05-24-2019 07:23 AM - edited 02-21-2020 09:10 AM
When conducting on ASA a Packet-Capture filtering the 1 and only subnet of interesting traffic to use IPSEC tunnel as source to ANY, I am not seeing any ESP or IPSEC traffic on the Egress interface when viewing the PCAP in Wireshark.
show crypto ipsec and show ikev2 show the sa and packets being crypt and decrypt.
Any ideas?
Solved! Go to Solution.
05-28-2019 11:24 AM - edited 05-28-2019 11:44 AM
You will see ESP packets on the egress, but between the VPN peer IP addresses (the external/outside interface of the router/firewall) only - the interesting traffic IP addresses will be encapsulated inside the ESP packets, the interesting traffic IP addresses themselves will not be visible on egress.
HTH
05-28-2019 12:03 PM
@Rob Ingram wrote:You will see ESP packets on the egress, but between the VPN peer IP addresses (the external/outside interface of the router/firewall) only - the interesting traffic IP addresses will be encapsulated inside the ESP packets, the interesting traffic IP addresses themselves will not be visible on egress.
HTH
What he said :D. ESP is the outer encapsulation around the packets sent between devices in your interesting traffic. For example, if your two firewalls are OUTSIDE/208.1.1.1 and OUTSIDE/209.1.1.1 and your interesting traffic is 192.168.1.0/24 -> 192.168.2.0/24 and you're looking at a telnet between 192.168.1.10:2432 -> 192.168.2.20:23, IPsec (tunnel mode) is going to encapsulate the original IP header (Src: 192.168.1.10,,Dst:192.168.2.10) and add new ESP header that's 208.1.1.1 -> 209.1.1.1.
There are some caveats with the above, like IPsec transport mode, but that's a good rule of thumb to follow.
05-24-2019 11:55 AM
@CiscoBrownBelt wrote:When conducting on ASA a Packet-Capture filtering the 1 and only subnet of interesting traffic to use IPSEC tunnel as source to ANY, I am not seeing any ESP or IPSEC traffic on the Egress interface when viewing the PCAP in Wireshark.
show crypto ipsec and show ikev2 show the sa and packets being crypt and decrypt.
Any ideas?
Are you filtering the capture based on interesting traffic (i.e. as defined in the ACL tied to your crypto map) or are you filter the capture based on the tunnel endpoints (i.e. the IP in the set peer field of the crypto map, and/or your firewall's IP)?
05-28-2019 10:16 AM
05-28-2019 10:57 AM
05-28-2019 11:12 AM
05-28-2019 11:24 AM - edited 05-28-2019 11:44 AM
You will see ESP packets on the egress, but between the VPN peer IP addresses (the external/outside interface of the router/firewall) only - the interesting traffic IP addresses will be encapsulated inside the ESP packets, the interesting traffic IP addresses themselves will not be visible on egress.
HTH
05-28-2019 12:03 PM
@Rob Ingram wrote:You will see ESP packets on the egress, but between the VPN peer IP addresses (the external/outside interface of the router/firewall) only - the interesting traffic IP addresses will be encapsulated inside the ESP packets, the interesting traffic IP addresses themselves will not be visible on egress.
HTH
What he said :D. ESP is the outer encapsulation around the packets sent between devices in your interesting traffic. For example, if your two firewalls are OUTSIDE/208.1.1.1 and OUTSIDE/209.1.1.1 and your interesting traffic is 192.168.1.0/24 -> 192.168.2.0/24 and you're looking at a telnet between 192.168.1.10:2432 -> 192.168.2.20:23, IPsec (tunnel mode) is going to encapsulate the original IP header (Src: 192.168.1.10,,Dst:192.168.2.10) and add new ESP header that's 208.1.1.1 -> 209.1.1.1.
There are some caveats with the above, like IPsec transport mode, but that's a good rule of thumb to follow.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide