<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Errors after Pix to ASA migration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634354#M595029</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear.&lt;/P&gt;&lt;P&gt;It is typically recommended to use "ip" for crypto ACL rather than protocol and port specific. If you would like to restrict traffic, you can use ACL and applied that to the interface to restrict traffic.&lt;/P&gt;&lt;P&gt;There might be bug on the ASA version that you are running, that's why it's failing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 09 Jan 2011 10:50:32 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-01-09T10:50:32Z</dc:date>
    <item>
      <title>Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634342#M595016</link>
      <description>&lt;P&gt;Hi people,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the follow scenario, in my network i have a PIX,&amp;nbsp; and the 2 VPN configured, and all works fine, no errors. But 2 weeks ago, we changed the PIX to Asa 5505, with same configs, and the one of the VPN is generating &lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Clique para mostrar traduções alternativas"&gt;intermittence&lt;/SPAN&gt;&lt;/SPAN&gt;, lose packets periodically , some times after 20 seconds that VPN formed, some times 40 seconds , some times 1 minute. If i put the command "show crypto isakmp sa" the VPN keep active, enabling the "debug crypto isakmp 150"&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group =&lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, IP =&lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, QM IsRekeyed old sa not found by addr&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = &lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, IP = &lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, Static Crypto Map check, checking map = biomap, seq = 1...&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = &lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, IP = &lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, Static Crypto Map check, map = biomap, seq = 1, ACL does not match proxy IDs src:201.77.XXX.XXX dst:172.20.3.32&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is&amp;nbsp; there any feature in ASA that can causing this issue? Why if i return to the PIX the VPN dont lose packets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX and ASA are with same configs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634342#M595016</guid>
      <dc:creator>Thiago Cella</dc:creator>
      <dc:date>2019-03-11T19:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634343#M595018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Base on the following error message:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 01 07:10:38 [IKEv1]: Group = &lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, IP = &lt;/STRONG&gt;&lt;STRONG&gt;201.77.XXX.XX&lt;/STRONG&gt;&lt;STRONG&gt;, Static Crypto Map check, map = biomap, seq = 1, ACL does not match proxy IDs src:201.77.XXX.XXX dst:172.20.3.32&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto ACL is not mirror image between the 2 sides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please share the config from both sides of the tunnel. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 02:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634343#M595018</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-07T02:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634344#M595019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tks Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Follow the config, but if return to PIX the VPN works no errors.Administration of the another side is the other company.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto map biomap 1 match address VPN2&lt;BR /&gt;crypto map biomap 1 set peer 201.77.XXX.XXX&lt;BR /&gt;crypto map biomap 1 set transform-set bioset&lt;BR /&gt;crypto map biomap 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map biomap 1 set security-association lifetime kilobytes 2147483647&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 201.77.XXX.XXX type ipsec-l2l&lt;BR /&gt;tunnel-group 201.77.XXX.XXX ipsec-attributes&lt;BR /&gt; pre-shared-key pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;global (outside) 1 172.20.3.33&lt;BR /&gt;nat (inside) 1 access-list NATIFS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.20.3.37 192.168.1.101 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 172.20.3.38 192.168.1.102 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 172.20.3.36 192.168.1.100 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;BR /&gt;isakmp policy 10 authentication pre-share&lt;BR /&gt;isakmp policy 10 encryption des&lt;BR /&gt;isakmp policy 10 hash md5&lt;BR /&gt;isakmp policy 10 group 2&lt;BR /&gt;isakmp policy 10 lifetime 28800&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 200 authentication pre-share&lt;BR /&gt;isakmp policy 200 encryption 3des&lt;BR /&gt;isakmp policy 200 hash sha&lt;BR /&gt;isakmp policy 200 group 2&lt;BR /&gt;isakmp policy 200 lifetime 86400&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 10:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634344#M595019</guid>
      <dc:creator>Thiago Cella</dc:creator>
