<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777879#M7882</link>
    <description>&lt;P&gt;interesting config looks ok.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;run these command and share the output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug crypto conditon peer xxxxx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (This is the remote public ip address of the other side)&lt;/P&gt;&lt;P&gt;logging monitor debug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if on ssh connection run this command&lt;/P&gt;&lt;P&gt;ter monitor&lt;/P&gt;&lt;P&gt;And to disable it enter&lt;/P&gt;&lt;P&gt;terminal no monitor&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jan 2019 15:46:51 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-01-11T15:46:51Z</dc:date>
    <item>
      <title>Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777868#M7879</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am stuck in here as, VPN is successfully established between DC &amp;amp; Site1 but traffic (icmp or any other) is not flowing. Kindly help. Below are the two site IKV1 configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site 1:&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object-group network Datacenter_nw&lt;BR /&gt;network-object 192.168.20.0 255.255.255.0&lt;BR /&gt;network-object 10.55.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network LAN&lt;BR /&gt;subnet 10.184.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list SEATFWtoDatacenter extended permit ip object LAN object-group Datacenter_nw&lt;/P&gt;&lt;P&gt;nat (inside_1,outside) source static LAN LAN destination static Datacenter_nw Datacenter_nw no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 28800&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;&lt;BR /&gt;tunnel-group x.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.x.x ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set myvpnset esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map SEATVPN 1 match address SEATFWtoDatacenter&lt;BR /&gt;crypto map SEATVPN 1 set peer x.x.x.x&lt;BR /&gt;crypto map SEATVPN 1 set ikev1 transform-set myvpnset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;Active SA: 1&lt;BR /&gt;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;1 IKE Peer:&amp;nbsp;x.x.x.x&lt;BR /&gt;Type : L2L Role : initiator&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;BR /&gt;Encrypt : aes-256 Hash : SHA&lt;BR /&gt;Auth : preshared Lifetime: 28800&lt;BR /&gt;Lifetime Remaining: 27848&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NATTr.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 (inside_1) to (outside) source static LAN LAN destination static Datacenter_nw Datacenter_nw no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 7618, untranslate_hits = 7618&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list SEATFWtoDatacenter; 10 elements; name hash: 0xbf70aa0c&lt;BR /&gt;access-list SEATFWtoDatacenter line 1 extended permit ip object LAN object-group Datacenter_nw (hitcnt=42) 0xf67bb5c9&lt;BR /&gt;access-list SEATFWtoDatacenter line 1 extended permit ip 10.184.2.0 255.255.255.0 10.55.1.0 255.255.255.0 (hitcnt=39943) 0x862fb856&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DC :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object-group network Datacenter_lan&lt;BR /&gt;network-object 192.168.20.0 255.255.255.0&lt;BR /&gt;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;object-group network SeattleFW_lan&lt;BR /&gt;network-object 10.184.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list DatacentertoSEATFW extended permit ip object-group Datacenter_lan object-group SeattleFW_lan&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (inside,outside) 1 source static Datacenter_lan Datacenter_lan destination static SeattleFW_lan SeattleFW_lan no-proxy-arp route-lookup&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 28800&lt;BR /&gt;&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;tunnel-group x.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.x.x ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set myvpnset esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map outside_map2 60 match address DatacentertoSEATFW&lt;BR /&gt;crypto map outside_map2 60 set peer x.x.x.x&lt;BR /&gt;crypto map outside_map2 60 set ikev1 transform-set myvpnset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;30 IKE Peer: 96.79.192.233&lt;BR /&gt;Type : L2L Role : responder&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;BR /&gt;Encrypt : aes-256 Hash : SHA&lt;BR /&gt;Auth : preshared Lifetime: 28800&lt;BR /&gt;Lifetime Remaining: 27770&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT Tr.&lt;/P&gt;&lt;P&gt;1 (inside) to (outside) source static Datacenter_lan Datacenter_lan destination static SeattleFW_lan SeattleFW_lan no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 11, untranslate_hits = 11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access List-&lt;/P&gt;&lt;P&gt;access-list DatacentertoSEATFW; 2 elements; name hash: 0x6a9b85c7&lt;BR /&gt;access-list DatacentertoSEATFW line 1 extended permit ip object-group Datacenter_lan object-group SeattleFW_lan (hitcnt=0) 0x1cf33b31&lt;BR /&gt;access-list DatacentertoSEATFW line 1 extended permit ip 10.0.0.0 255.0.0.0 10.184.2.0 255.255.255.0 (hitcnt=32) 0x4bb5c8a0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777868#M7879</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2020-02-21T16:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777873#M7880</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;So you've got an IKE/ISAKMP SA, but do you have a IPSec SA? What is the output of &lt;EM&gt;&lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt;&lt;/EM&gt;?&lt;/P&gt;
&lt;P&gt;Do you see the encap|decap increasing?&lt;/P&gt;
&lt;P&gt;Are you pinging from the ASA itself or a device behind the ASA?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 15:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777873#M7880</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-11T15:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777879#M7882</link>
      <description>&lt;P&gt;interesting config looks ok.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;run these command and share the output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug crypto conditon peer xxxxx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (This is the remote public ip address of the other side)&lt;/P&gt;&lt;P&gt;logging monitor debug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if on ssh connection run this command&lt;/P&gt;&lt;P&gt;ter monitor&lt;/P&gt;&lt;P&gt;And to disable it enter&lt;/P&gt;&lt;P&gt;terminal no monitor&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 15:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777879#M7882</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-11T15:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777889#M7884</link>
      <description>&lt;P&gt;Continuous ping is running from 10.55.1.x to 10.184.2.x.&lt;BR /&gt;I observed the same packets are not encap/decap.&lt;/P&gt;&lt;P&gt;Here is the output.&lt;BR /&gt;Site1:&lt;BR /&gt;#pkts encaps: 516, #pkts encrypt: 516, #pkts digest: 516&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 460, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;DC:&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 516, #pkts decrypt: 516, #pkts verify: 516&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 15:54:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777889#M7884</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-11T15:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777891#M8268</link>
