<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments for Think Netsec	</title>
	<atom:link href="https://www.thinknetsec.com/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://52.70.109.0/</link>
	<description>Think Network Security</description>
	<lastBuildDate>Tue, 17 Apr 2018 17:51:08 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>
	<item>
		<title>
		Comment on ASA Route Based VPN by John Finnegan		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-23</link>

		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Tue, 17 Apr 2018 17:51:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-23</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.thinknetsec.com/asa-route-based-vpn/#comment-22&quot;&gt;Shiva&lt;/a&gt;.

Hey Shiva,

That is a good question. Anything on the ASAs Local Networks, or any network that use the ASA as a default route, will technically be apart of the Encryption Domain. If that needs to be limited to specific networks, then ACL rules or filters would need to be used to only allow specific local traffic to traverse the VPN.

With Route Based VPNs, there isn&#039;t an actual encryption domain that is applied. If you look at the Security Association, you will see that both Local and Remote are 0.0.0.0/0. This is why everything on the ASA is apart of the VPN if the traffic is destined to anything with a Route using the VTI.

If you are troubleshooting and wanting to know what Local traffic is trying to use the tunnel, the easiest way is to perform a capture on all of the internal interfaces looking for anything destined to the VTI. Specifically, any network that is routed over the VTI. This will atleast show you all connections that are trying to send over the VTI but there is no quick way to determine which networks should have access. This is usually provided by either side stating what should be communicating over the tunnel.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.thinknetsec.com/asa-route-based-vpn/#comment-22">Shiva</a>.</p>
<p>Hey Shiva,</p>
<p>That is a good question. Anything on the ASAs Local Networks, or any network that use the ASA as a default route, will technically be apart of the Encryption Domain. If that needs to be limited to specific networks, then ACL rules or filters would need to be used to only allow specific local traffic to traverse the VPN.</p>
<p>With Route Based VPNs, there isn&#8217;t an actual encryption domain that is applied. If you look at the Security Association, you will see that both Local and Remote are 0.0.0.0/0. This is why everything on the ASA is apart of the VPN if the traffic is destined to anything with a Route using the VTI.</p>
<p>If you are troubleshooting and wanting to know what Local traffic is trying to use the tunnel, the easiest way is to perform a capture on all of the internal interfaces looking for anything destined to the VTI. Specifically, any network that is routed over the VTI. This will atleast show you all connections that are trying to send over the VTI but there is no quick way to determine which networks should have access. This is usually provided by either side stating what should be communicating over the tunnel.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on ASA Route Based VPN by Shiva		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-22</link>

		<dc:creator><![CDATA[Shiva]]></dc:creator>
		<pubDate>Tue, 17 Apr 2018 17:24:39 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-22</guid>

					<description><![CDATA[Hello Admin,

Thanks for the post. My question is what is local encryption domain here. To identify the remote encryption, atleast we have static route in place. But while troubleshooting how to identify the actual interesting traffic participating in this tunnel ?

Regards,
Shiva]]></description>
			<content:encoded><![CDATA[<p>Hello Admin,</p>
<p>Thanks for the post. My question is what is local encryption domain here. To identify the remote encryption, atleast we have static route in place. But while troubleshooting how to identify the actual interesting traffic participating in this tunnel ?</p>
<p>Regards,<br />
Shiva</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Different ASA NATs 8.3+ by John Finnegan		</title>
		<link>https://www.thinknetsec.com/different-asa-nats-8-3/#comment-21</link>

		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Sun, 15 Apr 2018 21:54:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.thinknetsec.com/?p=262#comment-21</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.thinknetsec.com/different-asa-nats-8-3/#comment-20&quot;&gt;Victor Alvarado&lt;/a&gt;.

Are you asking for me to send a Topology or are you asking if you could send me a Topology?]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.thinknetsec.com/different-asa-nats-8-3/#comment-20">Victor Alvarado</a>.</p>
<p>Are you asking for me to send a Topology or are you asking if you could send me a Topology?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Different ASA NATs 8.3+ by Victor Alvarado		</title>
		<link>https://www.thinknetsec.com/different-asa-nats-8-3/#comment-20</link>

		<dc:creator><![CDATA[Victor Alvarado]]></dc:creator>
		<pubDate>Sun, 15 Apr 2018 21:46:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.thinknetsec.com/?p=262#comment-20</guid>

					<description><![CDATA[Please  could send topology]]></description>
			<content:encoded><![CDATA[<p>Please  could send topology</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on ASA Route Based VPN by Olsonn		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-19</link>

		<dc:creator><![CDATA[Olsonn]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 18:25:39 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-19</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.thinknetsec.com/asa-route-based-vpn/#comment-18&quot;&gt;John Finnegan&lt;/a&gt;.