      <dc:date>2011-01-07T10:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634345#M595020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please share the output of access-list VPN2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX might be a little bit lax in regards to matching or have mirror image access-list with the remote end. You would definitely need to have mirror image ACL with the remote VPN device. If you could get the crypto ACL on the remote end so you can match it on your end (configure mirror image ACL), that would resolve the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 12:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634345#M595020</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-07T12:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634346#M595021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, i forgot the ACLs :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NATIFS extended permit icmp 192.168.1.0 255.255.255.0 201.77.XXX.XXX 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list VPNIFS extended permit tcp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq lpd &lt;BR /&gt;access-list VPNIFS extended permit icmp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 &lt;BR /&gt;access-list VPNIFS extended permit tcp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL the another side is that,(one detail, the other side is a&amp;nbsp; router)&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 159 permit tcp 201.77.XXX.XXX 0.0.0.7 eq 3389 172.20.3.32 0.0.0.7&lt;BR /&gt;access-list 159 permit tcp 201.77.XXX.XXX 0.0.0.7 172.20.3.32 0.0.0.7 eq lpd&lt;BR /&gt;access-list 159 permit icmp 201.77.XXX.XXX 0.0.0.7 172.20.3.32 0.0.0.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 12:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634346#M595021</guid>
      <dc:creator>Thiago Cella</dc:creator>
      <dc:date>2011-01-07T12:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634347#M595022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doesn't seem to be mirror image to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA end has "host 172.20.3.33" while the router end has "172.20.3.32 0.0.0.7"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since you have access to the ASA end, you would need to change the VPNIF ACL:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;FROM&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;access-list VPNIFS extended permit tcp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq lpd &lt;BR /&gt;access-list VPNIFS extended permit icmp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 &lt;BR /&gt;access-list VPNIFS extended permit tcp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;TO&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;access-list VPNIFS extended permit tcp 172.20.3.32 255.255.255.248 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq lpd &lt;BR /&gt;access-list VPNIFS extended permit icmp 172.20.3.32 255.255.255.248 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 &lt;BR /&gt;access-list VPNIFS extended permit tcp 172.20.3.32 255.255.255.248 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clear the tunnel: "clear cry isa sa" and "clear cry ipsec sa", and reestablish the tunnel.&lt;/P&gt;&lt;P&gt;It should work after that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 22:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634347#M595022</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-07T22:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634348#M595023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer tks again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But didnt work on ASA, but on PIX worked .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 23:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634348#M595023</guid>
      <dc:creator>Thiago Cella</dc:creator>
      <dc:date>2011-01-07T23:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634349#M595024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls kindly share the latest configuration, and also debug output. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 23:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634349#M595024</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-07T23:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634350#M595025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map biomap 1 match address VPN2&lt;/P&gt;&lt;P&gt;crypto map biomap 1 set peer 201.77.XXX.XXX&lt;/P&gt;&lt;P&gt;crypto map biomap 1 set transform-set bioset&lt;/P&gt;&lt;P&gt;crypto map biomap 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map biomap 1 set security-association lifetime kilobytes 2147483647&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 201.77.XXX.XXX type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 201.77.XXX.XXX ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 172.20.3.33&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list NATIFS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.20.3.37 192.168.1.101 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.20.3.38 192.168.1.102 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.20.3.36 192.168.1.100 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 28800&lt;/P&gt;&lt;P&gt;isakmp policy 200 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 200 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 200 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 200 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 200 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPNIFS extended permit tcp 172.20.3.32 255.255.255.248 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq lpd&lt;/P&gt;&lt;P&gt;access-list VPNIFS extended permit icmp 172.20.3.32 255.255.255.248 201.77.XXX.XXX&amp;nbsp; 255.255.255.248&lt;/P&gt;&lt;P&gt;access-list VPNIFS extended permit tcp 172.20.3.32 255.255.255.248 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 01 07:10:38 [IKEv1 DECODE]: IP = 201.77.XXX.XXX, IKE Responder starting QM: msg id = 92579587&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE RECEIVED Message (msgid=92579587) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 168&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing hash payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing SA payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing nonce payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing ID payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DECODE]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, ID_IPV4_ADDR_SUBNET ID received--201.77.217.104--255.255.255.248&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Received remote IP Proxy Subnet data in ID Payload:&amp;nbsp;&amp;nbsp; Address 201.77.217.104, Mask 255.255.255.248, Protocol 6, Port 0&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing ID payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DECODE]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, ID_IPV4_ADDR_SUBNET ID received--172.20.3.32--255.255.255.248&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Received local IP Proxy Subnet data in ID Payload:&amp;nbsp;&amp;nbsp; Address 172.20.3.32, Mask 255.255.255.248, Protocol 6, Port 515&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, QM IsRekeyed old sa not found by addr&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Static Crypto Map check, checking map = biomap, seq = 1...