<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: View number of IPSEC tunnels? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816824#M6577</link>
    <description>&lt;P&gt;I attached a pic to help - don't have Visio. I also made another post as I know this getting a bit more in depth. Basically need understanding.&lt;/P&gt;
&lt;P&gt;Let's say HQ router is head end router with all IPSEC configs for remote sites.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The circuit goes to another location (Provider in diagram) who handles the physical connections to the remote sites.&lt;/P&gt;
&lt;P&gt;So remote end configs for the tunnels are still built on devices at the remote site router or ASA, etc. correct?&lt;/P&gt;
&lt;P&gt;Would these tunnels for the remote sites be the child SAs? I am confused where or what would the main SA or tunnel be?&lt;/P&gt;
&lt;P&gt;So does the Transport provider just need our public ip addresses since they are not supposed to know about the tunnels?&lt;/P&gt;</description>
    <pubDate>Sat, 09 Mar 2019 17:52:21 GMT</pubDate>
    <dc:creator>CiscoBrownBelt</dc:creator>
    <dc:date>2019-03-09T17:52:21Z</dc:date>
    <item>
      <title>View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816554#M6571</link>
      <description>&lt;P&gt;From the ASA, if y ou do&amp;nbsp;sh crypto ikev2 sa, it show the following below. Are all the child SA just allowed subnets on the tunnel?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Session-id:2758, Status:UP-ACTIVE, IKE count:1, CHILD count:14&lt;/P&gt;
&lt;P&gt;Tunnel-id Local Remote Status Role&lt;BR /&gt;1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER&lt;BR /&gt;Encr: AES-CBC, keysize: 256, Hash: SHA384, DH Grp:21, Auth sign: PSK, Auth verify: PSK&lt;/P&gt;
&lt;P&gt;Life/Active Time: 86400/18416 sec&lt;/P&gt;
&lt;P&gt;Child sa: local selector X.X.X..0/0 - 1X.X.X..255/65535&lt;BR /&gt;remote selector X.X.X..160/0 - X.X.X.1/65535&lt;BR /&gt;ESP spi in/out: 0x6d1f4027/0xbbe517cf&lt;BR /&gt;Child sa: local selector X.X.X.28/0 - X.X.X.255/65535&lt;BR /&gt;remote selector X.X.X.60/0 - X.X.X.91/65535&lt;BR /&gt;ESP spi in/out: 0xbb935ee4/0xa7642a72&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816554#M6571</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T16:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816571#M6572</link>
      <description>&lt;P&gt;Yes. The networks defined in the crypto ACL will be identified as CHILD SA. If you have multiple networks defined in the ACL you will have multiple CHILD SAs. 1 IKE SA (identifying the VPN peers) will be created, then a CHILD SA per network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use the command show vpn-sessiondb detail l2l to indicate total number of IKE/IPSec tunnels&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 22:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816571#M6572</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-08T22:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816595#M6573</link>
      <description>Awesome!&lt;BR /&gt;So this particular example is IKEv2. &lt;BR /&gt;So 1IKE SA identifying peers like the "READY RESONDER" above correct?&lt;BR /&gt;So what would be best way to determine a CHILDE SA (so basically the remote site) is down or not properly sending traffic?</description>
      <pubDate>Fri, 08 Mar 2019 23:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816595#M6573</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-08T23:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816599#M6574</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;show crypto ikev2 sa detail&lt;/STRONG&gt;&lt;/EM&gt; will show you the IKE SA and CHILD count&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA-1# &lt;EM&gt;&lt;STRONG&gt;show crypto ikev2 sa detail&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;IKEv2 SAs:&lt;/P&gt;
&lt;P&gt;Session-id:1, Status:UP-ACTIVE, &lt;EM&gt;&lt;STRONG&gt;IKE count:1, CHILD count:2&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Tunnel-id Local Remote Status Role&lt;BR /&gt;2165229 1.1.1.1/500 3.3.3.1/500 READY RESPONDER&lt;BR /&gt;Encr: AES-CBC, keysize: 256, Hash: SHA256, DH Grp:14, Auth sign: PSK, Auth verify: PSK&lt;BR /&gt;Life/Active Time: 0/544 sec&lt;BR /&gt;Session-id: 1&lt;BR /&gt;Status Description: Negotiation done&lt;BR /&gt;Local spi: 2C539E8C33326D0E Remote spi: 50BCD8D9AFD45EE9&lt;BR /&gt;Local id: 1.1.1.1&lt;BR /&gt;Remote id: 3.3.3.1&lt;BR /&gt;Local req mess id: 41 Remote req mess id: 42&lt;BR /&gt;Local next mess id: 41 Remote next mess id: 42&lt;BR /&gt;Local req queued: 41 Remote req queued: 42&lt;BR /&gt;Local window: 1 Remote window: 1&lt;BR /&gt;DPD configured for 10 seconds, retry 2&lt;BR /&gt;NAT-T is not detected&lt;BR /&gt;IKEv2 Fragmentation Configured MTU: 576 bytes, Overhead: 28 bytes, Effective MTU: 548 bytes&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Child sa&lt;/STRONG&gt;&lt;/U&gt;: local selector &lt;EM&gt;&lt;STRONG&gt;192.168.100.0/0 - 192.168.100.255/65535&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;remote selector &lt;EM&gt;&lt;STRONG&gt;10.30.0.0/0 - 10.30.3.255/65535&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Child sa:&lt;/STRONG&gt;&lt;/U&gt; local selector &lt;EM&gt;&lt;STRONG&gt;10.10.0.0/0 - 10.10.0.255/65535&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;remote selector &lt;EM&gt;&lt;STRONG&gt;10.30.0.0/0 - 10.30.3.255/65535&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use the command &lt;EM&gt;&lt;STRONG&gt;show crypto ipsec sa &lt;/STRONG&gt;&lt;/EM&gt;and check the encaps|decaps these should be increasing as packets traverse the tunnel. If they are unequal, then you've probably got a nat or routing issue on one end of the tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA-1(config)# &lt;EM&gt;&lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;interface: OUTSIDE&lt;BR /&gt;Crypto map tag: CMAP, seq num: 3, local addr: 1.1.1.1&lt;/P&gt;
