<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ipsec spoofing VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830666#M459294</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you do connect to the ASA via the remote IPsec client, but you cannot ping the host behind the ASA.&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;This looks good&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;group-policy vpn-impact internal&lt;BR /&gt;group-policy vpn-impact attributes&lt;BR /&gt;vpn-tunnel-protocol IPSec &lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value vpn-impact_splitTunnelAcl&lt;BR /&gt;default-domain value impactdetail&lt;BR /&gt;nac enable&lt;BR /&gt;address-pools value ImpactVPN&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;BR /&gt;vpn-group-policy vpn-impact&lt;BR /&gt;tunnel-group vpn-impact type ipsec-ra&lt;BR /&gt;tunnel-group vpn-impact general-attributes&lt;BR /&gt;address-pool ImpactVPN&lt;BR /&gt;default-group-policy vpn-impact&lt;BR /&gt;tunnel-group vpn-impact ipsec-attributes&lt;BR /&gt;pre-shared-key Impvpn0102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets talk about the No_nat&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.0.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.2 192.168.0.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;Please remove them with&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;clear configure access-list inside_nat0_outbound &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and then create :&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give it a try and let me know!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 18 Feb 2012 03:57:15 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-02-18T03:57:15Z</dc:date>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830656#M459284</link>
      <description>&lt;P&gt;Got no errors in the logs but when I try in packet tracer, I get IPSec Spoofing error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From 192.168.0.10 to 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;: Written by enable_15 at 13:18:17.890 UTC Thu Feb 16 2012&lt;BR /&gt;!&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;?????????????&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;access-list vpn-impact_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.0.0 255.255.255.192 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.2 192.168.0.0 255.255.255.192 &lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq smtp &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any any eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 3389 &lt;BR /&gt;access-list outside_access_in extended permit ip 192.168.0.0 255.255.255.192 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP any any &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.192 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.192 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool ImpactVPN 192.168.0.10-192.168.0.40 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface smtp 192.168.1.2 smtp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface www 192.168.1.2 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface https 192.168.1.2 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.2 3389 netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.1.2&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;BR /&gt;dhcpd dns 192.168.1.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;banner none&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server none&lt;BR /&gt;dhcp-network-scope none&lt;BR /&gt;vpn-access-hours none&lt;BR /&gt;vpn-simultaneous-logins 3&lt;BR /&gt;vpn-idle-timeout 30&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-filter none&lt;BR /&gt;vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;BR /&gt;password-storage disable&lt;BR /&gt;ip-comp disable&lt;BR /&gt;re-xauth disable&lt;BR /&gt;group-lock none&lt;BR /&gt;pfs disable&lt;BR /&gt;ipsec-udp disable&lt;BR /&gt;ipsec-udp-port 10000&lt;BR /&gt;split-tunnel-policy tunnelall&lt;BR /&gt;split-tunnel-network-list none&lt;BR /&gt;default-domain none&lt;BR /&gt;split-dns none&lt;BR /&gt;intercept-dhcp 255.255.255.255 disable&lt;BR /&gt;secure-unit-authentication disable&lt;BR /&gt;user-authentication disable&lt;BR /&gt;user-authentication-idle-timeout 30&lt;BR /&gt;ip-phone-bypass disable&lt;BR /&gt;leap-bypass disable&lt;BR /&gt;nem disable&lt;BR /&gt;backup-servers keep-client-config&lt;BR /&gt;msie-proxy server none&lt;BR /&gt;msie-proxy method no-modify&lt;BR /&gt;msie-proxy except-list none&lt;BR /&gt;msie-proxy local-bypass disable&lt;BR /&gt;nac enable&lt;BR /&gt;nac-sq-period 300&lt;BR /&gt;nac-reval-period 36000&lt;BR /&gt;nac-default-acl none&lt;BR /&gt;address-pools none&lt;BR /&gt;smartcard-removal-disconnect enable&lt;BR /&gt;client-firewall none&lt;BR /&gt;client-access-rule none&lt;BR /&gt;webvpn&lt;BR /&gt;functions url-entry&lt;BR /&gt;html-content-filter none&lt;BR /&gt;homepage none&lt;BR /&gt;keep-alive-ignore 4&lt;BR /&gt;http-comp gzip&lt;BR /&gt;filter none&lt;BR /&gt;url-list none&lt;BR /&gt;customization value DfltCustomization&lt;BR /&gt;port-forward none&lt;BR /&gt;port-forward-name value Application Access&lt;BR /&gt;sso-server none&lt;BR /&gt;deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information&lt;BR /&gt;svc none&lt;BR /&gt;svc keep-installer installed&lt;BR /&gt;svc keepalive none&lt;BR /&gt;svc rekey time none&lt;BR /&gt;svc rekey method none&lt;BR /&gt;svc dpd-interval client none&lt;BR /&gt;svc dpd-interval gateway none&lt;BR /&gt;svc compression deflate&lt;BR /&gt;group-policy vpn-impact internal&lt;BR /&gt;group-policy vpn-impact attributes&lt;BR /&gt;vpn-tunnel-protocol IPSec &lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value vpn-impact_splitTunnelAcl&lt;BR /&gt;default-domain value impactdetail&lt;BR /&gt;nac enable&lt;BR /&gt;address-pools value ImpactVPN&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;vpn-group-policy vpn-impact&lt;BR /&gt;tunnel-group vpn-impact type ipsec-ra&lt;BR /&gt;tunnel-group vpn-impact general-attributes&lt;BR /&gt;address-pool ImpactVPN&lt;BR /&gt;default-group-policy vpn-impact&lt;BR /&gt;tunnel-group vpn-impact ipsec-attributes&lt;BR /&gt;pre-shared-key Impvpn0102&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map &lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect esmtp &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:aae550a99445ddf6003f295946219f59&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:30:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830656#M459284</guid>
