<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSec tunnel fail, phase one, please advise. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-fail-phase-one-please-advise/m-p/1822251#M492441</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmmm I can ping\rdp\whatever from the 192.168.254.0/24 (firebox) side of the tunnel into the 192.168.240.0/24(ASA) side, but not the other way around.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Nov 2011 17:37:58 GMT</pubDate>
    <dc:creator>William Gurling</dc:creator>
    <dc:date>2011-11-25T17:37:58Z</dc:date>
    <item>
      <title>IPSec tunnel fail, phase one, please advise.</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-fail-phase-one-please-advise/m-p/1822250#M492440</link>
      <description>&lt;P&gt;I am really new at this, so please forgive my ignorace. I've configured, to the best of my ability, a tunnel between my asa5505 and a firebox X using this guide, I had to feel my way through it since the ASDM in the guide is an older version:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.watchguard.com/help/docs/edge/10/en-us/content/en-us/bovpn/manual/manual_bovpn_edge_cisco.html" target="_blank"&gt;http://www.watchguard.com/help/docs/edge/10/en-us/content/en-us/bovpn/manual/manual_bovpn_edge_cisco.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I attempt to bring the tunnel up using Ping Inside on the ASA to one of the machines on the watchguard subnet I get the following error messages, even though the ping states 100% success. I cannot ping, rdp or anything out from any of the hosts on my 192.168.240.0/24 network to the 192.168.254.0/24 network whatseover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone point me in the right direction?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1 DECODE]: IP = 204.116.253.76, IKE Responder starting QM: msg id = 108a9682&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1]: Group = 204.116.253.76, IP = 204.116.253.76, Received encrypted Oakley Quick Mode packet with invalid payloads, MessID = 277517954&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1 DEBUG]: Group = 204.116.253.76, IP = 204.116.253.76, sending notify message&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1 DEBUG]: Group = 204.116.253.76, IP = 204.116.253.76, Can't send p2 'Payload malformed' notify message: no SPIs (msg id 108a9682)!&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1]: Group = 204.116.253.76, IP = 204.116.253.76, QM FSM error (P2 struct &amp;amp;0xc9d588b0, mess id 0x108a9682)!&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1 DEBUG]: Group = 204.116.253.76, IP = 204.116.253.76, IKE QM Responder FSM error history (struct &amp;amp;0xc9d588b0)&amp;nbsp; &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;:&amp;nbsp; QM_DONE, EV_ERROR--&amp;gt;QM_BLD_MSG2, EV_VALIDATE_FAIL--&amp;gt;QM_BLD_MSG2, EV_VALIDATE_MSG--&amp;gt;QM_BLD_MSG2, EV_DECRYPT_OK--&amp;gt;QM_BLD_MSG2, NullEvent--&amp;gt;QM_BLD_MSG2, EV_DECRYPT_MSG--&amp;gt;QM_BLD_MSG2, EV_INIT_RESPONDER--&amp;gt;QM_START, EV_RCV_MSG&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1 DEBUG]: Group = 204.116.253.76, IP = 204.116.253.76, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;Nov 25 11:49:54 [IKEv1]: Group = 204.116.253.76, IP = 204.116.253.76, Removing peer from correlator table failed, no match!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-fail-phase-one-please-advise/m-p/1822250#M492440</guid>
      <dc:creator>William Gurling</dc:creator>
      <dc:date>2019-03-11T21:55:15Z</dc:date>
    </item>
    <item>
      <title>IPSec tunnel fail, phase one, please advise.</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-fail-phase-one-please-advise/m-p/1822251#M492441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmmm I can ping\rdp\whatever from the 192.168.254.0/24 (firebox) side of the tunnel into the 192.168.240.0/24(ASA) side, but not the other way around.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 17:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-fail-phase-one-please-advise/m-p/1822251#M492441</guid>
      <dc:creator>William Gurling</dc:creator>
      <dc:date>2011-11-25T17:37:58Z</dc:date>
    </item>
    <item>
      <title>IPSec tunnel fail, phase one, please advise.</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-fail-phase-one-please-advise/m-p/1822252#M492442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;verify your crypto ACLs are mirrored on both tunnel endpoints.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 21:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-fail-phase-one-please-advise/m-p/1822252#M492442</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-25T21:40:28Z</dc:date>
    </item>
  </channel>
</rss>