&lt;P&gt;access-list VPN_3 extended permit ip 10.10.0.0 255.255.255.0 10.30.0.0 255.255.252.0&lt;BR /&gt;local ident (addr/mask/prot/port): (10.10.0.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (10.30.0.0/255.255.252.0/0/0)&lt;BR /&gt;current_peer: 3.3.3.1&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;#pkts encaps: &lt;EM&gt;&lt;STRONG&gt;103&lt;/STRONG&gt;&lt;/EM&gt;, #pkts encrypt: 103, #pkts digest: 103&lt;BR /&gt;#pkts decaps: &lt;EM&gt;&lt;STRONG&gt;103&lt;/STRONG&gt;&lt;/EM&gt;, #pkts decrypt: 103, #pkts verify: 103&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 23:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816599#M6574</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-08T23:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816773#M6575</link>
      <description>Awesome thanks! I am a bit confused about couple things. So for my particular setup, We have these tunnels built as shown in my post, they go through another transport provider who handles the connections to our remote site. Are those child SAs the tunnel subnets for the natted ip addresses of the remote sites? Wouldn't the remote end device be at the actual remote site? Let me know if I am not explaining things clearly in what I am trying to ask. Thanks!</description>
      <pubDate>Sat, 09 Mar 2019 15:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816773#M6575</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-09T15:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816786#M6576</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Not entirely sure I am following...but whatever IP address/networks your devices are communicating with needs to be defined in the crypto ACL, which would create the associated CHILD SA. If the remote networks are natted then you'd need to define that in your crypto ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2019 15:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816786#M6576</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-09T15:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816824#M6577</link>
      <description>&lt;P&gt;I attached a pic to help - don't have Visio. I also made another post as I know this getting a bit more in depth. Basically need understanding.&lt;/P&gt;
&lt;P&gt;Let's say HQ router is head end router with all IPSEC configs for remote sites.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The circuit goes to another location (Provider in diagram) who handles the physical connections to the remote sites.&lt;/P&gt;
&lt;P&gt;So remote end configs for the tunnels are still built on devices at the remote site router or ASA, etc. correct?&lt;/P&gt;
&lt;P&gt;Would these tunnels for the remote sites be the child SAs? I am confused where or what would the main SA or tunnel be?&lt;/P&gt;
&lt;P&gt;So does the Transport provider just need our public ip addresses since they are not supposed to know about the tunnels?&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2019 17:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816824#M6577</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-09T17:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816829#M6578</link>
      <description>The provider would just need to be able to route to between the public/external IP addresses of your router or ASA at all of the sites. They wouldn't know about the networks being tunnel through the VPN, as they'd just see a load of encrypted traffic between the public/external IP addresses of your router/ASA.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 09 Mar 2019 18:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3816829#M6578</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-09T18:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3817063#M6579</link>
      <description>Great info!&lt;BR /&gt;So below I see one main tunnel I guess then a bunch of child SAs underneath (just as it shows in the GUI/ASDM). To my understanding, all the child SAs are different remote sites that go through the transport provider. I am basically trying to interpret the below because to my understanding, we have VPN tunnels that go through one transport location that handles the connections to the remote sites. Is my main tunnel is the "1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER". Does this sound about right? How is this configured?&lt;BR /&gt;</description>
      <pubDate>Sun, 10 Mar 2019 19:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3817063#M6579</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-10T19:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: View number of IPSEC tunnels?</title>
      <link>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3817749#M6659</link>
      <description>So can the different networks composing of the child SAs see each other's traffic since they do ride the same tunnel or is it basically like separate tunnels within the client/peer tunnel?</description>
      <pubDate>Tue, 12 Mar 2019 02:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-number-of-ipsec-tunnels/m-p/3817749#M6659</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-12T02:44:31Z</dc:date>
    </item>
  </channel>
</rss>