      <description>Site1 is sending (encaps) and DC is receiving (decaps), but DC is not returning the traffic (no encap). Checking the routing on DC end.</description>
      <pubDate>Fri, 11 Jan 2019 15:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777891#M8268</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-11T15:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777895#M8272</link>
      <description>logging monitor debug. Command is not working ASA5506.</description>
      <pubDate>Fri, 11 Jan 2019 16:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777895#M8272</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-11T16:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777897#M8274</link>
      <description>&lt;P&gt;Can you elaborate please ? following is only routing in dc side:&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0&amp;nbsp;x.x.x.x 1&lt;BR /&gt;route inside 10.55.1.0 255.255.255.0 10.1.20.1 1&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 16:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777897#M8274</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-11T16:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777902#M8276</link>
      <description>&lt;P&gt;What about the DC switch or router, does it have a route back for the Site1 networks to go via the ASA? If the DC ASA isn't encrypting traffic (which the output confirms) it probably means the traffic isn't getting to the ASA to be sent over the VPN tunnel.&lt;BR /&gt;&lt;BR /&gt;Also you object on DC is different to what you've defined on Site1 ASA.&lt;BR /&gt;&lt;BR /&gt;object-group network Datacenter_lan&lt;BR /&gt;network-object 192.168.20.0 255.255.255.0&lt;BR /&gt;network-object 10.0.0.0 255.0.0.0&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 16:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777902#M8276</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-11T16:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777904#M8278</link>
      <description>&lt;P&gt;I have changed the object to same as site1. But the issue is same. There is no router or switch. between asa.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 16:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777904#M8278</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-11T16:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777906#M8280</link>
      <description>Fine, the inconsistency was an observation. &lt;BR /&gt;&lt;BR /&gt;What about the routing?&lt;BR /&gt;&lt;BR /&gt;If DC ASA is not encrypting the traffic (which the output confirms) that chances are the traffic is not reaching the ASA. What is connected to the ASA on DC? A switch, if so please provide information on it's routing table</description>
      <pubDate>Fri, 11 Jan 2019 16:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777906#M8280</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-11T16:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777907#M8282</link>
      <description>Which traffic is not reaching dc (lan) to asa or from site 1 (lan) to dc asa ? there is managed switch but very little config. nothing important.</description>
      <pubDate>Fri, 11 Jan 2019 16:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777907#M8282</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-11T16:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777915#M8284</link>
      <description>&lt;P&gt;Site1:&lt;BR /&gt;&lt;STRONG&gt;#pkts encaps: 516, #pkts encrypt: 516, #pkts digest: 516&lt;/STRONG&gt;&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;&lt;BR /&gt;DC:&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;&lt;STRONG&gt;#pkts decaps: 516, #pkts decrypt: 516, #pkts verify: 516&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whatever traffic being sent from Site1 is being encrypted on Site1 ASA, it's then decrypted on DC ASA....but there is no traffic encrypted on the DC ASA so therefore nothing decrypted on Site1 ASA. So potentially the traffic on the DC network is not being routed to the DC ASA in the first place.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the managed switch at the DC the default gateway for the devices there?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 16:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777915#M8284</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-11T16:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777918#M8286</link>
      <description>&lt;P&gt;This clearly show there is a routing issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;make sure you have routing in place between your interested ACL. For example. Ping from firewall to your interested acl ip adress same on the other remote site too&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 16:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777918#M8286</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-11T16:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777933#M8288</link>
      <description>&lt;P&gt;his object-group networks are inconsistent. I know that sometimes ASA dont like that at all. On the site-1 he has 10.55.1.0/24&lt;/P&gt;
&lt;P&gt;and on the DC he has 10.0.0.0/8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could that be an issue?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 17:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777933#M8288</guid>
      <dc:creator>Hulk8647</dc:creator>
      <dc:date>2019-01-11T17:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777940#M8291</link>
      <description>Hi Hulk,&lt;BR /&gt;It was already noted the networks were inconsistent and amended.&lt;BR /&gt;&lt;BR /&gt;Inconsistent networks would usually cause an issue when establishing a VPN, in this instance the tunnel was actually established so this doesn't appear to be the issue here.</description>
      <pubDate>Fri, 11 Jan 2019 17:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777940#M8291</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-11T17:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777942#M8293</link>
      <description>oh yea, sorry, i missed that above.</description>
      <pubDate>Fri, 11 Jan 2019 17:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3777942#M8293</guid>
      <dc:creator>Hulk8647</dc:creator>
      <dc:date>2019-01-11T17:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: Site-2-Site VPN tunnel established ikev1 in asa but traffic not passing</title>
      <link>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3780431#M8295</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eventually, we figured it out. The issue was not with the routing as I have checked ASA can ping internal network and other VPN tunnel working great only issue with this site is that there was another NAT &amp;amp; ACL present which overlap the new VPN tunnel and that is why traffic was not passing through it. After removing it and re configuring the ACL's &amp;amp; NAT traffic is now flowing smoothly into the VPN tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the support.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 18:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-2-site-vpn-tunnel-established-ikev1-in-asa-but-traffic-not/m-p/3780431#M8295</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-15T18:07:47Z</dc:date>
    </item>
  </channel>
</rss>

