<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA IPSec finding hosts that are using the tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758240#M8556</link>
    <description>&lt;P&gt;I would expect that, as the outside address is the peer address that the remote IPSec endpoints will be connecting to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its the remote address which you need to match against the crypto map set peer statement. That will tell you which ACL to look at to determine&amp;nbsp;the traffic flows which will be sent down the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Dec 2018 13:58:56 GMT</pubDate>
    <dc:creator>Seb Rupik</dc:creator>
    <dc:date>2018-12-05T13:58:56Z</dc:date>
    <item>
      <title>ASA IPSec finding hosts that are using the tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758130#M8553</link>
      <description>&lt;P&gt;Hello need advice on how to identify who is using an IPSec tunnel&lt;/P&gt;&lt;P&gt;can not capture packets using because of encryption, correct ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I do a show vpn-seas l2l I see the tunnel peer and the destination which is the Asa outside interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to identify who is actually using the tunnel, thanks for any help&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758130#M8553</guid>
      <dc:creator>JeffAllen0892</dc:creator>
      <dc:date>2020-02-21T16:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA IPSec finding hosts that are using the tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758135#M8554</link>
      <description>&lt;P&gt;HI there,&lt;/P&gt;&lt;P&gt;Check the ACL which is used to match traffic for the particular entry in the crypto map. Use the output from &lt;STRONG&gt;sh vpn-sessiondb det l2l&lt;/STRONG&gt; to find the remote address and cross reference that against the crypto map config peer address to find the correct entry.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at the ACL you can then determine from the IP source section which of your hosts are permitted to use the VPN, when trying to reach the destination subnet(s) specified by the ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since you can’t run a packet capture, do you have netflow configured? Failing that just look at the connection table, although this method will not give you any historic information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2018 11:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758135#M8554</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2018-12-05T11:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA IPSec finding hosts that are using the tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758218#M8555</link>
      <description>Seb&lt;BR /&gt;&lt;BR /&gt;The problem is the local address is the outside interface of the Asa&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Dec 2018 13:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758218#M8555</guid>
      <dc:creator>JeffAllen0892</dc:creator>
      <dc:date>2018-12-05T13:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA IPSec finding hosts that are using the tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758240#M8556</link>
      <description>&lt;P&gt;I would expect that, as the outside address is the peer address that the remote IPSec endpoints will be connecting to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its the remote address which you need to match against the crypto map set peer statement. That will tell you which ACL to look at to determine&amp;nbsp;the traffic flows which will be sent down the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2018 13:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758240#M8556</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2018-12-05T13:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA IPSec finding hosts that are using the tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758404#M8557</link>
      <description>Yes&lt;BR /&gt;&lt;BR /&gt;I am going to set up a log server and see if I see anything&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Dec 2018 17:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758404#M8557</guid>
      <dc:creator>JeffAllen0892</dc:creator>
      <dc:date>2018-12-05T17:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA IPSec finding hosts that are using the tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758456#M8559</link>
      <description>Set up logging server set to sev 7 still can figure out who is hitting the tunnel&lt;BR /&gt;&lt;BR /&gt;Any insight would be appreciated&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Dec 2018 18:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758456#M8559</guid>
      <dc:creator>JeffAllen0892</dc:creator>
      <dc:date>2018-12-05T18:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA IPSec finding hosts that are using the tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758582#M8560</link>
      <description>&lt;P&gt;We do not know details of your environment, but in many of the site to site vpn the acl used to identify traffic for the tunnel just permit local subnet x to go to remote subnet y. In that case the acl does not have anything that can identify which specific local hosts are using the vpn. I find the suggestion about net flow very interesting. If you do have net flow implemented then you could possibly look in the net flow data for source addresses in the local subnet and destination addresses in the remote subnet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2018 22:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-finding-hosts-that-are-using-the-tunnel/m-p/3758582#M8560</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2018-12-05T22:14:47Z</dc:date>
    </item>
  </channel>
</rss>

