<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Only one sides of IPSec tunnel encrypting packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/only-one-sides-of-ipsec-tunnel-encrypting-packets/m-p/1334647#M859143</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;looks like your tunnel is up but you are only receiving traffic only one  direction so the device above is receiving trafic and decrypting it but nothing behind this device is sending traffic out  so there is nothing to encrypt on the tunnel. Best to have a PC at both end and test sending ICMP data across the tunnel and look at the stats again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francisco&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Jun 2009 15:34:56 GMT</pubDate>
    <dc:creator>francisco_1</dc:creator>
    <dc:date>2009-06-24T15:34:56Z</dc:date>
    <item>
      <title>Only one sides of IPSec tunnel encrypting packets</title>
      <link>https://community.cisco.com/t5/network-security/only-one-sides-of-ipsec-tunnel-encrypting-packets/m-p/1334645#M859141</link>
      <description>&lt;P&gt;Any ideas as to how onside of the tunnel is not encrypting traffic thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;      #pkts decaps: 26731, #pkts decrypt: 26731,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto isakmp sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;18  IKE Peer: Vendor&lt;/P&gt;&lt;P&gt;    Type    : L2L             Role    : responder &lt;/P&gt;&lt;P&gt;    Rekey   : no              State   : MM_ACTIVE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto ipsec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto map tag: vpn_map, seq num: 4, local addr: 198.X.227.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      access-list VPN_TO_Vendor permit ip host 10.20.12.127 host 192.168.13.3 &lt;/P&gt;&lt;P&gt;      local ident (addr/mask/prot/port): (10.20.12.127/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;      remote ident (addr/mask/prot/port): (192.168.13.3/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;      current_peer: Vendor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;      #pkts decaps: 26731, #pkts decrypt: 26731, #pkts verify: 26731&lt;/P&gt;&lt;P&gt;      #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/P&gt;&lt;P&gt;      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/P&gt;&lt;P&gt;      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/P&gt;&lt;P&gt;      #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      local crypto endpt.: 198.X.227.X, remote crypto endpt.: Vendor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      path mtu 1500, ipsec overhead 58, media mtu 1500&lt;/P&gt;&lt;P&gt;      current outbound spi: 1205B666&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    inbound esp sas:&lt;/P&gt;&lt;P&gt;      spi: 0x0B404729 (188761897)&lt;/P&gt;&lt;P&gt;         transform: esp-3des esp-sha-hmac none &lt;/P&gt;&lt;P&gt;         in use settings ={L2L, Tunnel, }&lt;/P&gt;&lt;P&gt;         slot: 0, conn_id: 119238656, crypto-map: vpn_map&lt;/P&gt;&lt;P&gt;         sa timing: remaining key lifetime (kB/sec): (4274991/27948)&lt;/P&gt;&lt;P&gt;         IV size: 8 bytes&lt;/P&gt;&lt;P&gt;         replay detection support: Y&lt;/P&gt;&lt;P&gt;    outbound esp sas:&lt;/P&gt;&lt;P&gt;      spi: 0x1205B666 (302364262)&lt;/P&gt;&lt;P&gt;         transform: esp-3des esp-sha-hmac none &lt;/P&gt;&lt;P&gt;         in use settings ={L2L, Tunnel, }&lt;/P&gt;&lt;P&gt;         slot: 0, conn_id: 119238656, crypto-map: vpn_map&lt;/P&gt;&lt;P&gt;         sa timing: remaining key lifetime (kB/sec): (4275000/27948)&lt;/P&gt;&lt;P&gt;         IV size: 8 bytes&lt;/P&gt;&lt;P&gt;         replay detection support: Y&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/only-one-sides-of-ipsec-tunnel-encrypting-packets/m-p/1334645#M859141</guid>
      <dc:creator>techsupport</dc:creator>
      <dc:date>2019-03-11T15:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Only one sides of IPSec tunnel encrypting packets</title>
      <link>https://community.cisco.com/t5/network-security/only-one-sides-of-ipsec-tunnel-encrypting-packets/m-p/1334646#M859142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your crypto map config and acl's on the ASA? What are you connecting to on the other end, and can you post those configs as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, looking at this map, you're encrypting traffic from one host. This has to match on your "vendors" end the opposite direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your side:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;access-list VPN_TO_Vendor permit ip host 10.20.12.127 host 192.168.13.3 &lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vendors side:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;access-list VPN_TO_Vendor permit ip host 192.168.13.3 host 10.20.12.127&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you also need to make sure that you're not natting that connection with an acl:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NONAT permit ip host 10.20.12.127 host 192.168.13.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jun 2009 15:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/only-one-sides-of-ipsec-tunnel-encrypting-packets/m-p/1334646#M859142</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2009-06-24T15:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Only one sides of IPSec tunnel encrypting packets</title>
      <link>https://community.cisco.com/t5/network-security/only-one-sides-of-ipsec-tunnel-encrypting-packets/m-p/1334647#M859143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;looks like your tunnel is up but you are only receiving traffic only one  direction so the device above is receiving trafic and decrypting it but nothing behind this device is sending traffic out  so there is nothing to encrypt on the tunnel. Best to have a PC at both end and test sending ICMP data across the tunnel and look at the stats again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francisco&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jun 2009 15:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/only-one-sides-of-ipsec-tunnel-encrypting-packets/m-p/1334647#M859143</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2009-06-24T15:34:56Z</dc:date>
    </item>
  </channel>
</rss>

