<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: isakmp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513688#M657520</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all here.&lt;/P&gt;&lt;P&gt;this topic was fixed. the connection was established, there was some firewall devices at remote end, unknown to those personnel ( strange though ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would help me if someone can throw some light on ways to reduce latency or improve performance over vpn. the is used for sort of animation drawing transfers and i am told , those are quite heavy images.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Oct 2010 08:15:40 GMT</pubDate>
    <dc:creator>suthomas1</dc:creator>
    <dc:date>2010-10-08T08:15:40Z</dc:date>
    <item>
      <title>isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513681#M657513</link>
      <description>&lt;P&gt;Gurus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are testing site-to-site vpn from asa and router. our end can ping the other host from inside the asa, but from our host we are not.&lt;/P&gt;&lt;P&gt;when the ping is started from host behind asa, the state is nothing in crypto isakmp sa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance for suggestions.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513681#M657513</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T18:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513682#M657514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you are missing NAT exemption on either ASA or Router or both. you ideally need to exempt the vpn traffic from Natting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For NAT emsmption on ASA: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#NEX1"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#NEX1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;For NAT exemption on Router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list NAT interface FastEthernet0/0 overload&lt;BR /&gt; !&lt;BR /&gt; ip access-list extended NAT&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.255 10.0.0.0 0.0.0.255&lt;BR /&gt; permit ip 192.168.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wherein 192.168.1.0 is an example network behind ASA and 10.0.0.0 is behind router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.0/24----------ASA=====================router----------------10.0.0.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cheers,&lt;/P&gt;&lt;P&gt;Rudresh V&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 11:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513682#M657514</guid>
      <dc:creator>Rudresh Veerappaji</dc:creator>
      <dc:date>2010-10-05T11:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513683#M657515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks rudresh. that exists on the devices.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 11:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513683#M657515</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-10-05T11:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513684#M657516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok, then if we have nat exempt correct, and we can ping remote network from inside interface of ASA (correct me if i understood wrong here), you need to check if the packets from the host is reaching the ASA when you ping (routing issue).&lt;/P&gt;&lt;P&gt;If routing is correct, then check the access-lists on the inside interface of ASA to see if we are blocking vpn traffic.&lt;/P&gt;&lt;P&gt;If access-lists are ok, then i suggest you run a packet tracer on the ASA as mentioned below, and share the output here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.0.0.0/24-------ASA==========================router------------192.168.0.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 10.0.0.10 8 0 192.168.0.10 detailed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----------------&amp;gt;packet from inside to outside of ASA, make sure yuo do not use&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside interface ip address of ASA for packet-tracer, it fails. You&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; can use any random ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside icmp 192.168.0.10 8 0 10.0.0.10 detailed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ------------------&amp;gt;packet from outside to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cheers,&lt;/P&gt;&lt;P&gt;Rudresh V&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 11:43:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513684#M657516</guid>
      <dc:creator>Rudresh Veerappaji</dc:creator>
      <dc:date>2010-10-05T11:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513685#M657517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're not seeing a phase 1 SA come up, try enabling 'debug crypto isakmp' and starting the ping again. You might also check the syslogs that are generated at the same time. This should give you some indication of why the tunnel is not coming up correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 12:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513685#M657517</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-05T12:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513686#M657518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Rudresh &amp;amp; Mike,&lt;/P&gt;&lt;P&gt;i will get asa site personnel to try the trace, may take couple of days before they get this. meanwhile, a question, if asa has lan as 192.168.100.1 /27 and router 1841 has lan as 172.16.1.4 /24. and the list on both of the allow as below for vpn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa - acl extended permit ip 192.168.100.0 255.255.255.224 to 172.16.1.112 255.255.255.224&lt;/P&gt;&lt;P&gt;1841-&amp;nbsp;&amp;nbsp; acl extended permit ip 172.16.1.112 255.255.255.224&amp;nbsp; 192.168.100.0 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will these hamper the described ping or vpn problem. or should the interface ip of router be also included.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 15:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513686#M657518</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-10-05T15:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513687#M657519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;since the remote device is a router 1841, my thinking says that esp/ah/nat-t, isakmp specific access lists are not required on the router.&lt;/P&gt;&lt;P&gt;please suggest if this is right or pls correct the statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Oct 2010 01:39:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513687#M657519</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-10-06T01:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: isakmp</title>
      <link>https://community.cisco.com/t5/network-security/isakmp/m-p/1513688#M657520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all here.&lt;/P&gt;&lt;P&gt;this topic was fixed. the connection was established, there was some firewall devices at remote end, unknown to those personnel ( strange though ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would help me if someone can throw some light on ways to reduce latency or improve performance over vpn. the is used for sort of animation drawing transfers and i am told , those are quite heavy images.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Oct 2010 08:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp/m-p/1513688#M657520</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-10-08T08:15:40Z</dc:date>
    </item>
  </channel>
</rss>

