cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1624
Views
0
Helpful
4
Replies

VPN Decaps and Decrypts

Jon Eyes
Level 1
Level 1

Hi Everyone,

Any idea what could be causing this?

 

#pkts encaps: 1181, #pkts encrypt: 1181, #pkts digest: 1181
#pkts decaps: 1181, #pkts decrypt: 0, #pkts verify: 0

 

we usually encounter encaps/encrypts are incrementing, but no decaps/encrypt -- usually is nat issue, but this one is different.

 

Advance thanks

 

 

2 Accepted Solutions

Accepted Solutions

balaji.bandi
Hall of Fame
Hall of Fame

Look at both the device log output and compare config, This could happen when there's a route problem, NAT problem, or some sort of VPN filter.

 

Check the tunnel configuration on both the devices  and check the is the Tunnel up ?

 

show crypto isakmp sa
show crypto ipsec sa

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

View solution in original post

Make sure that return traffic is routed over the crypto interface. Also,
run a packet trace while the SA is up to see of the return packet will get
encrypted by responding device or not

View solution in original post

4 Replies 4

balaji.bandi
Hall of Fame
Hall of Fame

Look at both the device log output and compare config, This could happen when there's a route problem, NAT problem, or some sort of VPN filter.

 

Check the tunnel configuration on both the devices  and check the is the Tunnel up ?

 

show crypto isakmp sa
show crypto ipsec sa

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Hi,
It worked after we reconfigured and retyped the corresponding tunnel-group.. exactly the same.
We are using pre-shared key, not sure it was the key, but a mismatched key should be visible in the debug, and tunnel should not form from the start. This one the tunnel stood up and was stable, it's just the decrypt is not incrementing
Thanks for the input though

Make sure that return traffic is routed over the crypto interface. Also,
run a packet trace while the SA is up to see of the return packet will get
encrypted by responding device or not

Hi,
It worked after we reconfigured and retyped the corresponding tunnel-group.. exactly the same.
We are using pre-shared key, not sure it was the key, but a mismatched key should be visible in the debug, and tunnel should not form from the start. This one the tunnel stood up and was stable, it's just the decrypt is not incrementing
Thanks for the input though

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card