John, Thanks again for this very detailed explanation! it&#039;s really appreciated. Today i found something interesting: i couldn&#039;t access the asa via ssh anymore when a connection came from a remote location over the VTI interface and running on version 9.8.2. This issue is fixed in version 9.9.1.  See here as well https://supportforums.cisco.com/t5/vpn/ssh-snmp-access-to-asa-through-vti-tunnel/td-p/3226319]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.thinknetsec.com/asa-route-based-vpn/#comment-18">John Finnegan</a>.</p>
<p>John, Thanks again for this very detailed explanation! it&#8217;s really appreciated. Today i found something interesting: i couldn&#8217;t access the asa via ssh anymore when a connection came from a remote location over the VTI interface and running on version 9.8.2. This issue is fixed in version 9.9.1.  See here as well <a href="https://supportforums.cisco.com/t5/vpn/ssh-snmp-access-to-asa-through-vti-tunnel/td-p/3226319" rel="nofollow ugc">https://supportforums.cisco.com/t5/vpn/ssh-snmp-access-to-asa-through-vti-tunnel/td-p/3226319</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on ASA Route Based VPN by John Finnegan		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-18</link>

		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Fri, 16 Mar 2018 23:57:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-18</guid>

					<description><![CDATA[So the interface will not show RX/TX or IN/OUT. That is just there to show you if the interface is Active or not. If you wish to see that traffic is actually going in and out of the VTI, you should look at the IPSec SA for that tunnel interface. This will show you if you are in fact receiving and sending encrypted traffic over that tunnel (interface).

Here is an example:

&lt;pre&gt;&lt;code&gt;&lt;strong&gt;show int tunnel 3 detail&lt;/strong&gt;
Interface Tunnel3 &quot;ROUTE-BASED&quot;, is up, line protocol is up
  Hardware is Virtual Tunnel    MAC address N/A, MTU 1500
    IP address 169.254.224.253, subnet mask 255.255.255.252
  Control Point Interface States:
    Interface number is 17
    Interface config status is active
    Interface state is active
  Tunnel Interface Information:
    Source interface: OUTSIDE   IP address: 1.1.1.1
    Destination IP address: 2.2.2.2
    Mode: ipsec ipv4    IPsec profile: ROUTE-BASED-PROFILE

***********************************************

&lt;strong&gt;show ipsec sa peer 2.2.2.2&lt;/strong&gt;
interface: ROUTE-BASED
    Crypto map tag: __vti-crypto-map-7-0-3, seq num: 65280, local addr: 1.1.1.1

  local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
  remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
  current_peer: 2.2.2.2


 &lt;strong&gt; #pkts encaps: 101, #pkts encrypt: 101, #pkts digest: 101 &#060;&#060;----I have encaps (OUT)
  #pkts decaps: 101, #pkts decrypt: 101, #pkts verify: 101  &#060;&#060;---- I have decaps (IN)&lt;/strong&gt;
  #pkts compressed: 0, #pkts decompressed: 0
  #pkts not compressed: 101, #pkts comp failed: 0, #pkts decomp failed: 0
  #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
  #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
  #TFC rcvd: 0, #TFC sent: 0
  #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
  #send errors: 0, #recv errors: 0

  local crypto endpt.: 1.1.1.1/0, remote crypto endpt.: 2.2.2.2/0
  path mtu 1500, ipsec overhead 74(44), media mtu 1500
  PMTU time remaining (sec): 0, DF policy: copy-df
  ICMP error validation: disabled, TFC packets: disabled
  current outbound spi: EDD1EBD7
  current inbound spi : 8A03B6F4&lt;/code&gt;&lt;/pre&gt;]]></description>
			<content:encoded><![CDATA[<p>So the interface will not show RX/TX or IN/OUT. That is just there to show you if the interface is Active or not. If you wish to see that traffic is actually going in and out of the VTI, you should look at the IPSec SA for that tunnel interface. This will show you if you are in fact receiving and sending encrypted traffic over that tunnel (interface).</p>
<p>Here is an example:</p>
<pre><code><strong>show int tunnel 3 detail</strong>
Interface Tunnel3 "ROUTE-BASED", is up, line protocol is up
  Hardware is Virtual Tunnel    MAC address N/A, MTU 1500
    IP address 169.254.224.253, subnet mask 255.255.255.252
  Control Point Interface States:
    Interface number is 17
    Interface config status is active
    Interface state is active
  Tunnel Interface Information:
    Source interface: OUTSIDE   IP address: 1.1.1.1
    Destination IP address: 2.2.2.2
    Mode: ipsec ipv4    IPsec profile: ROUTE-BASED-PROFILE

