<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX535 VPN Remote peer issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822361#M959534</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi russell&lt;/P&gt;&lt;P&gt;   How do you dedect that it picks a wrong IP? Any syslog output?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Dec 2007 14:28:11 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2007-12-03T14:28:11Z</dc:date>
    <item>
      <title>PIX535 VPN Remote peer issue</title>
      <link>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822360#M959533</link>
      <description>&lt;P&gt;Quite a strange problem and also intermittent. One particular VPN in crypto map list keeps picking up the wrong remote peer to the one configured in the crypto map, sometimes this can be an invalid peer address, such as 50.0.0.0. This is currently happening about once a week. PIX OS is 6.3(5) any suggestions?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822360#M959533</guid>
      <dc:creator>russell.kelly</dc:creator>
      <dc:date>2019-03-11T11:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX535 VPN Remote peer issue</title>
      <link>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822361#M959534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi russell&lt;/P&gt;&lt;P&gt;   How do you dedect that it picks a wrong IP? Any syslog output?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2007 14:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822361#M959534</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-03T14:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX535 VPN Remote peer issue</title>
      <link>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822362#M959535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - normally the cusomer lets us know that it has stopped working and issueing the command "sh crypto ipsec sa" confirms that the peer is 50.0.0.0&lt;/P&gt;&lt;P&gt;(local  ident (addr/mask/prot/port): AXA_ftpap001/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;   remote ident (addr/mask/prot/port): (192.168.1.1/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;   current_peer: 50.0.0.0:0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;local crypto endpt.: TheAAPIX_Peer, remote crypto endpt.: 50.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After a reboot the same command outputs the correct peer information (AXA_Peer) for about a week then the same thing happens again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the releavant config for this connection. Line 2 on the ACL is the only one that gets used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name x.x.x.x AXA_Peer&lt;/P&gt;&lt;P&gt;name x.x.x.x AXA_ftpap001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host 192.168.1.1 host AXA_ftpap001 eq 1363 &lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host 192.168.1.1 host AXA_ftpap001 eq 1364 &lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host TheAA_FTP host AXA_ftpap001 eq 1363 &lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host TheAA_FTP host AXA_ftpap001 eq 1364 &lt;/P&gt;&lt;P&gt;access-list AXA permit ip host 192.168.1.1 host AXA_ftpap001 &lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host AXA_ftpap001 host 192.168.1.1 eq 1364 &lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host AXA_ftpap001 host 192.168.1.1 eq 1363 &lt;/P&gt;&lt;P&gt;access-list AXA permit ip host AXA_ftpap001 host 192.168.1.1 &lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host AXA_ftpap001 host TheAA_FTP eq 1363 &lt;/P&gt;&lt;P&gt;access-list AXA permit tcp host AXA_ftpap001 host TheAA_FTP eq 1364 &lt;/P&gt;&lt;P&gt;access-list AXA permit ip host AXA_ftpap001 host TheAA_FTP &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AXA1 permit ip host TheAA_FTP host AXA_ftpap001 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz_v905,outside) 192.168.1.1 access-list AXA1 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map aa3party 250 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map aa3party 250 match address AXA&lt;/P&gt;&lt;P&gt;crypto map aa3party 250 set peer AXA_Peer&lt;/P&gt;&lt;P&gt;crypto map aa3party 250 set transform-set aa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp key ******** address AXA_Peer netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set aa esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2007 14:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822362#M959535</guid>
      <dc:creator>russell.kelly</dc:creator>
      <dc:date>2007-12-03T14:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: PIX535 VPN Remote peer issue</title>
      <link>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822363#M959536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide some additional information on this issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, make sure that you dont have Overlapping Access-list, meaning same destination network configured for two different peers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2007 14:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822363#M959536</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2007-12-03T14:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: PIX535 VPN Remote peer issue</title>
      <link>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822364#M959537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have just rebooted the PIX and as you can see below the correct peer information is there and the file transfer is now working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;local  ident (addr/mask/prot/port): (AXA_ftpap001/255.255.255.255/6/0)&lt;/P&gt;&lt;P&gt;   remote ident (addr/mask/prot/port): (192.168.1.1/255.255.255.255/6/1364)&lt;/P&gt;&lt;P&gt;   current_peer: AXA_Peer:0&lt;/P&gt;&lt;P&gt;     PERMIT, flags={origin_is_acl,reassembly_needed,}&lt;/P&gt;&lt;P&gt;    #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0&lt;/P&gt;&lt;P&gt;    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0&lt;/P&gt;&lt;P&gt;    #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;    #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;    #send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     local crypto endpt.: TheAAPIX_Peer, remote crypto endpt.: AXA_Peer&lt;/P&gt;&lt;P&gt;     path mtu 1500, ipsec overhead 0, media mtu 1500&lt;/P&gt;&lt;P&gt;     current outbound spi: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     inbound esp sas:&lt;/P&gt;&lt;P&gt;     inbound ah sas:&lt;/P&gt;&lt;P&gt;     inbound pcp sas:&lt;/P&gt;&lt;P&gt;     outbound esp sas:&lt;/P&gt;&lt;P&gt;     outbound ah sas:&lt;/P&gt;&lt;P&gt;     outbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2007 16:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix535-vpn-remote-peer-issue/m-p/822364#M959537</guid>
      <dc:creator>russell.kelly</dc:creator>
      <dc:date>2007-12-03T16:57:09Z</dc:date>
    </item>
  </channel>
</rss>

