<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA issue transferring traffic between IPSEC encryption domains  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871796#M491830</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It will place the VPN on the inside of the firewall, as the traffic attempts to leave you should see it in a debug or a capture if you wish to verify the connectivity. Work backwards, if you can get the first vpn running and the traffic becomes the address you want. Then build on teh second tunnel and your seatination policy nat. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Dec 2011 22:24:23 GMT</pubDate>
    <dc:creator>ju_mobile</dc:creator>
    <dc:date>2011-12-02T22:24:23Z</dc:date>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains using NAT - please help!</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871793#M491818</link>
      <description>&lt;P&gt;I have been fighting this for longer than I would want to admit.&amp;nbsp; So any help would be greatly appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically we need to connect a client via IPSEC to an ASA 5510 in Brazil and then using the same 5510 send that traffic source and destination NAT'd over another IPSEC tunnel that connects back to our data center in the US where the service the client needs is located.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why don't we just connect directly from the client device to the US you ask?&amp;nbsp; Good question, and it involves the typical politics and sales promises. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a sanitized diagram of what we are trying to accomplish with the relevant configlets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IPSEC tunnel from the client to the ASA 5510 in Brazil is up.&amp;nbsp; The IPSEC tunnel to between Brazil and US has not come up because I do not think the interesting traffic is making it there.&amp;nbsp; The best I can tell is that NATing does not work how I would expect when all the traffic stays on the same interface and comes from an IPSEC tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should note that we had no problem with the same setup when we did not have an IPSEC tunnel between the client and 5510.&amp;nbsp; We were able source and destination NAT outside to outside and send the new translated IP's through the Brazil-US tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance for any help!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871793#M491818</guid>
      <dc:creator>jamesdawk</dc:creator>
      <dc:date>2019-03-11T21:58:45Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871794#M491824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd look at your NAT statements. A vpn in will place them on the inside and if your are carrying out a translation then it would only need to be carried out once on the outbound. e.g:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A.A.A.A = A.A.A.A when on VPN the traffic leaving the 5510 will be translated to B.B.B.B.&lt;/P&gt;&lt;P&gt;However, if you have a distinct requirement to hide their address the NAT could be drawn as:&lt;/P&gt;&lt;P&gt;A.A.A.A=Z.Z.Z.Z when routed into VPN then Z.Z.Z.Z =B.B.B.B when routed out. In summary an:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(OUTSIDE,INSIDE) and a Policy (INSIDE,OUTSIDE)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;not sure about the legal obligations..FOMCL&lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" height="1" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 22:03:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871794#M491824</guid>
      <dc:creator>ju_mobile</dc:creator>
      <dc:date>2011-12-02T22:03:58Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871795#M491826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure I understand why the VPN would place the traffic on the inside.&amp;nbsp; I thought that the order of operations was for it to decrypt the traffic, perform NAT translation, routing (points back to the outside in this case), and there it would match the other IPSEC tunnel I have going back to the US.&amp;nbsp; In which case the traffic would never leave the outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 22:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871795#M491826</guid>
      <dc:creator>jamesdawk</dc:creator>
      <dc:date>2011-12-02T22:19:42Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871796#M491830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It will place the VPN on the inside of the firewall, as the traffic attempts to leave you should see it in a debug or a capture if you wish to verify the connectivity. Work backwards, if you can get the first vpn running and the traffic becomes the address you want. Then build on teh second tunnel and your seatination policy nat. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 22:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871796#M491830</guid>
      <dc:creator>ju_mobile</dc:creator>
      <dc:date>2011-12-02T22:24:23Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871797#M491835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem is that we never want the traffic to be decrypted and placed on the inside interface.&amp;nbsp; If that happens it will have no where to go to be routed back to the US.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically what we want to happen is this:&lt;/P&gt;&lt;P&gt;Inbound IPSEC traffic hits ASA -&amp;gt; decrypt -&amp;gt; destination NAT -&amp;gt; source NAT -&amp;gt; routing points to outside -&amp;gt; NAT'd IP's match BR-US IPSEC tunnel -&amp;gt; encrypt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 22:45:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871797#M491835</guid>
      <dc:creator>jamesdawk</dc:creator>
      <dc:date>2011-12-02T22:45:45Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871798#M491839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James, &lt;/P&gt;&lt;P&gt;I think you need a command "global(inside) 7 PAT_ADDRESS". &lt;/P&gt;&lt;P&gt;you will have make sure that your hairpin is working correctly. please read the following for more info :-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml#solution2"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml#solution2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, test it before make changes to production device ;-).&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 23:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871798#M491839</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-12-02T23:20:41Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871799#M491845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Manish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went ahead and tried that and it is still not working.&amp;nbsp; If you look at the diagram the inside interface should really never come in to the picture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I am almost positive that it has to do with the source NAT (global) not being applied and therefore not matching the second tunnel's (Brazil-US) encryption domain.&amp;nbsp; Just for testing I changed the static NAT to be (outside,inside), and tried the same global NAT on the inside interface to see what packets a capture would give me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It showed the destination address tranlated, but the source IP address to be the same.&amp;nbsp; I don't get why I could do all this on the outside interface when ther was not a client IPSEC tunnel originally.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 23:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871799#M491845</guid>
