<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cant Connect IP Phone While on Comcast via VPN? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618591#M581217</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your statement:&lt;/P&gt;&lt;P&gt;I've setup&amp;nbsp; a PIX 501 to Connect to our ASA 5510. In the Office, going from one&amp;nbsp; Public IP Subnet to the Public IP on the ASA 5510 I'm able to connect up&amp;nbsp; the 5610 IP Phone through the PIX 501 through the ASA 5510 to the&amp;nbsp; IPOffice 500 Server and place calls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt; Do you mean in clear text, or through VPN tunnel?&lt;/P&gt;&lt;P&gt;--&amp;gt; Also, do you always&amp;nbsp; have PIX connected behind the Comcast to create the VPN tunnel? even when you gave the Comcast to 4 other users, do you give the PIX to them together with the Comcast connection, and establish VPN tunnel between the PIX to ASA at the HQ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- With IPSec VPN between the 2 sites, definitely ISP is not able to detect the voice/data traffic because they are encrypted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Feb 2011 04:39:19 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-02-25T04:39:19Z</dc:date>
    <item>
      <title>Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618590#M581216</link>
      <description>&lt;P&gt;Can An ISP Filter Traffic within the VPN Tunnel?&amp;nbsp; Sounds weird but...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a Avaya IP Office 500 Head end Phone Server. Several 5610 IP Phones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've setup a PIX 501 to Connect to our ASA 5510. In the Office, going from one Public IP Subnet to the Public IP on the ASA 5510 I'm able to connect up the 5610 IP Phone through the PIX 501 through the ASA 5510 to the IPOffice 500 Server and place calls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I take the same setup home and connect it to my Comcast Internet connection anf it does not work. I can connect a Laptop behind the PIX501 and Connect to the HQ network just fine.&amp;nbsp; I can see the Phone do a TFTP Transfer to the VM Server, though it stops short can cannot connec to the Call Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then gave the unit to 4 other Comcast Users, all of them do not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then gave it to a AT&amp;amp;T DSL user, works Great!&lt;/P&gt;&lt;P&gt;then another local DSL ISP (Sonic.Net) and it works great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same hardware, same VPN, Same everything except ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both With Comcast we tried directly to the Cable Modem, or behind a edge router.&amp;nbsp; PCs connect, Phone does not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing I do not understand is If Comcast is filtering something, how can they filter something that is in my VPN Tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Thoughts?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618590#M581216</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2019-03-11T19:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618591#M581217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your statement:&lt;/P&gt;&lt;P&gt;I've setup&amp;nbsp; a PIX 501 to Connect to our ASA 5510. In the Office, going from one&amp;nbsp; Public IP Subnet to the Public IP on the ASA 5510 I'm able to connect up&amp;nbsp; the 5610 IP Phone through the PIX 501 through the ASA 5510 to the&amp;nbsp; IPOffice 500 Server and place calls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt; Do you mean in clear text, or through VPN tunnel?&lt;/P&gt;&lt;P&gt;--&amp;gt; Also, do you always&amp;nbsp; have PIX connected behind the Comcast to create the VPN tunnel? even when you gave the Comcast to 4 other users, do you give the PIX to them together with the Comcast connection, and establish VPN tunnel between the PIX to ASA at the HQ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- With IPSec VPN between the 2 sites, definitely ISP is not able to detect the voice/data traffic because they are encrypted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 04:39:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618591#M581217</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-25T04:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618592#M581218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry if I was not Clear.&amp;nbsp; Yes, the IP Phone is Directly Connected to the PIX 501 in &lt;STRONG&gt;ALL&lt;/STRONG&gt; test cases. So when in the office, I wanted to go from one Public Subnet to the other to at least go through our Edge Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In &lt;STRONG&gt;All Cases&lt;/STRONG&gt;, the PIX 501 fires up. I wait a couple minutes, then I connect the Phone. It Loads its Firmware, Gets a DHCP address from the PIX 501, The Tunnel Light comes on, the Phone Transferrs a file from a TFTP server, then Tries to contact the VoIP headend server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is only the Comcast Test cases where the IP Phone cannot connect to the&amp;nbsp; VoIP headend server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 18:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618592#M581218</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-02-25T18:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618593#M581219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mmm..&amp;nbsp; sounds like a Comcast issue &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;They might be dropping packets hence the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please check if the IPSec is in ESP packet, or it is encapsulated in UDP/4500 packet?