<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Not seeing ESP or IPSEC packets with Packet-Capturing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3862603#M925480</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;When conducting on ASA a Packet-Capture filtering the 1 and only subnet of interesting traffic to use IPSEC tunnel as source to ANY, I am not seeing any ESP or IPSEC traffic on the Egress interface when viewing the PCAP in Wireshark.&lt;/P&gt;&lt;P&gt;show crypto ipsec and show ikev2 show the sa and packets being crypt and decrypt.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Are you filtering the capture based on interesting traffic (i.e. as defined in the ACL tied to your crypto map) or are you filter the capture based on the tunnel endpoints (i.e. the IP in the set peer field of the crypto map, and/or your firewall's IP)?&lt;/P&gt;</description>
    <pubDate>Fri, 24 May 2019 18:55:11 GMT</pubDate>
    <dc:creator>Jon Major</dc:creator>
    <dc:date>2019-05-24T18:55:11Z</dc:date>
    <item>
      <title>Not seeing ESP or IPSEC packets with Packet-Capturing</title>
      <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3862383#M925479</link>
      <description>&lt;P&gt;When conducting on ASA a Packet-Capture filtering the 1 and only subnet of interesting traffic to use IPSEC tunnel as source to ANY, I am not seeing any ESP or IPSEC traffic on the Egress interface when viewing the PCAP in Wireshark.&lt;/P&gt;&lt;P&gt;show crypto ipsec and show ikev2 show the sa and packets being crypt and decrypt.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:10:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3862383#M925479</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T17:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: Not seeing ESP or IPSEC packets with Packet-Capturing</title>
      <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3862603#M925480</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;When conducting on ASA a Packet-Capture filtering the 1 and only subnet of interesting traffic to use IPSEC tunnel as source to ANY, I am not seeing any ESP or IPSEC traffic on the Egress interface when viewing the PCAP in Wireshark.&lt;/P&gt;&lt;P&gt;show crypto ipsec and show ikev2 show the sa and packets being crypt and decrypt.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Are you filtering the capture based on interesting traffic (i.e. as defined in the ACL tied to your crypto map) or are you filter the capture based on the tunnel endpoints (i.e. the IP in the set peer field of the crypto map, and/or your firewall's IP)?&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 18:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3862603#M925480</guid>
      <dc:creator>Jon Major</dc:creator>
      <dc:date>2019-05-24T18:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: Not seeing ESP or IPSEC packets with Packet-Capturing</title>
      <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3863969#M925481</link>
      <description>Filtering based on interesting traffic.</description>
      <pubDate>Tue, 28 May 2019 17:16:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3863969#M925481</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-05-28T17:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: Not seeing ESP or IPSEC packets with Packet-Capturing</title>
      <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3863992#M925482</link>
      <description>Hi,&lt;BR /&gt;The interesting traffic will be encapsulated inside the ESP packets, these will be between the VPN peer IP addresses - you will never see the interesting traffic network on egress.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 28 May 2019 17:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3863992#M925482</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-05-28T17:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Not seeing ESP or IPSEC packets with Packet-Capturing</title>
      <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3864002#M925483</link>
      <description>Awesome thanks!&lt;BR /&gt;So you saying I will not see any ESP packets at all on the Egress interface only on the Ingress correct?</description>
      <pubDate>Tue, 28 May 2019 18:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3864002#M925483</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-05-28T18:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: Not seeing ESP or IPSEC packets with Packet-Capturing</title>
      <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3864012#M925484</link>
      <description>&lt;P&gt;You will see ESP packets on the egress, but between the VPN peer IP addresses (the external/outside interface of the router/firewall) only - the interesting traffic IP addresses will be encapsulated inside the ESP packets, the interesting traffic IP addresses themselves will not be visible on egress.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 18:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3864012#M925484</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-05-28T18:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Not seeing ESP or IPSEC packets with Packet-Capturing</title>
      <link>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3864039#M925485</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;You will see ESP packets on the egress, but between the VPN peer IP addresses (the external/outside interface of the router/firewall) only - the interesting traffic IP addresses will be encapsulated inside the ESP packets, the interesting traffic IP addresses themselves will not be visible on egress.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;What he said :D. ESP is the outer encapsulation around the packets sent between devices in your interesting traffic. For example, if your two firewalls are OUTSIDE/208.1.1.1 and OUTSIDE/209.1.1.1 and your interesting traffic is 192.168.1.0/24 -&amp;gt; 192.168.2.0/24 and you're looking at a telnet between 192.168.1.10:2432 -&amp;gt; 192.168.2.20:23, IPsec (tunnel mode) is going to encapsulate the original IP header (Src: 192.168.1.10,,Dst:192.168.2.10) and add new ESP header that's 208.1.1.1 -&amp;gt; 209.1.1.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are some caveats with the above, like IPsec transport mode, but that's a good rule of thumb to follow.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 19:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-seeing-esp-or-ipsec-packets-with-packet-capturing/m-p/3864039#M925485</guid>
      <dc:creator>Jon Major</dc:creator>
      <dc:date>2019-05-28T19:03:15Z</dc:date>
    </item>
  </channel>
</rss>