      <dc:creator>Jean-Francois Gagnon</dc:creator>
      <dc:date>2019-03-11T22:30:46Z</dc:date>
    </item>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830657#M459285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't spoof IPSec traffic.&amp;nbsp; You will always see the 'Ipsec spoof detected' from packet tracer because the ASA sees unencrypted traffic on an interface on which it should be encrypted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 16:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830657#M459285</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2012-02-16T16:01:46Z</dc:date>
    </item>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830658#M459286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can't edit my last post from my iPhone.&amp;nbsp; What I meant to say is that you cannot mimic IPSec traffic with packet tracer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 16:03:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830658#M459286</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2012-02-16T16:03:57Z</dc:date>
    </item>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830659#M459287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; But my pings does not pass... and I get no errors in the logs...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 16:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830659#M459287</guid>
      <dc:creator>Jean-Francois Gagnon</dc:creator>
      <dc:date>2012-02-16T16:11:32Z</dc:date>
    </item>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830660#M459288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Still no errors in logs, no Windows firewall are On, pings does not pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 16:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830660#M459288</guid>
      <dc:creator>Jean-Francois Gagnon</dc:creator>
      <dc:date>2012-02-16T16:33:54Z</dc:date>
    </item>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830661#M459289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On packet tracer, are you doing in it from the outside, if you do it packet-tracer input&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt; inside&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; you will get that ip-sec spoof error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 17:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830661#M459289</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-16T17:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830662#M459290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doing it with the outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone look at the config and tell me why the pings are blocked with no errors in the log ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 17:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830662#M459290</guid>
      <dc:creator>Jean-Francois Gagnon</dc:creator>
      <dc:date>2012-02-16T17:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830663#M459291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ups! I said it backwards, its packet-tracer input inside ( that is the one should work)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 17:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830663#M459291</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-16T17:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830664#M459292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you ping from the client workstation, do you see decaps on the phase 2 SA for that host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was sysopt connection permit-vpn disabled?&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 19:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830664#M459292</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2012-02-16T19:10:50Z</dc:date>
    </item>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830665#M459293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Where can I see that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping, The syslog tells me that the packets were created and then destroyed, like there were no problems&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 21:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830665#M459293</guid>
      <dc:creator>Jean-Francois Gagnon</dc:creator>
      <dc:date>2012-02-16T21:15:17Z</dc:date>
    </item>
    <item>
      <title>ipsec spoofing VPN</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830666#M459294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you do connect to the ASA via the remote IPsec client, but you cannot ping the host behind the ASA.&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;This looks good&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;group-policy vpn-impact internal&lt;BR /&gt;group-policy vpn-impact attributes&lt;BR /&gt;vpn-tunnel-protocol IPSec &lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value vpn-impact_splitTunnelAcl&lt;BR /&gt;default-domain value impactdetail&lt;BR /&gt;nac enable&lt;BR /&gt;address-pools value ImpactVPN&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;BR /&gt;vpn-group-policy vpn-impact&lt;BR /&gt;tunnel-group vpn-impact type ipsec-ra&lt;BR /&gt;tunnel-group vpn-impact general-attributes&lt;BR /&gt;address-pool ImpactVPN&lt;BR /&gt;default-group-policy vpn-impact&lt;BR /&gt;tunnel-group vpn-impact ipsec-attributes&lt;BR /&gt;pre-shared-key Impvpn0102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets talk about the No_nat&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.0.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.2 192.168.0.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;Please remove them with&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;clear configure access-list inside_nat0_outbound &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and then create :&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give it a try and let me know!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 03:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-spoofing-vpn/m-p/1830666#M459294</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-18T03:57:15Z</dc:date>
    </item>
  </channel>
</rss>