***********************************************

<strong>show ipsec sa peer 2.2.2.2</strong>
interface: ROUTE-BASED
    Crypto map tag: __vti-crypto-map-7-0-3, seq num: 65280, local addr: 1.1.1.1

  local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
  remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
  current_peer: 2.2.2.2


 <strong> #pkts encaps: 101, #pkts encrypt: 101, #pkts digest: 101 &lt;&lt;----I have encaps (OUT)
  #pkts decaps: 101, #pkts decrypt: 101, #pkts verify: 101  &lt;&lt;---- I have decaps (IN)</strong>
  #pkts compressed: 0, #pkts decompressed: 0
  #pkts not compressed: 101, #pkts comp failed: 0, #pkts decomp failed: 0
  #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
  #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
  #TFC rcvd: 0, #TFC sent: 0
  #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
  #send errors: 0, #recv errors: 0

  local crypto endpt.: 1.1.1.1/0, remote crypto endpt.: 2.2.2.2/0
  path mtu 1500, ipsec overhead 74(44), media mtu 1500
  PMTU time remaining (sec): 0, DF policy: copy-df
  ICMP error validation: disabled, TFC packets: disabled
  current outbound spi: EDD1EBD7
  current inbound spi : 8A03B6F4</code></pre>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on ASA Route Based VPN by olsonn		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-17</link>

		<dc:creator><![CDATA[olsonn]]></dc:creator>
		<pubDate>Fri, 16 Mar 2018 17:14:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-17</guid>

					<description><![CDATA[Yes, the crypto map was removed from running config but not saved. Asa still used it. The only thing i noticed was that i don&#039;t see any statistics from the virtual interface. No traffic info in/out. Do you see the same behaviour? Not sure if this is normal for a virtual interface]]></description>
			<content:encoded><![CDATA[<p>Yes, the crypto map was removed from running config but not saved. Asa still used it. The only thing i noticed was that i don&#8217;t see any statistics from the virtual interface. No traffic info in/out. Do you see the same behaviour? Not sure if this is normal for a virtual interface</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on ASA Route Based VPN by John Finnegan		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-16</link>

		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Fri, 16 Mar 2018 17:01:38 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-16</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.thinknetsec.com/asa-route-based-vpn/#comment-15&quot;&gt;olsonn&lt;/a&gt;.

I am glad that you were able to get it to work and that is correct. If you had a VPN already, and are converting it to Route Based, you will need to remove the Crypto Maps that are referencing the VPN for it to work properly. Feel free to reach out anytime if you have questions.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.thinknetsec.com/asa-route-based-vpn/#comment-15">olsonn</a>.</p>
<p>I am glad that you were able to get it to work and that is correct. If you had a VPN already, and are converting it to Route Based, you will need to remove the Crypto Maps that are referencing the VPN for it to work properly. Feel free to reach out anytime if you have questions.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on ASA Route Based VPN by olsonn		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-15</link>

		<dc:creator><![CDATA[olsonn]]></dc:creator>
		<pubDate>Thu, 15 Mar 2018 10:02:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-15</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.thinknetsec.com/asa-route-based-vpn/#comment-13&quot;&gt;John Finnegan&lt;/a&gt;.

Thanks John! Got it working now...The only issue was that if you replace a peer (in my case) you NEED to remove the old setup and  SAVE the config before adding the new setup. If not, still old parts of cryptomaps etc do apply to same peer (stupid asa ;)]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.thinknetsec.com/asa-route-based-vpn/#comment-13">John Finnegan</a>.</p>
<p>Thanks John! Got it working now&#8230;The only issue was that if you replace a peer (in my case) you NEED to remove the old setup and  SAVE the config before adding the new setup. If not, still old parts of cryptomaps etc do apply to same peer (stupid asa 😉</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on ASA Route Based VPN by John Finnegan		</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/#comment-13</link>

		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Mon, 12 Mar 2018 20:43:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378#comment-13</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.thinknetsec.com/asa-route-based-vpn/#comment-12&quot;&gt;olsonn&lt;/a&gt;.

That is correct. It can be any IP range that you want it to be so long as it is not in use somewhere else in the network.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.thinknetsec.com/asa-route-based-vpn/#comment-12">olsonn</a>.</p>
<p>That is correct. It can be any IP range that you want it to be so long as it is not in use somewhere else in the network.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
