<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921845#M5594</link>
    <description>&lt;P&gt;Ok, thank you again. I have a suspicion that the static NAT port forwarding statements on the edge routers aren't working. I will try with a different router instance this evening.&lt;/P&gt;</description>
    <pubDate>Tue, 10 Sep 2019 15:06:49 GMT</pubDate>
    <dc:creator>mrjdh</dc:creator>
    <dc:date>2019-09-10T15:06:49Z</dc:date>
    <item>
      <title>Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3920865#M5573</link>
      <description>&lt;P&gt;I don't give up and I hate asking for help. But, I've spent enough hours now trying to work out why I can't get the below to work. Just learning about the ASA, and trying to establish an IKEv2 IPSec VPN between the two host computers. R1 and R4 are exchanging routes over BGP (2 other routers not shown in image). Trying to bring the tunnel up with a ping.&lt;/P&gt;&lt;P&gt;Please could someone take a look and let me know what I'm doing wrong? I'd be very grateful of the help.&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASA behind NAT.PNG" style="width: 782px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/44490i64175616E761BC6F/image-dimensions/782x320?v=v2" width="782" height="320" role="button" title="ASA behind NAT.PNG" alt="ASA behind NAT.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;R1 Config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;============================&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip nat source static udp 10.0.0.1 500 interface GigabitEthernet3/0 500&lt;BR /&gt;ip nat source static udp 10.0.0.1 4500 interface GigabitEthernet3/0 4500&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet3/0 overload&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.1.0 255.255.255.0 10.0.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA on left of image&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;============================&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.30.10 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list INTERNAL_TO_VPN extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list INTERNAL_TO_VPN extended permit icmp 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list ALLOWVPN extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list ALLOWVPN extended permit icmp 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list ALLOWVPN extended permit udp any any eq isakmp&lt;BR /&gt;access-list ALLOWVPN extended permit udp any any eq 4500&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;access-group ALLOWVPN in interface OUTSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.0.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal JIM_IKEV2_PROPOSAL&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map MY_MAP 1 match address INTERNAL_TO_VPN&lt;BR /&gt;crypto map MY_MAP 1 set peer 209.65.200.1&lt;BR /&gt;crypto map MY_MAP 1 set ikev2 ipsec-proposal JIM_IKEV2_PROPOSAL&lt;BR /&gt;crypto map MY_MAP interface OUTSIDE&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 18dad19e267de8bb4a2158cdcc6b3b4a&lt;BR /&gt;308204d3 308203bb a0030201 02021018 dad19e26 7de8bb4a 2158cdcc 6b3b4a30&lt;BR /&gt;0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b&lt;BR /&gt;13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d30&lt;BR /&gt;36313130 38303030 3030305a 170d3336 30373136 32333539 35395a30 81ca310b&lt;BR /&gt;30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;74776f72 6b313a30 38060355 040b1331 28632920 32303036 20566572 69536967&lt;BR /&gt;6e2c2049 6e632e20 2d20466f 72206175 74686f72 697a6564 20757365 206f6e6c&lt;BR /&gt;79314530 43060355 0403133c 56657269 5369676e 20436c61 73732033 20507562&lt;BR /&gt;6c696320 5072696d 61727920 43657274 69666963 6174696f 6e204175 74686f72&lt;BR /&gt;69747920 2d204735 30820122 300d0609 2a864886 f70d0101 01050003 82010f00&lt;BR /&gt;3082010a 02820101 00af2408 08297a35 9e600caa e74b3b4e dc7cbc3c 451cbb2b&lt;BR /&gt;e0fe2902 