<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC VPN Tunnle Problem in CISCO ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098542#M893395</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have reconfigured the Phase 2 for IPSEC VPN tunnel at local end and now it is working fine. We are able to PING both location LAN segments properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to you for your help and support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Nov 2008 09:29:10 GMT</pubDate>
    <dc:creator>sarkar.sandip</dc:creator>
    <dc:date>2008-11-21T09:29:10Z</dc:date>
    <item>
      <title>IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098528#M893355</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have created IPSEC VPN tunnel between two Cisco ASA 5510 firewall. After establishing the VPN tunnel, when we are generating the traffic in that tunnel, it is showing up and active but we are unbale to "PING" or access our local LAN segments. I am getting the following syslog error...&lt;/P&gt;&lt;P&gt;1       Nov 10 2008     16:21:22        713900   Group = XX.XX.XX.XX, IP = XX.XX.XX.XX, construct_ipsec_delete(): No SPI to identify Phase 2 SA!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note the IOS version of one firewall is Cisco ASA 8.0(4)for another one is Cisco ASA 7.0(7)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me by providing the neccessary solution to overcome this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098528#M893355</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2019-03-11T14:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098529#M893359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it sounds like you have not passed phase 2 of the VPN negotiations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would do the folllowing:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Check you have the same encryption and hash configuration for phase 2 at both ends.&lt;/P&gt;&lt;P&gt;2) Check that you encryption domains (interesting traffic access-list) allows the same subnets at  both ends.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post the output of:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug crypto ipsec 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 10:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098529#M893359</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T10:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098530#M893363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. As per your suggestion..I have checked the 2 points as you have mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the attach file containing the site to site VPN configuration for both end firewall. Please suggest ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advanced..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the output of sh crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IVOXFIRE# sh crypto ipsec sa&lt;/P&gt;&lt;P&gt;interface: outside&lt;/P&gt;&lt;P&gt;    Crypto map tag: IPSecMap, seq num: 40, local addr: xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      access-list 120 permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;      local ident (addr/mask/prot/port): (192.168.3.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;      remote ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;      current_peer: xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/P&gt;&lt;P&gt;      #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/P&gt;&lt;P&gt;      #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      local crypto endpt.: xx.xx.xx.xx, remote crypto endpt.: xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      path mtu 1500, ipsec overhead 74, media mtu 1500&lt;/P&gt;&lt;P&gt;      current outbound spi: 8995D15D&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    inbound esp sas:&lt;/P&gt;&lt;P&gt;      spi: 0x67FA295B (1744447835)&lt;/P&gt;&lt;P&gt;         transform: esp-aes esp-md5-hmac none&lt;/P&gt;&lt;P&gt;         in use settings ={L2L, Tunnel, }&lt;/P&gt;&lt;P&gt;         slot: 0, conn_id: 74, crypto-map: IPSecMap&lt;/P&gt;&lt;P&gt;         sa timing: remaining key lifetime (kB/sec): (4275000/27122)&lt;/P&gt;&lt;P&gt;         IV size: 16 bytes&lt;/P&gt;&lt;P&gt;         replay detection support: Y&lt;/P&gt;&lt;P&gt;    outbound esp sas:&lt;/P&gt;&lt;P&gt;      spi: 0x8995D15D (2308297053)&lt;/P&gt;&lt;P&gt;         transform: esp-aes esp-md5-hmac none&lt;/P&gt;&lt;P&gt;         in use settings ={L2L, Tunnel, }&lt;/P&gt;&lt;P&gt;         slot: 0, conn_id: 74, crypto-map: IPSecMap&lt;/P&gt;&lt;P&gt;         sa timing: remaining key lifetime (kB/sec): (4275000/27114)&lt;/P&gt;&lt;P&gt;         IV size: 16 bytes&lt;/P&gt;&lt;P&gt;         replay detection support: Y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 12:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098530#M893363</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2008-11-19T12:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098531#M893368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - your config looks good, the crypto ipsec sa's look good apart from one thing:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firstly this indicates that nothing from 192.168.3.0 (local) is going to 192.168.1.0 (remote) - worring&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does your local 192.168.3.0/24 network know where 192.168.1.0/24 is and how to get there?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any filtering on the inside interface that would block traffic from 192.168.3.0/24 to 192.168.1.0/24 ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the config's with any sensitive config removed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 12:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098531#M893368</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T12:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098532#M893373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the firewall configuration and suggest me for necessary action..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 12:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098532#M893373</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2008-11-19T12:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098533#M893376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK here are my observations:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Your acl "acl_inside" your first line is permit ip any any - which negates ALL other lines in the acl, as you are already allowing everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Your acl ""acl-inside" only alows ICMP ech0-reply.....so you cannot actually ping out - add the following line:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside line 4 extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) I always like to add specific routes for my VPN's try adding:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 192.168.1.0 255.255.255.255 &amp;lt;&lt;OUTSIDE interface="" ip="" address=""&gt;&amp;gt;&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;re-test and show the output of "show access-list acl_inside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 12:51:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098533#M893376</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T12:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098534#M893378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried the same and added the required commands in the firewall as you have mentioned. But still unable to PING the remote location LAN  segments(192.168.1.0/24) from (192.168.3.0/24).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 13:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098534#M893378</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2008-11-19T13:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098535#M893380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;output of "show access-list" ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 13:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098535#M893380</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-19T13:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098536#M893383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the attached file containing the output of show access-list..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 04:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098536#M893383</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2008-11-20T04:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098537#M893386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK thanks for the output, what I see is:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside line 1 extended permit ip any any (hitcnt=3442000)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can remove ALL other lines, as I said before they are useless.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 120 line 1 extended permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0 (hitcnt=321743)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This indicates that traffic is hitting the ACL for the VPN, but traffic is not shown in the IPSEC SA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would clear the access-list counters, and clear down the VPN and try to initiate it again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 09:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098537#M893386</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-20T09:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098538#M893388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have cleared the access-list counters as well as SA's by the following commands..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall#clear access-list 120 counters&lt;/P&gt;&lt;P&gt;Firewall#clear crypto ipsec sa&lt;/P&gt;&lt;P&gt;Firewall#clear crypto isakmp sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still unable to PING the remote LAN segment..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 09:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098538#M893388</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2008-11-20T09:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098539#M893390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;post output of:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto ispec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also - can you get the same from the remote end?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 09:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098539#M893390</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-20T09:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098540#M893392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As requested please find the attached files containing the required putputs for both location firewalls...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 10:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098540#M893392</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2008-11-20T10:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098541#M893393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the outputs, I would say you have an issue in the local end, as you have decrypted traffic, but not sent any.  The remote end has initiated the tunnel and sent traffic, which has been received but not responded to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check your IP routes, check your ACl's (again) debug debug debug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 10:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098541#M893393</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-11-20T10:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnle Problem in CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098542#M893395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have reconfigured the Phase 2 for IPSEC VPN tunnel at local end and now it is working fine. We are able to PING both location LAN segments properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to you for your help and support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Nov 2008 09:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnle-problem-in-cisco-asa/m-p/1098542#M893395</guid>
      <dc:creator>sarkar.sandip</dc:creator>
      <dc:date>2008-11-21T09:29:10Z</dc:date>
    </item>
  </channel>
</rss>