&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Static Crypto Map check, map = biomap, seq = 1, ACL does not match proxy IDs src:201.77.217.104 dst:172.20.3.32&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Static Crypto Map check, checking map = biomap, seq = 10...&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Static Crypto Map check, map = biomap, seq = 10, ACL does not match proxy IDs src:201.77.217.104 dst:172.20.3.32&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 201.77.217.104/255.255.255.248/6/0 local proxy 172.20.3.32/255.255.255.248/6/515 on interface outside&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, sending notify message&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing blank hash payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing qm hash payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE SENDING Message (msgid=9e59db25) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 224&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, QM FSM error (P2 struct &amp;amp;0xc6ed9718, mess id 0x92579587)!&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, IKE QM Responder FSM error history (struct &amp;amp;0xc6ed9718)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; QM_DONE, EV_ERROR--&amp;gt;QM_BLD_MSG2, EV_NEGO_SA--&amp;gt;QM_BLD_MSG2, EV_IS_REKEY--&amp;gt;QM_BLD_MSG2, EV_CONFIRM_SA--&amp;gt;QM_BLD_MSG2, EV_PROC_MSG--&amp;gt;QM_BLD_MSG2, EV_HASH_OK--&amp;gt;QM_BLD_MSG2, NullEvent--&amp;gt;QM_BLD_MSG2, EV_COMP_HASH&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, sending delete/delete with reason message&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Removing peer from correlator table failed, no match!&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE RECEIVED Message (msgid=c8902920) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing hash payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing delete&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Connection terminated for peer 201.77.XXX.XXX.&amp;nbsp; Reason: Peer Terminate&amp;nbsp; Remote Proxy N/A, Local Proxy N/A&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, sending delete/delete with reason message&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing blank hash payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing IPSec delete payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing qm hash payload&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE SENDING Message (msgid=3cd3241c) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 68&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Active unit receives a delete event for remote peer 201.77.XXX.XXX.&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, IKE Deleting SA: Remote Proxy 201.77.217.104, Local Proxy 172.20.3.33&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, IKE SA MM:23cef9a3 terminating:&amp;nbsp; flags 0x01000822, refcnt 0, tuncnt 0&lt;BR /&gt;Jan 01 07:10:38 [IKEv1]: Ignoring msg to mark SA with dsID 3764224 dead because SA deleted&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x431730e0&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x431730e0&lt;BR /&gt;Jan 01 07:10:38 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0xadea2864&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE Initiator: New Phase 1, Intf inside, IKE Peer 201.77.XXX.XXX&amp;nbsp; local Proxy Address 172.20.3.33, remote Proxy Address 201.77.217.104,&amp;nbsp; Crypto map (biomap)&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, constructing ISAKMP SA payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 144&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + NONE (0) total length : 80&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, processing SA payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, Oakley proposal is acceptable&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, constructing ke payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, constructing nonce payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, constructing Cisco Unity VID payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, constructing xauth V6 VID payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, Send IOS VID&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000409)&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, constructing VID payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 256&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + NONE (0) total length : 204&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, processing ke payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, processing ISA_KE payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, processing nonce payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, processing VID payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 0000000f)&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, Connection landed on tunnel_group 201.77.XXX.XXX&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Generating keys for Initiator...&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing ID payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing hash payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Computing hash for ISAKMP&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: IP = 201.77.XXX.XXX, Constructing IOS keep alive payload: proposal=32767/32767 sec.