f95708a3 64851527 f5f1adc8 31895d22 e82aaaa6 42b38ff8 b955b7b1&lt;BR /&gt;b74bb3fe 8f7e0757 ecef43db 66621561 cf600da4 d8def8e0 c362083d 5413eb49&lt;BR /&gt;ca595485 26e52b8f 1b9febf5 a191c233 49d84363 6a524bd2 8fe87051 4dd18969&lt;BR /&gt;7bc770f6 b3dc1274 db7b5d4b 56d396bf 1577a1b0 f4a225f2 af1c9267 18e5f406&lt;BR /&gt;04ef90b9 e400e4dd 3ab519ff 02baf43c eee08beb 378becf4 d7acf2f6 f03dafdd&lt;BR /&gt;75913319 1d1c40cb 74241921 93d914fe ac2a52c7 8fd50449 e48d6347 883c6983&lt;BR /&gt;cbfe47bd 2b7e4fc5 95ae0e9d d4d143c0 6773e314 087ee53f 9f73b833 0acf5d3f&lt;BR /&gt;3487968a ee53e825 15020301 0001a381 b23081af 300f0603 551d1301 01ff0405&lt;BR /&gt;30030101 ff300e06 03551d0f 0101ff04 04030201 06306d06 082b0601 05050701&lt;BR /&gt;0c046130 5fa15da0 5b305930 57305516 09696d61 67652f67 69663021 301f3007&lt;BR /&gt;06052b0e 03021a04 148fe5d3 1a86ac8d 8e6bc3cf 806ad448 182c7b19 2e302516&lt;BR /&gt;23687474 703a2f2f 6c6f676f 2e766572 69736967 6e2e636f 6d2f7673 6c6f676f&lt;BR /&gt;2e676966 301d0603 551d0e04 1604147f d365a7c2 ddecbbf0 3009f343 39fa02af&lt;BR /&gt;33313330 0d06092a 864886f7 0d010105 05000382 01010093 244a305f 62cfd81a&lt;BR /&gt;982f3dea dc992dbd 77f6a579 2238ecc4 a7a07812 ad620e45 7064c5e7 97662d98&lt;BR /&gt;097e5faf d6cc2865 f201aa08 1a47def9 f97c925a 0869200d d93e6d6e 3c0d6ed8&lt;BR /&gt;e6069140 18b9f8c1 eddfdb41 aae09620 c9cd6415 3881c994 eea28429 0b136f8e&lt;BR /&gt;db0cdd25 02dba48b 1944d241 7a05694a 584f60ca 7e826a0b 02aa2517 39b5db7f&lt;BR /&gt;e784652a 958abd86 de5e8116 832d10cc defda882 2a6d281f 0d0bc4e5 e71a2619&lt;BR /&gt;e1f4116f 10b595fc e7420532 dbce9d51 5e28b69e 85d35bef a57d4540 728eb70e&lt;BR /&gt;6b0e06fb 33354871 b89d278b c4655f0d 86769c44 7af6955c f65d3208 33a454b6&lt;BR /&gt;183f685c f2424a85 3854835f d1e82cf2 ac11d6a8 ed636a&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 3600&lt;BR /&gt;crypto ikev2 enable OUTSIDE&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 MGMT&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username SSH password $sha512$5000$tfq81kC2eZCfrLsKRwNIWg==$Kl45kdEKX8GiZ/Lc++ujqA== pbkdf2 privilege 15&lt;BR /&gt;tunnel-group 209.65.200.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 209.65.200.1 ipsec-attributes&lt;BR /&gt;ikev2 remote-authentication pre-shared-key Cisco123&lt;BR /&gt;ikev2 local-authentication pre-shared-key Cisco123&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;R4 Config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=======================================&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip nat source static udp 10.0.0.1 500 interface GigabitEthernet3/0 500&lt;BR /&gt;ip nat source static udp 10.0.0.1 4500 interface GigabitEthernet3/0 4500&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet3/0 overload&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.2.0 255.255.255.0 10.0.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA on right of image&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;========================================&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.30.10 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list INTERNAL_TO_VPN extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list INTERNAL_TO_VPN extended permit icmp 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list ALLOWVPN extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list ALLOWVPN extended permit icmp 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list ALLOWVPN extended permit udp any any eq isakmp&lt;BR /&gt;access-list ALLOWVPN extended permit udp any any eq 4500&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;access-group ALLOWVPN in interface OUTSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.0.