&lt;/P&gt;&lt;P&gt;If it's actually been encapsulated in UDP/4500, you can probably test it using IPSec encapsulated in TCP so at least it retransmits if there is any drop packets. However, if you are passing voice traffic via the VPN tunnel, it might not be such a good idea, but worth a test to prove it's an ISP issue, and you can then go back to Comcast with the evidence &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the command to encapsulate with TCP instead of UDP if it's actually in UDP/4500:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/c5.html#wp2236488"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/c5.html#wp2236488&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Feb 2011 07:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618593#M581219</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-27T07:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618594#M581220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so I have the &lt;STRONG&gt;crypto isakmp ipsec-over-tcp 1000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;entered on the Head end, though I'm not sure if I need to disable UDP, or what I need to do on the PIX 501 to tell it to use TCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&amp;lt;-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618594#M581220</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-03-01T19:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618595#M581221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I also entered the following on the head end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;group-policy RemotePIX501 internal&lt;BR /&gt;group-policy RemotePIX501 attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt;tunnel-group remote.home type ipsec-l2l&lt;BR /&gt;tunnel-group remote.home general-attributes&lt;BR /&gt; default-group-policy RemotePIX501&lt;BR /&gt;tunnel-group remote.home ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;Though I'm not sure how to tell if its using TCP or UDP.&lt;/P&gt;&lt;P&gt;Using ASDM I look at the IKE connection and it still says UDP/500&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa(config-group-policy)# sh cry ipsec sa sum&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Current IPSec SA's:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak IPSec SA's:&lt;BR /&gt;IPSec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent SA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over UDP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent L2L :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over NAT-T :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent RA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec over TCP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec VPN LB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Total&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So I'm not sure where to go from here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618595#M581221</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-03-01T19:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618596#M581222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I also entered the following on the head end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;group-policy RemotePIX501 internal&lt;BR /&gt;group-policy RemotePIX501 attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt;tunnel-group remote.home type ipsec-l2l&lt;BR /&gt;tunnel-group remote.home general-attributes&lt;BR /&gt; default-group-policy RemotePIX501&lt;BR /&gt;tunnel-group remote.home ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;Though I'm not sure how to tell if its using TCP or UDP.&lt;/P&gt;&lt;P&gt;Using ASDM I look at the IKE connection and it still says UDP/500&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa(config-group-policy)# sh cry ipsec sa sum&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Current IPSec SA's:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak IPSec SA's:&lt;BR /&gt;IPSec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent SA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over UDP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent L2L :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over NAT-T :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent RA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec over TCP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec VPN LB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Total&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So I'm not sure where to go from here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618596#M581222</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-03-01T19:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618597#M581223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I've entered the following ont he head end.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;group-policy RemotePIX501 internal&lt;BR /&gt;group-policy RemotePIX501 attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt;tunnel-group remote.home type ipsec-l2l&lt;BR /&gt;tunnel-group remote.home general-attributes&lt;BR /&gt; default-group-policy RemotePIX501&lt;BR /&gt;tunnel-group remote.home ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then I looked in ASDM and it still looks like its UDP/500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then did a show cry ipsec sa sum with the following results.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ASA(config-group-policy)# sh cry ipsec sa sum&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Current IPSec SA's:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak IPSec SA's:&lt;BR /&gt;IPSec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent SA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over UDP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent L2L :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over NAT-T :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent RA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec over TCP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec VPN LB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Total&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like the IPSec over TCP should have something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure where to go from here...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 20:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618597#M581223</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-03-01T20:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618598#M581224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, so from that output, it doesn't look like it's going through any PAT router, so it will never use either UDP or TCP encapsulation. It will just use ESP&lt;/P&gt;&lt;P&gt; as the IPSec protocol. Only when it passes through a PAT router, it will encapsulate it to UDP or TCP, since ESP is not a TCP or UDP protocol that can be PATed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you really want to test further, you can place a PAT device in front of the PIX, then the ISAKMP will detect that it's behind a PAT device, and will automatically encapsulate that in UDP/TCP. But all evidence so far pointing that it's a Comcast issue. If you can provide them with all the test that you have performed with other providers, I am confident that Comcast will own up to the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 07:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618598#M581224</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-02T07:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618599#M581225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are reaching (or reached already) my knowledge limit. So is ESP like TCP in the retransmissions of dropped packets? Or like UDP, and jsut keeps going if it can?