<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: easy vpn ipsec issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695639#M561703</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi here is the config from the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 3GSplitTunnel extended permit ip 10.100.1.0 255.255.255.0 any&lt;BR /&gt;access-list 3Gtraffic extended permit ip 10.100.1.0 255.255.255.0 10.3.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TUNN_ESP_AES_SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN_MAP 100 set transform-set TUNN_ESP_AES_SHA&lt;BR /&gt;crypto dynamic-map DYN_MAP 100 set reverse-route&lt;/P&gt;&lt;P&gt;crypto isakmp identity address&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 2147483&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal&amp;nbsp; 20&lt;BR /&gt;crypto isakmp ipsec-over-tcp port 10000&lt;/P&gt;&lt;P&gt;group-policy 3GPolicy internal&lt;BR /&gt;group-policy 3GPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; password-storage enable&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value 3GSplitTunnel&lt;BR /&gt; default-domain value xxx.com&lt;BR /&gt; nem enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;username cisco test password ciscotest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group Sol3GRAGroup type ipsec-ra&lt;BR /&gt;tunnel-group Sol3GRAGroup general-attributes&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt; default-group-policy 3GPolicy&lt;BR /&gt;tunnel-group Sol3GRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and here is the config from the 3G router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ezvpn-profile-0 esp-aes 256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ezvpn-profile-1 esp-aes 256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;username ciscotest password ciscotest&lt;/P&gt;&lt;P&gt;crypto ipsec profile EZVPN&lt;BR /&gt; set transform-set ezvpn-profile-0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec client ezvpn ASA&lt;BR /&gt; connect auto&lt;BR /&gt; group 3GRAGroup key 3gvpn&lt;BR /&gt; mode network-extension&lt;BR /&gt; ipsec-profile EZVPN&lt;BR /&gt; nat acl 102&lt;BR /&gt; username cisco test password ciscotest&lt;BR /&gt; xauth userid mode local&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Cellular 0&lt;BR /&gt; no ip address&lt;BR /&gt; no shut&lt;BR /&gt; ip nat outside&lt;BR /&gt; encapsulation ppp&lt;BR /&gt; dialer in-band&lt;BR /&gt; dialer pool-member 2&lt;BR /&gt; dialer-group 2&lt;BR /&gt; async mode interactive&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; ip address 10.3.0.1 255.255.255.0&lt;BR /&gt; ip access-group 100 out&lt;BR /&gt; ip nat inside&lt;BR /&gt; crypto ipsec client ezvpn ASA inside&lt;/P&gt;&lt;P&gt;interface Dialer 1&lt;BR /&gt; ip address negotiated&lt;BR /&gt; ip nat outside&lt;BR /&gt; dialer pool 2&lt;BR /&gt; dialer string 3g&lt;BR /&gt; dialer persistent&lt;BR /&gt; dialer-group 2&lt;BR /&gt; !output omitted----&lt;BR /&gt; crypto ipsec client ezvpn ASA outside&lt;/P&gt;&lt;P&gt;ip nat inside source route-map EzVPN interface Dialer1 overload&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer1&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;BR /&gt;access-list 101 permit ip any any&lt;BR /&gt;access-list 102 deny ip 10.3.0.0 0.0.0.255 10.100.1.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route-map EzVPN permit 1&lt;BR /&gt; match address 102&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 31 May 2011 09:11:40 GMT</pubDate>
    <dc:creator>SOL10</dc:creator>
    <dc:date>2011-05-31T09:11:40Z</dc:date>
    <item>
      <title>easy vpn ipsec issues</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695637#M561701</link>
      <description>&lt;H2&gt;&lt;A href="https://community.cisco.com/message/3366466#3366466" target="_blank"&gt;&lt;SPAN style="color: #ee6804; font-size: 24pt;"&gt;EazyVPN issues - IPSEC&lt;/SPAN&gt;&lt;/A&gt;&lt;/H2&gt;&lt;DIV class="jive-thread-post-message"&gt;&lt;!-- [DocumentBodyStart:797609b2-599b-43ed-8380-842326974e15] --&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;ive recently setup a EazyVPN on a cisco 3g router with a ASA5520.&amp;nbsp; the tunnel comes up ok and the remote users can browse the net.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is accessing the lan behind the ASA.&amp;nbsp; when you do a show cry ipsec sa at the ASA you get the following:&amp;nbsp; (ive replaced IP's with the names of the LAN/IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto map tag: DYN_MAP, seq num: 100, local addr: &lt;STRONG&gt;ASA IP ADD&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (&lt;STRONG&gt;LAN BEHIND ASA&lt;/STRONG&gt;/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): &lt;STRONG&gt;(LAN BEHIND 3G router&lt;/STRONG&gt;/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: &lt;STRONG&gt;3G Router IP&lt;/STRONG&gt;, username: xxxxxx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic allocated peer ip: 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&amp;nbsp; &lt;SPAN style="color: #ff0000;"&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 249, #pkts decrypt: 249, #pkts verify: 249&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: &lt;STRONG&gt;ASA IP ADD&lt;/STRONG&gt;/4500, remote crypto endpt.: &lt;STRONG&gt;3G Router IP&lt;/STRONG&gt;/40592&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 82, media mtu 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 79BBD3C3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x483ABBD4 (1211808724)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-hmac none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel,&amp;nbsp; NAT-T-Encaps, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 13179, crypto-map: DYN_MAP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 27555&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x79BBD3C3 (2042352579)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes-256 esp-sha-hmac none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel,&amp;nbsp; NAT-T-Encaps, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 13179, crypto-map: DYN_MAP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 27555&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as you can see the packets are not encapsulating for some reason. On the 3G router its the opposite where the packets arent decapsulating.&amp;nbsp; On a site to site VPN this is normally when the interesting traffic ACL is incorrect - but im baffled with this on an EazyVPN setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have allowed the no nat statements on the router and the ASA -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any pointers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/DIV&gt;&lt;!