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 MGMT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal JIM_IKEV2_PROPOSAL&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map MY_MAP 1 match address INTERNAL_TO_VPN&lt;BR /&gt;crypto map MY_MAP 1 set peer 209.65.50.1&lt;BR /&gt;crypto map MY_MAP 1 set ikev2 ipsec-proposal JIM_IKEV2_PROPOSAL&lt;BR /&gt;crypto map MY_MAP interface OUTSIDE&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 18dad19e267de8bb4a2158cdcc6b3b4a&lt;BR /&gt;308204d3 308203bb a0030201 02021018 dad19e26 7de8bb4a 2158cdcc 6b3b4a30&lt;BR /&gt;0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b&lt;BR /&gt;13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d30&lt;BR /&gt;36313130 38303030 3030305a 170d3336 30373136 32333539 35395a30 81ca310b&lt;BR /&gt;30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;74776f72 6b313a30 38060355 040b1331 28632920 32303036 20566572 69536967&lt;BR /&gt;6e2c2049 6e632e20 2d20466f 72206175 74686f72 697a6564 20757365 206f6e6c&lt;BR /&gt;79314530 43060355 0403133c 56657269 5369676e 20436c61 73732033 20507562&lt;BR /&gt;6c696320 5072696d 61727920 43657274 69666963 6174696f 6e204175 74686f72&lt;BR /&gt;69747920 2d204735 30820122 300d0609 2a864886 f70d0101 01050003 82010f00&lt;BR /&gt;3082010a 02820101 00af2408 08297a35 9e600caa e74b3b4e dc7cbc3c 451cbb2b&lt;BR /&gt;e0fe2902 f95708a3 64851527 f5f1adc8 31895d22 e82aaaa6 42b38ff8 b955b7b1&lt;BR /&gt;b74bb3fe 8f7e0757 ecef43db 66621561 cf600da4 d8def8e0 c362083d 5413eb49&lt;BR /&gt;ca595485 26e52b8f 1b9febf5 a191c233 49d84363 6a524bd2 8fe87051 4dd18969&lt;BR /&gt;7bc770f6 b3dc1274 db7b5d4b 56d396bf 1577a1b0 f4a225f2 af1c9267 18e5f406&lt;BR /&gt;04ef90b9 e400e4dd 3ab519ff 02baf43c eee08beb 378becf4 d7acf2f6 f03dafdd&lt;BR /&gt;75913319 1d1c40cb 74241921 93d914fe ac2a52c7 8fd50449 e48d6347 883c6983&lt;BR /&gt;cbfe47bd 2b7e4fc5 95ae0e9d d4d143c0 6773e314 087ee53f 9f73b833 0acf5d3f&lt;BR /&gt;3487968a ee53e825 15020301 0001a381 b23081af 300f0603 551d1301 01ff0405&lt;BR /&gt;30030101 ff300e06 03551d0f 0101ff04 04030201 06306d06 082b0601 05050701&lt;BR /&gt;0c046130 5fa15da0 5b305930 57305516 09696d61 67652f67 69663021 301f3007&lt;BR /&gt;06052b0e 03021a04 148fe5d3 1a86ac8d 8e6bc3cf 806ad448 182c7b19 2e302516&lt;BR /&gt;23687474 703a2f2f 6c6f676f 2e766572 69736967 6e2e636f 6d2f7673 6c6f676f&lt;BR /&gt;2e676966 301d0603 551d0e04 1604147f d365a7c2 ddecbbf0 3009f343 39fa02af&lt;BR /&gt;33313330 0d06092a 864886f7 0d010105 05000382 01010093 244a305f 62cfd81a&lt;BR /&gt;982f3dea dc992dbd 77f6a579 2238ecc4 a7a07812 ad620e45 7064c5e7 97662d98&lt;BR /&gt;097e5faf d6cc2865 f201aa08 1a47def9 f97c925a 0869200d d93e6d6e 3c0d6ed8&lt;BR /&gt;e6069140 18b9f8c1 eddfdb41 aae09620 c9cd6415 3881c994 eea28429 0b136f8e&lt;BR /&gt;db0cdd25 02dba48b 1944d241 7a05694a 584f60ca 7e826a0b 02aa2517 39b5db7f&lt;BR /&gt;e784652a 958abd86 de5e8116 832d10cc defda882 2a6d281f 0d0bc4e5 e71a2619&lt;BR /&gt;e1f4116f 10b595fc e7420532 dbce9d51 5e28b69e 85d35bef a57d4540 728eb70e&lt;BR /&gt;6b0e06fb 33354871 b89d278b c4655f0d 86769c44 7af6955c f65d3208 33a454b6&lt;BR /&gt;183f685c f2424a85 3854835f d1e82cf2 ac11d6a8 ed636a&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 3600&lt;BR /&gt;crypto ikev2 enable OUTSIDE&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 MGMT&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username SSH password $sha512$5000$ZlbWZqAbmPW6tzNjyCptdw==$PmfribYXvWcrttPS/RjyyA== pbkdf2 privilege 15&lt;BR /&gt;tunnel-group 209.65.50.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 209.65.50.1 ipsec-attributes&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:28:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3920865#M5573</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2020-02-21T17:28:28Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921159#M5575</link>
      <description>&lt;P&gt;I am not sure about the BGP part and not expert in BGP. But, I think you are missing important Group Policy configuration for the IKEv2 and link that to tunnel-group.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;!ON LEFT ASA
!
group-policy GP internal 
  group-policy GP attributes 
  vpn-tunnel-protocol ikev2
!
tunnel-group 209.65.200.1 general-attributes 
  default-group-policy GP

