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check your interface access-lists (even though I doubt this could be an issue because the traffic went through the first time), try to inspect icmp, run the captures on the inside interface to see if the traffic gets back, check if sysopt connection permit-VPN is running. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 19:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871723#M456623</guid>
      <dc:creator>EliasTlou</dc:creator>
      <dc:date>2012-01-17T19:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871724#M456624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(even though I doubt this could be an issue because the traffic went through the first time), By watching which line&amp;nbsp; u say this??? Can u highlight the line in my logs please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Not related to the vpn problem above in general i m asking what these below&amp;nbsp; logs says:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP: DPD received KMI message.&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP: IPSec requested DPD; SA state 0x0 or SA is null. Reinitiating phase 1.&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP: Locking peer struct 0x47092658, refcount 1 for DPD/create new SA&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP: local port 500, remote port 500&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: insert sa successfully sa = 4751DE0C&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0):found peer pre-shared key matching 192.168.20.1&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0): Unknown DOI 0&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0): constructed NAT-T vendor-07 ID&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0): constructed NAT-T vendor-03 ID&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0): constructed NAT-T vendor-02 ID&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0):Old State = IKE_READY&amp;nbsp; New State = IKE_I_MM1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.351: ISAKMP:(0): sending packet to 192.168.20.1 my_port 500 peer_port 500 (I) MM_NO_STATE&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.355: ISAKMP (0:0): received packet from 192.168.20.1 dport 500 sport 500 Global (I) MM_NO_STATE&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.355: ISAKMP:(0):Notify has no hash. Rejected.&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.355: ISAKMP (0:0): Unknown Input IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY:&amp;nbsp; state = IKE_I_MM1&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.355: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.355: ISAKMP:(0):Old State = IKE_I_MM1&amp;nbsp; New State = IKE_I_MM1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Jan 18 14:24:34.355: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Informational mode failed with peer at 192.168.20.1....&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 20:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871724#M456624</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-17T20:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871725#M456625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now i changed the access-list according to the mirror of router still it doesnt work&amp;nbsp; it gives me the below error.in the debug of ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Session is being torn down. Reason: crypto map policy not found&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 21:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871725#M456625</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-17T21:51:51Z</dc:date>
    </item>
    <item>
      <title>Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871726#M456626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Post your router config as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 22:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871726#M456626</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-17T22:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic-Static IPSEC between the ASA &amp; Router</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871727#M456629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have mirrored the traffic and it worked. fine &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks all who contribute to give suggestions, i wll rate to all of your'll.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 22:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-static-ipsec-between-the-asa-router/m-p/1871727#M456629</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-01-17T22:10:56Z</dc:date>
    </item>
  </channel>
</rss>