&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing dpd vid payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + IOS KEEPALIVE (128) + VENDOR (13) + NONE (0) total length : 96&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing ID payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DECODE]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, ID_IPV4_ADDR ID received&lt;BR /&gt;201.77.XXX.XXX&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, processing hash payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Computing hash for ISAKMP&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, Connection landed on tunnel_group 201.77.XXX.XXX&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Freeing previously allocated memory for authorization-dn-attributes&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Oakley begin quick mode&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DECODE]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, IKE Initiator starting QM: msg id = fa5a0899&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Delete with reason code capability is negotiated&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, PHASE 1 COMPLETED&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, Keep-alive type for this connection: IOS&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Starting P1 rekey timer: 21600 seconds.&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, IKE got SPI from key engine: SPI = 0x1c985b0f&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, oakley constucting quick mode&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing blank hash payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing IPSec SA payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing IPSec nonce payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing proxy ID&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, Transmitting Proxy Id:&lt;BR /&gt;&amp;nbsp; Local host:&amp;nbsp; 172.20.3.33&amp;nbsp; Protocol 1&amp;nbsp; Port 0&lt;BR /&gt;&amp;nbsp; Remote subnet: 201.77.217.104&amp;nbsp; Mask 255.255.255.248 Protocol 1&amp;nbsp; Port 0&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DECODE]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, IKE Initiator sending Initial Contact&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DEBUG]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, constructing qm hash payload&lt;BR /&gt;Jan 01 07:10:45 [IKEv1 DECODE]: Group = 201.77.XXX.XXX, IP = 201.77.XXX.XXX, IKE Initiator sending 1st QM pkt: msg id = fa5a0899&lt;BR /&gt;Jan 01 07:10:45 [IKEv1]: IP = 201.77.XXX.XXX, IKE_DECODE SENDING Message (msgid=fa5a0899) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) +&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 23:11:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634350#M595025</guid>
      <dc:creator>Thiago Cella</dc:creator>
      <dc:date>2011-01-07T23:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634351#M595026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version is your ASA firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, instead of using tcp and icmp protocol and ports in the crypto ACL, would you be able to change it to just IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA:&lt;/P&gt;&lt;P&gt;access-list VPNIFS extended permit ip 172.20.3.32 255.255.255.248 201.77.XXX.XXX&amp;nbsp; 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Router:&lt;/P&gt;&lt;P&gt;access-list 159 permit ip 201.77.XXX.XXX 0.0.0.7 172.20.3.32 0.0.0.7&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 23:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634351#M595026</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-07T23:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634352#M595027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cant test now this ACL, but tomorrow i will try.&amp;nbsp; The ASA is a 5505 with version 8.0(4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TKS!!!&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 23:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634352#M595027</guid>
      <dc:creator>Thiago Cella</dc:creator>
      <dc:date>2011-01-07T23:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634353#M595028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your suggestion worked!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TKS!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i have a doubt, why if this ACL :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPNIFS extended permit tcp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq lpd &lt;BR /&gt;access-list VPNIFS extended permit icmp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 &lt;BR /&gt;access-list VPNIFS extended permit tcp host 172.20.3.33 201.77.XXX.XXX&amp;nbsp; 255.255.255.248 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;works in PIX and the ASA not?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jan 2011 00:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634353#M595028</guid>
      <dc:creator>Thiago Cella</dc:creator>
      <dc:date>2011-01-09T00:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: Errors after Pix to ASA migration</title>
      <link>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634354#M595029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear.&lt;/P&gt;&lt;P&gt;It is typically recommended to use "ip" for crypto ACL rather than protocol and port specific. If you would like to restrict traffic, you can use ACL and applied that to the interface to restrict traffic.&lt;/P&gt;&lt;P&gt;There might be bug on the ASA version that you are running, that's why it's failing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jan 2011 10:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/errors-after-pix-to-asa-migration/m-p/1634354#M595029</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-09T10:50:32Z</dc:date>
    </item>
  </channel>
</rss>