!ON RIGHT ASA
!
group-policy GP internal 
  group-policy GP attributes 
  vpn-tunnel-protocol ikev2
!
tunnel-group 209.65.50.1 general-attributes 
  default-group-policy GP

&lt;/PRE&gt;&lt;P&gt;I hope this help or else let me know, I can lab it up and send you the full configuration. (Without the BGP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To Encourage, please rate helpful and/or select as answered.&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 14:23:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921159#M5575</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-09T14:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921256#M5576</link>
      <description>&lt;P&gt;Thank you for your response, although my config does already include a tunnel group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't think a site-to-site IPSec VPN needs a group policy, that's more for an AnyConnect setup, if my studying has taught me anything!&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 16:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921256#M5576</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2019-09-09T16:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921264#M5578</link>
      <description>&lt;P&gt;The configuration is there to define that the tunnel is IKEv2.&lt;/P&gt;&lt;P&gt;I would suggest to give it a try in your lab environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 17:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921264#M5578</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-09T17:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921275#M5580</link>
      <description>No you do need a group policy on a S2S VPN. As default you'll be using the the default policy "DfltGrpPolicy", it should already be configured with all protocols (ikev1, ikev2). Use the command "show run all group-policy DfltGrpPolicy" to confirm which protocols are configured. Use the command "show run all tunnel-group 209.65.50.1" to confirm the DfltGrpPolicy is indeed configured under the tunnel-group.&lt;BR /&gt;&lt;BR /&gt;Please provide ikev2 debugs from both ASAs. &lt;BR /&gt;Confirm NAT is working on both routers&lt;BR /&gt;Run a packet capture on the ASAs to confirm traffic inbound/outbound.</description>
      <pubDate>Mon, 09 Sep 2019 17:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921275#M5580</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-09-09T17:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921338#M5581</link>
      <description>&lt;P&gt;Hi RJI,&lt;/P&gt;&lt;P&gt;Thank you or the reply.&lt;/P&gt;&lt;P&gt;1. NAT is working without issue, both PCs/VPCS are able to ping the outside interface of R1/R4. I believe I've port forwarded correctly (see above configs for R1 and R4).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. I can confirm that 'default-group-policy DfltGrpPolicy' shows under 'show run all tunnel-group 209.65.50.1'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. The information shown after using 'debug crypto ikev2 protocol 255' on the left ASA when a ping is initiated from 192.168.1.2 to 192.168.2.2 is:&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-5: (3): SM Trace-&amp;gt; SA: I_SPI=7EB0B1824265D621 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_RE_XMT&lt;BR /&gt;IKEv2-PROTO-2: (3): Retransmitting packet&lt;BR /&gt;(3):&lt;BR /&gt;IKEv2-PROTO-2: (3): Sending Packet [To 209.65.200.1:500/From 10.0.0.1:500/VRF i0:f0]&lt;BR /&gt;(3): Initiator SPI : 7EB0B1824265D621 - Responder SPI : 0000000000000000 Message id: 0&lt;BR /&gt;(3): IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-3: (3): Next payload: SA, version: 2.0 (3): Exchange type: IKE_SA_INIT, flags: INITIATOR (3): Message id: 0, length: 510(3):&lt;BR /&gt;Payload contents:&lt;BR /&gt;(3): SA(3): Next payload: KE, reserved: 0x0, length: 48&lt;BR /&gt;(3): last proposal: 0x0, reserved: 0x0, length: 44&lt;BR /&gt;Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(3): last