<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN ISSUE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791326#M983324</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;My vpn tunnel is not working nor anything shows in debug, please check my config if I am doing anything wrong.&lt;/P&gt;&lt;P&gt;--------&lt;/P&gt;&lt;P&gt;on ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map test_120 match address internet_cryptomap_120&lt;/P&gt;&lt;P&gt;crypto map test_120set peer 20.5.9.12&lt;/P&gt;&lt;P&gt;crypto map test_120 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map test_120 interface internet&lt;/P&gt;&lt;P&gt;crypto map test_120 set security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;isakmp enable internet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;isakmp policy 30 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 30 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 30 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 30 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 30 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 20.5.9.12 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 20.5.9.12 ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat0_outbound extended permit ip host 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;access-list internet_cryptomap_120 extended permit tcp host 10.10.12.14 host 192.168.1.1 eq www&lt;/P&gt;&lt;P&gt;access-list internet_cryptomap_120 extended permit icmp host 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;nat (optfir) 0 access-list optfir_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on PIX&lt;/P&gt;&lt;P&gt;crypto map vpn 70 match address outside_70_cryptomap_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set pfs &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set peer 143.22.1.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 143.22.1.1 type ipsec-l2l&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 143.22.1.1 ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_70_cryptomap_1 extended permit tcp 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound extended permit ip 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 3 192.168.1.1 netmask 255.255.255.0  &amp;lt;&amp;lt;&amp;lt;----here i am natting all internal to 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 3 access-list inside_nat_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 10:51:39 GMT</pubDate>
    <dc:creator>mohammedrafiq</dc:creator>
    <dc:date>2019-03-11T10:51:39Z</dc:date>
    <item>
      <title>VPN ISSUE</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791326#M983324</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;My vpn tunnel is not working nor anything shows in debug, please check my config if I am doing anything wrong.&lt;/P&gt;&lt;P&gt;--------&lt;/P&gt;&lt;P&gt;on ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map test_120 match address internet_cryptomap_120&lt;/P&gt;&lt;P&gt;crypto map test_120set peer 20.5.9.12&lt;/P&gt;&lt;P&gt;crypto map test_120 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map test_120 interface internet&lt;/P&gt;&lt;P&gt;crypto map test_120 set security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;isakmp enable internet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;isakmp policy 30 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 30 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 30 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 30 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 30 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 20.5.9.12 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 20.5.9.12 ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat0_outbound extended permit ip host 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;access-list internet_cryptomap_120 extended permit tcp host 10.10.12.14 host 192.168.1.1 eq www&lt;/P&gt;&lt;P&gt;access-list internet_cryptomap_120 extended permit icmp host 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;nat (optfir) 0 access-list optfir_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on PIX&lt;/P&gt;&lt;P&gt;crypto map vpn 70 match address outside_70_cryptomap_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set pfs &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set peer 143.22.1.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn 70 set security-association lifetime seconds 3600&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 143.22.1.1 type ipsec-l2l&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 143.22.1.1 ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_70_cryptomap_1 extended permit tcp 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound extended permit ip 10.10.12.14 host 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 3 192.168.1.1 netmask 255.255.255.0  &amp;lt;&amp;lt;&amp;lt;----here i am natting all internal to 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 3 access-list inside_nat_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791326#M983324</guid>
      <dc:creator>mohammedrafiq</dc:creator>
      <dc:date>2019-03-11T10:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN ISSUE</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791327#M983326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have several things wrong here..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.  You have pfs on the PIX, but not the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Your ACLs on the PIX are not a mirror of the ASA.  Basically, you must switch the source  and destination IPs in the crypto ACL and NAT 0 ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. You need to change your NAT command to a NAT 0.  Like ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat_outbound &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Please rate ***&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2007 14:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791327#M983326</guid>
      <dc:creator>jwalker</dc:creator>
      <dc:date>2007-07-31T14:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN ISSUE</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791328#M983330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;3. You need to change your NAT command to a NAT 0. Like ... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside_nat_outbound &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IS this will mean, do not nat,Please advice , that do need all internal ips to nat to 192.168.1.1 and then go to ASA.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2007 14:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791328#M983330</guid>
      <dc:creator>mohammedrafiq</dc:creator>
      <dc:date>2007-07-31T14:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: VPN ISSUE</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791329#M983332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need one nat/global pair for outbound access.  You will need a second nat for the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for outbound traffic:&lt;/P&gt;&lt;P&gt;nat (inside) 3 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 3 172.16.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for vpn:&lt;/P&gt;&lt;P&gt;access-list vpn_access extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list vpn_access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THIS MUST BE DONE ON BOTH FIREWALLS, AND MAKE SURE IT IS MIRRORED.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2007 14:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791329#M983332</guid>
      <dc:creator>jwalker</dc:creator>
      <dc:date>2007-07-31T14:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN ISSUE</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791330#M983335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for advice, just quick question , that we do not want to do natting on ASA.so do we still need vpn access-list on ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2007 14:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791330#M983335</guid>
      <dc:creator>mohammedrafiq</dc:creator>
      <dc:date>2007-07-31T14:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN ISSUE</title>
      <link>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791331#M983337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you mean?  For the VPN to work properly, you need the NAT 0 as I described.  Also, you will need some for of NAT to get to the internet.  This can also be done several other ways than I described, but that is the the most common (PAT).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** Please rate ***&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2007 14:33:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-issue/m-p/791331#M983337</guid>
      <dc:creator>jwalker</dc:creator>
      <dc:date>2007-07-31T14:33:04Z</dc:date>
    </item>
  </channel>
</rss>

