<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow IPSec Traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324959#M764272</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please get the show service-policy and the logs when the client is trying to pass traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Oct 2009 21:40:45 GMT</pubDate>
    <dc:creator>Ivan Martinon</dc:creator>
    <dc:date>2009-10-28T21:40:45Z</dc:date>
    <item>
      <title>Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324956#M764269</link>
      <description>&lt;P&gt;We are trying to establish vpn connection using cisco vpn client on laptop to a vpn concentrator in a remote office. All network devices are in the same private network. There is a Cisco ASA 5505 firewall sitting between VPN client and VPN Concentrator. IPSec over TCP  &amp;amp; IPSec over UDP works fine. But plain IPsec will not work. We will be able to establish connection with plain IPSec but can't access resources behind the VPN concentrator. I am attaching the config Cisco ASA firewall for your reference. Please let me know what I am missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324956#M764269</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2019-03-11T16:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324957#M764270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try getting rid of the global defined on your config and disable nat-control, also just remember that ipsec pass through is only applicable for one to one translations, since your static is in place this should work ok. Try that and let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324957#M764270</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-10-28T21:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324958#M764271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Imartino,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got rid of those 2 commands using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no global (outside) 1 interface&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still the same problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324958#M764271</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2009-10-28T21:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324959#M764272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please get the show service-policy and the logs when the client is trying to pass traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324959#M764272</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-10-28T21:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324960#M764273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "show service-policy"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface outside:&lt;/P&gt;&lt;P&gt;  Service-policy: test-udp-policy&lt;/P&gt;&lt;P&gt;    Class-map: test-udp-class&lt;/P&gt;&lt;P&gt;      Inspect: ipsec-pass-thru pol-type1, packet 42, drop 0, reset-drop 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show conn"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9 in use, 12 most used&lt;/P&gt;&lt;P&gt;AH outside 0.0.0.0 inside 0.0.0.0, idle 0:11:52, bytes 0&lt;/P&gt;&lt;P&gt;ESP outside 0.0.0.0 inside 0.0.0.0, idle 0:11:52, bytes 0&lt;/P&gt;&lt;P&gt;ESP outside 192.168.34.7 inside 10.47.200.5, idle 0:01:01, bytes 12592&lt;/P&gt;&lt;P&gt;AH outside 192.168.34.7 inside 10.47.200.5, idle 0:11:52, bytes 0&lt;/P&gt;&lt;P&gt;ESP outside 192.168.34.7 inside 10.47.200.5, idle 0:11:52, bytes 0&lt;/P&gt;&lt;P&gt;UDP outside 192.168.34.7:500 inside 10.47.200.5:500, idle 0:01:01, bytes 3431, flags -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324960#M764273</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2009-10-28T21:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324961#M764274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you get any drops on the logs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324961#M764274</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-10-28T21:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324962#M764275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No I don't see any drops on the log. This problem is killing me. I thought it would be simple.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324962#M764275</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2009-10-28T21:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324963#M764276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you change the acess-list to include IP rather than udp.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324963#M764276</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-10-28T21:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324964#M764278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I allowed ip traffic instead of udp. Still no success.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 23:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324964#M764278</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2009-10-28T23:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Allow IPSec Traffic</title>
      <link>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324965#M764279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you connect your laptop to the outside network and ensure that it's working without passing through ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. with the no nat-control you don't need the static statement, so can you remove it also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.in second test if you keep the static Identity, use nat exemption instead (I already experienced problem related to that).&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Oct 2009 02:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ipsec-traffic/m-p/1324965#M764279</guid>
      <dc:creator>Amadou TOURE</dc:creator>
      <dc:date>2009-10-29T02:30:02Z</dc:date>
    </item>
  </channel>
</rss>