transform: 0x3, reserved: 0x0: length: 12&lt;BR /&gt;type: 1, reserved: 0x0, id: AES-CBC&lt;BR /&gt;(3): last transform: 0x3, reserved: 0x0: length: 8&lt;BR /&gt;type: 2, reserved: 0x0, id: SHA256&lt;BR /&gt;(3): last transform: 0x3, reserved: 0x0: length: 8&lt;BR /&gt;type: 3, reserved: 0x0, id: SHA96&lt;BR /&gt;(3): last transform: 0x0, reserved: 0x0: length: 8&lt;BR /&gt;type: 4, reserved: 0x0, id: DH_GROUP_1536_MODP/Group 5&lt;BR /&gt;(3): KE(3): Next payload: N, reserved: 0x0, length: 200&lt;BR /&gt;(3): DH group: 5, Reserved: 0x0&lt;BR /&gt;(3):&lt;BR /&gt;(3): e9 4e 13 e4 b1 f2 d7 a8 9e bf e6 69 67 a9 f3 bd&lt;BR /&gt;(3): 41 1d d6 bd 16 52 ef e8 c1 2e f4 36 8a 21 ad de&lt;BR /&gt;(3): c0 85 37 a4 a0 0a 85 40 60 e1 de 81 2c 35 48 00&lt;BR /&gt;(3): 85 36 27 21 4d 72 50 6e 02 d9 a4 af ee dc ac 76&lt;BR /&gt;(3): c1 6c 44 0b a2 79 fc 54 28 4d bb 5e ac e4 10 0f&lt;BR /&gt;(3): 31 a1 c2 2d 10 1e d3 9f 1b 9b a8 28 77 75 13 7e&lt;BR /&gt;(3): 69 2d 48 41 33 f1 c9 95 d7 36 39 7b 07 9d fd 91&lt;BR /&gt;(3): 1a 8f 16 c9 7d af 69 0a 24 bf a1 f5 19 96 ec 27&lt;BR /&gt;(3): 56 b1 d6 a0 84 5e 6f 92 bb 86 48 50 a8 3c 88 78&lt;BR /&gt;(3): 5c 88 62 e1 83 99 ab 5b 6e 51 6b 96 69 6e c9 9c&lt;BR /&gt;(3): b1 3c 26 1f 08 37 43 47 4f 72 d0 f7 37 6f 1d d2&lt;BR /&gt;(3): 4d 0d b8 a9 32 d7 8c d9 86 1b db 6d 12 6c 51 02&lt;BR /&gt;(3): N(3): Next payload: VID, reserved: 0x0, length: 68&lt;BR /&gt;(3):&lt;BR /&gt;(3): 6b af 7d 72 39 b7 9d 47 33 ca f9 ad 8f d3 c9 ab&lt;BR /&gt;(3): f9 52 1f 96 db ab 6b 81 e6 5c 2e 64 be 22 3b e6&lt;BR /&gt;(3): af f6 1c f1 fc db 70 e7 b5 6a ef 84 eb 09 6e 76&lt;BR /&gt;(3): 6c a8 cf de 42 5e e5 b2 3d 49 87 ce 27 87 b4 40&lt;BR /&gt;(3): VID(3): Next payload: VID, reserved: 0x0, length: 23&lt;BR /&gt;(3):&lt;BR /&gt;(3): 43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41&lt;BR /&gt;(3): 53 4f 4e&lt;BR /&gt;(3): VID(3): Next payload: NOTIFY, reserved: 0x0, length: 59&lt;BR /&gt;(3):&lt;BR /&gt;(3): 43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29&lt;BR /&gt;(3): 26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32&lt;BR /&gt;(3): 30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d&lt;BR /&gt;(3): 73 2c 20 49 6e 63 2e&lt;BR /&gt;(3): NOTIFY(NAT_DETECTION_SOURCE_IP)(3): Next payload: NOTIFY, reserved: 0x0, length: 28&lt;BR /&gt;(3): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP&lt;BR /&gt;(3):&lt;BR /&gt;(3): 9e 44 0f f3 b8 ab 04 b3 83 a8 ac fb f9 94 fc c9&lt;BR /&gt;(3): a4 23 18 07&lt;BR /&gt;(3): NOTIFY(NAT_DETECTION_DESTINATION_IP)(3): Next payload: NOTIFY, reserved: 0x0, length: 28&lt;BR /&gt;(3): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP&lt;BR /&gt;(3):&lt;BR /&gt;(3): 79 a0 ca f1 a1 df fd 42 54 4a 41 60 35 84 99 3b&lt;BR /&gt;(3): d3 fa cb 8f&lt;BR /&gt;(3): NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)(3): Next payload: VID, reserved: 0x0, length: 8&lt;BR /&gt;(3): Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED&lt;BR /&gt;(3): VID(3): Next payload: NONE, reserved: 0x0, length: 20&lt;BR /&gt;(3):&lt;BR /&gt;(3): 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3&lt;BR /&gt;(3):&lt;BR /&gt;IKEv2-PROTO-5: (3): SM Trace-&amp;gt; SA: I_SPI=7EB0B1824265D621 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_NO_EVENT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does the posted config look reasonable? Are there any obvious errors in what has been configured?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 20:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921338#M5581</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2019-09-09T20:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921352#M5582</link>
      <description>&lt;P&gt;I wanted the full debugs from both ASAs, the output will be different.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Test without the nat overload on both routers&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 20:44:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921352#M5582</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-09-09T20:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921379#M5583</link>
