<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: packet-tracer vs. site-to-site tunnel from outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650750#M592255</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your situation is normal. I tried the same packet tracer using our site to site VPN and I get the same result.&lt;/P&gt;&lt;P&gt;This is what I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-1(config)# packet-tracer input outside icmp 192.168.70.10 8 0 172.16.12$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 172.16.128.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.240.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc6464cc8, priority=0, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;hits=22753, user_data=0x9, cs_id=0x0, flags=0x1000, protocol=0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interface ACL is the one dropping it. It seems that the sysopt connection permit-vpn doesn't work with the packet tracer&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Feb 2011 19:51:37 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-02-08T19:51:37Z</dc:date>
    <item>
      <title>packet-tracer vs. site-to-site tunnel from outside</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650749#M592252</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer works great verifying my site-to-site ipsec tunnel from inside, but when I run it from outside and give it an ip address that would have been classified as interesting on the peer device, it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would not be return traffic, but initiating traffic from the peer site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm assuming this is because packet tracer has no way of simulating a packet arriving on the outside interface is already in the tunnel and enrcypted, as the trace did not show any vpn stages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packets arriving from the lab setup across the tunnel are allowed, just not the packet tracer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate any input. Don't always have the benefit of a lab setup to verify.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650749#M592252</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2019-03-11T19:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: packet-tracer vs. site-to-site tunnel from outside</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650750#M592255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your situation is normal. I tried the same packet tracer using our site to site VPN and I get the same result.&lt;/P&gt;&lt;P&gt;This is what I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-1(config)# packet-tracer input outside icmp 192.168.70.10 8 0 172.16.12$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 172.16.128.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.240.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc6464cc8, priority=0, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;hits=22753, user_data=0x9, cs_id=0x0, flags=0x1000, protocol=0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interface ACL is the one dropping it. It seems that the sysopt connection permit-vpn doesn't work with the packet tracer&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 19:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650750#M592255</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-08T19:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: packet-tracer vs. site-to-site tunnel from outside</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650751#M592256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your only option there is to capture the encrypted packets in a capture with the "trace" option.&amp;nbsp; Then you can do "show capture &lt;NAME&gt; packet-number &amp;lt;#&amp;gt; trace" to feed that packet through packet-tracer and it will make it past the vpn-decrypt section.&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still not very helpful unless you don't have much traffic over the VPN.&amp;nbsp; There's no way to know if the encapsulated traffic is what you were hoping to get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;-jb&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 01:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650751#M592256</guid>
      <dc:creator>jubetz</dc:creator>
      <dc:date>2011-02-09T01:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: packet-tracer vs. site-to-site tunnel from outside</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650752#M592259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that's a nifty idea--didn't know about that--thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 03:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-vs-site-to-site-tunnel-from-outside/m-p/1650752#M592259</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-02-09T03:57:04Z</dc:date>
    </item>
  </channel>
</rss>