      <dc:creator>jamesdawk</dc:creator>
      <dc:date>2011-12-02T23:47:41Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871800#M491849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;James, &lt;/P&gt;&lt;P&gt;run a paket tracer on the outside interface of Br fw. &lt;/P&gt;&lt;P&gt;packet-tracer input outside icmp Client-source 0 0 US-site-dest detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets see where is it failing.&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Dec 2011 00:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871800#M491849</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-12-03T00:06:26Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871801#M491851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;refer to this if it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.networking-forum.com/blog/?p=1038"&gt;http://www.networking-forum.com/blog/?p=1038&lt;/A&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00804675ac.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00804675ac.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Dec 2011 02:29:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871801#M491851</guid>
      <dc:creator>ju_mobile</dc:creator>
      <dc:date>2011-12-03T02:29:46Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871802#M491854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have configured on a few occasions this type of "Hub VPN" with NAT, and you need to double check your " no-nat" back to the US side.&amp;nbsp; You do not want to "Double NAT" it into the US side VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2011 19:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871802#M491854</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-12-04T19:04:46Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871803#M491857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would this be an issue even if I don't have Nat control enabled?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2011 17:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871803#M491857</guid>
      <dc:creator>jamesdawk</dc:creator>
      <dc:date>2011-12-05T17:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA issue transferring traffic between IPSEC encryption doma</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871804#M491860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you are natting in one direction, then you are natting. You do not want to "double nat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2011 20:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871804#M491860</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-12-05T20:21:29Z</dc:date>
    </item>
    <item>
      <title>ASA issue transferring traffic between IPSEC encryption domains</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871805#M491862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a trace:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5510# packet-tracer input outside tcp 1.1.1.2 1025 2.2.2.2 6011&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (outside,outside) 2.2.2.2 10.3.3.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip outside host 10.3.3.3 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 2.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 766&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface outside&lt;/P&gt;&lt;P&gt;Untranslate 2.2.2.2/0 to 10.3.3.3/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group acl0 in interface outside&lt;/P&gt;&lt;P&gt;access-list acl0 extended permit tcp host 1.1.1.2 host 2.2.2.2 eq 6011&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (outside) 8 access-list Leawoodtest-Source-NAT outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip outside host 1.1.1.2 outside host 10.3.3.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 8 (10.2.2.2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (outside,outside) 2.2.2.2 10.3.3.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip outside host 10.3.3.3 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 2.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 766&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (outside,outside) 2.2.2.2 10.3.3.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip outside host 10.3.3.3 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 2.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 766&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: encrypt&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (ipsec-spoof) IPSEC Spoof detected&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2011 20:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871805#M491862</guid>
      <dc:creator>jamesdawk</dc:creator>
      <dc:date>2011-12-05T20:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA issue transferring traffic between IPSEC encryption doma</title>
      <link>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871806#M491864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Happily I have no experience of that tool,  I am old school, I use command line and debug.  I have no idea what version if iOS you are using, i use  8.2 and below.  On every VPN hub network I have configured, i have always used "no-nat" they have worked 100% for me every time.  I think in 8.3 and about it's now called "identity nat or double nat" either way you want a packets ip to remain the same, when a form is nat is being used, afaik.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please update this thread if you get it working without no-nat, if nat is the issue.  And You may have other config errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2011 21:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-issue-transferring-traffic-between-ipsec-encryption-domains/m-p/1871806#M491864</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-12-05T21:31:36Z</dc:date>
    </item>
  </channel>
</rss>