      <description>&lt;P&gt;It looks as though the problem is either;&lt;/P&gt;&lt;P&gt;a. The port forwards on the edge routers&lt;/P&gt;&lt;P&gt;b. The outside ACL on the ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASAs show debug output when the local PC pings across the network, so I'm happy that the crypto map is working and that the building of the VPN tunnel is triggered by a ping to the other side. However, they show no output when the ping is initiated from the other side. The IKEv2 traffic is not hitting the ASA at all.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 21:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921379#M5583</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2019-09-09T21:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921390#M5584</link>
      <description>So did you test without the nat overload on the routers?&lt;BR /&gt;What is the output of "show crypto ipsec sa" on BOTH ASA when you believe the tunnel is up? &lt;BR /&gt;Are Decaps|Encaps increasing on both end?&lt;BR /&gt;&lt;BR /&gt;If you still believe you have an issue, provide the full output of the debugs on both ASA if you still require assistance?</description>
      <pubDate>Mon, 09 Sep 2019 21:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921390#M5584</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-09-09T21:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921399#M5585</link>
      <description>&lt;P&gt;I haven't tried removing the PAT overload on the outside interfaces of the edge routers..but surely a lack of basic communication to the other side would prevent a tunnel from forming?!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not believe even phase 1 is completing, so haven't run 'show crypto ipsec sa' - there is no output for 'show crypto isakmp sa'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned, I cannot post any debug output from both ASAs, as output is shown when the local PC initiates a ping, not when the ASA is receiving anything from the other end - does that make sense?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 21:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921399#M5585</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2019-09-09T21:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921404#M5587</link>
      <description>I assumed when you said "so I'm happy that the crypto map is working and that the building of the VPN tunnel is triggered" that the tunnel was established, that obviously wasn't the case.&lt;BR /&gt;&lt;BR /&gt;It looks like you are running this in GNS3, open up wireshark on the hops in between the ASAs and determine if the udp/500 &amp;amp; 4500 is being sent and received. Find out where it isn't being transmitted and go from there.&lt;BR /&gt;&lt;BR /&gt;I assume you can ping from one ASA to the other? Turn on icmp debug "debug icmp trace".&lt;BR /&gt;&lt;BR /&gt;The ACL for isakmp on the OUTSIDE interface is not doing what you believe it's doing. It is currently doing nothing, as it's not applied on the control-plane. IKEv2 is enabled on both ASA due to the command "crypto ikev2 enable outside".</description>
      <pubDate>Mon, 09 Sep 2019 21:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921404#M5587</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-09-09T21:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921409#M5588</link>
