<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Error Message : Drop-reason: (ipsec-spoof) IPSEC Spoof detected in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/error-message-drop-reason-ipsec-spoof-ipsec-spoof-detected/m-p/1919606#M456943</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding you are trying to emulate VPN/Encrypted traffic from the PIX firewalls outside interface and therefore the PIX drops the traffic (because its supposed to be encrypted traffic arriving on a VPN connection to the PIX)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are testing a L2L VPN connection on the PIX, do the test in the other direction. From IN -&amp;gt; OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should already bring the VPN tunnel up even though no actual traffic is generated to the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Apr 2012 06:19:39 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2012-04-18T06:19:39Z</dc:date>
    <item>
      <title>Error Message : Drop-reason: (ipsec-spoof) IPSEC Spoof detected</title>
      <link>https://community.cisco.com/t5/network-security/error-message-drop-reason-ipsec-spoof-ipsec-spoof-detected/m-p/1919605#M456942</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i run a Packet tracer in PIX, getting a below output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside_interface&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: mpls_interface&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Action: drop&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Drop-reason: (ipsec-spoof) IPSEC Spoof detected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me to fix this issue.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-message-drop-reason-ipsec-spoof-ipsec-spoof-detected/m-p/1919605#M456942</guid>
      <dc:creator>pcclonescisco</dc:creator>
      <dc:date>2019-03-11T22:55:07Z</dc:date>
    </item>
    <item>
      <title>Error Message : Drop-reason: (ipsec-spoof) IPSEC Spoof detected</title>
      <link>https://community.cisco.com/t5/network-security/error-message-drop-reason-ipsec-spoof-ipsec-spoof-detected/m-p/1919606#M456943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding you are trying to emulate VPN/Encrypted traffic from the PIX firewalls outside interface and therefore the PIX drops the traffic (because its supposed to be encrypted traffic arriving on a VPN connection to the PIX)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are testing a L2L VPN connection on the PIX, do the test in the other direction. From IN -&amp;gt; OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should already bring the VPN tunnel up even though no actual traffic is generated to the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2012 06:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/error-message-drop-reason-ipsec-spoof-ipsec-spoof-detected/m-p/1919606#M456943</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-18T06:19:39Z</dc:date>
    </item>
  </channel>
</rss>