-- [DocumentBodyEnd:797609b2-599b-43ed-8380-842326974e15] --&gt;&lt;!-- BEGIN attachments --&gt;&lt;!-- END attachments --&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695637#M561701</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2019-03-11T20:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: easy vpn ipsec issues</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695638#M561702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you provide config from both router and asa?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 16:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695638#M561702</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-05-26T16:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: easy vpn ipsec issues</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695639#M561703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi here is the config from the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 3GSplitTunnel extended permit ip 10.100.1.0 255.255.255.0 any&lt;BR /&gt;access-list 3Gtraffic extended permit ip 10.100.1.0 255.255.255.0 10.3.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TUNN_ESP_AES_SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN_MAP 100 set transform-set TUNN_ESP_AES_SHA&lt;BR /&gt;crypto dynamic-map DYN_MAP 100 set reverse-route&lt;/P&gt;&lt;P&gt;crypto isakmp identity address&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 2147483&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal&amp;nbsp; 20&lt;BR /&gt;crypto isakmp ipsec-over-tcp port 10000&lt;/P&gt;&lt;P&gt;group-policy 3GPolicy internal&lt;BR /&gt;group-policy 3GPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; password-storage enable&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value 3GSplitTunnel&lt;BR /&gt; default-domain value xxx.com&lt;BR /&gt; nem enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;username cisco test password ciscotest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group Sol3GRAGroup type ipsec-ra&lt;BR /&gt;tunnel-group Sol3GRAGroup general-attributes&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt; default-group-policy 3GPolicy&lt;BR /&gt;tunnel-group Sol3GRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and here is the config from the 3G router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ezvpn-profile-0 esp-aes 256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ezvpn-profile-1 esp-aes 256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;username ciscotest password ciscotest&lt;/P&gt;&lt;P&gt;crypto ipsec profile EZVPN&lt;BR /&gt; set transform-set ezvpn-profile-0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec client ezvpn ASA&lt;BR /&gt; connect auto&lt;BR /&gt; group 3GRAGroup key 3gvpn&lt;BR /&gt; mode network-extension&lt;BR /&gt; ipsec-profile EZVPN&lt;BR /&gt; nat acl 102&lt;BR /&gt; username cisco test password ciscotest&lt;BR /&gt; xauth userid mode local&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Cellular 0&lt;BR /&gt; no ip address&lt;BR /&gt; no shut&lt;BR /&gt; ip nat outside&lt;BR /&gt; encapsulation ppp&lt;BR /&gt; dialer in-band&lt;BR /&gt; dialer pool-member 2&lt;BR /&gt; dialer-group 2&lt;BR /&gt; async mode interactive&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; ip address 10.3.0.1 255.255.255.0&lt;BR /&gt; ip access-group 100 out&lt;BR /&gt; ip nat inside&lt;BR /&gt; crypto ipsec client ezvpn ASA inside&lt;/P&gt;&lt;P&gt;interface Dialer 1&lt;BR /&gt; ip address negotiated&lt;BR /&gt; ip nat outside&lt;BR /&gt; dialer pool 2&lt;BR /&gt; dialer string 3g&lt;BR /&gt; dialer persistent&lt;BR /&gt; dialer-group 2&lt;BR /&gt; !output omitted----&lt;BR /&gt; crypto ipsec client ezvpn ASA outside&lt;/P&gt;&lt;P&gt;ip nat inside source route-map EzVPN interface Dialer1 overload&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer1&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;BR /&gt;access-list 101 permit ip any any&lt;BR /&gt;access-list 102 deny ip 10.3.0.0 0.0.0.255 10.100.1.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route-map EzVPN permit 1&lt;BR /&gt; match address 102&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 May 2011 09:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695639#M561703</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2011-05-31T09:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: easy vpn ipsec issues</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695640#M561704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;did you enable nat-control on ASA?&lt;/P&gt;&lt;P&gt;If yes, did you configure NAT 0 to bypass vpn traffic from NAT?&lt;/P&gt;&lt;P&gt;You did not provide NAT confguration on ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jun 2011 14:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695640#M561704</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-06-01T14:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: easy vpn ipsec issues</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695641#M561705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;i have managed to sort this - well kind of.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the problem seems to be with the routing of 10.0.0.0/8 subnet (which we use within our network and MPLS cloud)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i change the the remote subnet to 192.168.166.0/24 or 172.16.166.0/24&amp;nbsp; it all works ok&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jun 2011 15:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695641#M561705</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2011-06-01T15:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: easy vpn ipsec issues</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695642#M561706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. glad that you fixed it already.&lt;/P&gt;&lt;P&gt;Yeah, that could be an issue. In general, if you don't see encrypted count incrementing, you should check NAT and routing. Here, since you use overlapped IP range for remote vpn, so the traffic to vpn client might not be able to reach this ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jun 2011 16:21:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-ipsec-issues/m-p/1695642#M561706</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-06-01T16:21:43Z</dc:date>
    </item>
  </channel>
</rss>