      <description>&lt;P&gt;Apologies, perhaps my wording wasn't as clear as it could be. I see debug output showing an attempt to build the tunnel when a ping is initiated, which is what told me that the ACL in the crypto map is matching the local PC subnet, 192.168.1.0 or 192.168.2.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did run a sniff on the router links, and spotted an ISAKMP entry with ICMP destination unreachable, port unreachable. This is why I wondered whether my port forwarding NAT statements on the edge routers were correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know it's sometimes difficult to get problems across with just words, but just to say I really appreciate you taking the time to work through it with me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm in the UK, so off to bed now. Will post again tomorrow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 21:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921409#M5588</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2019-09-09T21:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921637#M5590</link>
      <description>&lt;P&gt;I have lab the setup without BGP part. Find the attached configuration. The configuration is working here in my lab environment. If you still having issue please go step by step in packet capture and also you can run the debug commands at both the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure your ROUTER is doing NAT properly, you can check NAT translations by "show ip nat tra".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do let me know if you still having issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 09:48:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921637#M5590</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-10T09:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921751#M5592</link>
      <description>Hi Bhargavdesai,&lt;BR /&gt;&lt;BR /&gt;That is so kind of you to test - thank you. Your config looks similar to mine - is it working your end even without opening up the 500 and 4500 ports on the OUTSIDE interfaces of the ASAs?</description>
      <pubDate>Tue, 10 Sep 2019 13:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921751#M5592</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2019-09-10T13:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921795#M5593</link>
      <description>&lt;P&gt;You don't have to open any port on the OUTSIDE interface of the ASAs.&lt;/P&gt;&lt;P&gt;This is working configuration. I have tested the same on EVE-NG.&lt;/P&gt;&lt;P&gt;You can use this configuration with minor changes in you GNS3 as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would say, It may be a glitch of IOS/IOL or whatever image you are using for emulation you should check the "sh ip nat tra" , Wireshark and Debug logs to find out the problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you still want help even I can look at your problem remotely through some live meeting session you feel comfortable with. I am from INDIA so we can arrange the time accordingly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 14:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921795#M5593</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-10T14:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921845#M5594</link>
      <description>&lt;P&gt;Ok, thank you again. I have a suspicion that the static NAT port forwarding statements on the edge routers aren't working. I will try with a different router instance this evening.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 15:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3921845#M5594</guid>
      <dc:creator>mrjdh</dc:creator>
      <dc:date>2019-09-10T15:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling hair out - ASA S2S IPSec VPN behind NAT router</title>
      <link>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3927835#M5595</link>
      <description>&lt;P&gt;Provide: show crypto isa sa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are your nat statements for the asa?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 21:04:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pulling-hair-out-asa-s2s-ipsec-vpn-behind-nat-router/m-p/3927835#M5595</guid>
      <dc:creator>ciscoguy83</dc:creator>
      <dc:date>2019-09-20T21:04:59Z</dc:date>
    </item>
  </channel>
</rss>