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont have a PAT device here that I can connect the router to. I have a DLINK unit, though I cant seem to get it configured to allow the IPSec though it even though the IPSec Pass-through is on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At one of the Close Comcast sites I can try it.&amp;nbsp; Though how does the PIX 501 know to use TCP vs UDP. There was no Config change on the PIX 501.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 20:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618599#M581225</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-03-02T20:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618600#M581226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I put the PIX 501 at the remote location and now the sh cry ipsec sa sum looks like this:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Current IPSec SA's:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak IPSec SA's:&lt;BR /&gt;IPSec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent SA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over UDP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent L2L :&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;BR /&gt;IPSec over NAT-T :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak Concurrent RA&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec over TCP&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;IPSec VPN LB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Total&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did some Packet Traces and captured the pcap info from the session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see the TFTP transaction between the Phone and the Voicemail Server.&lt;/P&gt;&lt;P&gt;Then it tries to send a Request to the IPOffice 500 server. The Server gets it and on the HQ ASA I can see the Request from the IPPhone and the Reply from the IPOffice sent back to the phone's IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I dont see that Packet on the Remote PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is how can I be sure that the Packet received on the HQ Pix entered the VPN Tunnel and didn;t get dropped there somewhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 23:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618600#M581226</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-03-02T23:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618601#M581227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best way to check it is the actual ESP packet because you would like to see if you are receiving the same amounts of ESP packet on both ASA and PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here it is:&lt;/P&gt;&lt;P&gt;1) Configure access-list that says to and from both peer address and vice versa on both ASA and PIX:&lt;/P&gt;&lt;P&gt;access-list cap-out permit esp host &lt;ASA-OUTSIDE-IP&gt; host &lt;PIX-OUTSIDE-IP&gt;&lt;/PIX-OUTSIDE-IP&gt;&lt;/ASA-OUTSIDE-IP&gt;&lt;/P&gt;&lt;P&gt;access-list cap-out permit esp host &lt;PIX-OUTSIDE-IP&gt; host &lt;ASA-OUTSIDE-IP&gt;&lt;/ASA-OUTSIDE-IP&gt;&lt;/PIX-OUTSIDE-IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Clear the VPN tunnel from both ends to get a fresh capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Apply the capture on both outside interfaces of ASA and PIX:&lt;/P&gt;&lt;P&gt;capture capout access-list cap-out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Do the test - voice stuff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Grab the packet capture from both ASA and PIX, and view it in Wireshark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) Also grab the output of "show cry ipsec sa" from both ASA and PIX at the same time. You should see the number of encrypted packets on ASA should match the decrypted packets on PIX, and vice versa.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 00:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618601#M581227</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-03T00:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618602#M581228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So Then I want to see more Packets Encrypted @ HQ than Decrypted @ Remote?&amp;nbsp; That would say that the Packet from the IPOffice server is hitting the Tunnel and getting encrypted and then jsut not ever reaching the Remtoe?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still having a hard time figuring out how the ISP would be able to pluck out these types of Packets that are encrypted.&amp;nbsp; I could see if I was not using VPN, but the ISP shouldn't be able to tell what is in the Packets right?&amp;nbsp; Why let everthing else (that I can find so far) through?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 16:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618602#M581228</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2011-03-03T16:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cant Connect IP Phone While on Comcast via VPN?</title>
      <link>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618603#M581229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's more dropping a couple of packets here and there, not totally blocking every packets, and since ESP is not a stateful connection, then it does not retransmit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why others are working just fine is typically you will probably browse the internet which will be HTTP or HTTPS, email will be SMTP, and all of those are TCP, and TCP is a stateful connection so if there is packet drops here and there, it will try to retransmit the packet again until the destination end receives everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, your ISP will not know what is inside the encrypted packet. It's more the encrypted packet itself is stateless, hence there is no retransmission therefore packet drops affects the connection within the encrypted packet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 11:45:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-connect-ip-phone-while-on-comcast-via-vpn/m-p/1618603#M581229</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-05T11:45:10Z</dc:date>
    </item>
  </channel>
</rss>

