Date: Thu, 25 Aug 2011 10:52:04 -0500 From: jhall@socket.net To: mike@sentex.net Cc: freebsd-questions@freebsd.org Subject: Re: Re: Racoon to Cisco ASA 5505 Message-ID: <20110825155205.A0D131065670@hub.freebsd.org> References: <20110823232242.B78A5106566B@hub.freebsd.org> <4E545899.6090800@sentex.net>
next in thread | previous in thread | raw e-mail | index | archive | help
> I find wireshark helpful in these cases as it nicely decodes what > options are being set. Your racoon conf is set to obey. Its possible > they are proposing something different to you that you accept, where as > what you are proposing might not be acceptable > > ---Mike My vendor came back to me today and stated they found a configuration error on their end. Their most recent message states the traffic I am sending to them through the IPSec tunnel is not encrypted. Following is what they sent me from the ASA. Crypto map tag: rackmap, seq num: 201, local addr: 184.106.120.244 access-list 201 extended permit ip 192.168.100.0 255.255.252.0 10.129.30.0 255.255.255.0 local ident (addr/mask/prot/port): (192.168.100.0/255.255.252.0/0/0) remote ident (addr/mask/prot/port): (10.129.30.0/255.255.255.0/0/0) current_peer: Jefferson_City #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0 #pkts decaps: 789, #pkts decrypt: 789, #pkts verify: 789 Crypto map tag: rackmap, seq num: 201, local addr: 184.106.120.244 access-list 201 extended permit ip 192.168.100.0 255.255.252.0 10.129.10.0 255.255.255.0 local ident (addr/mask/prot/port): (192.168.100.0/255.255.252.0/0/0) remote ident (addr/mask/prot/port): (10.129.10.0/255.255.255.0/0/0) current_peer: Jefferson_City #pkts encaps: 112, #pkts encrypt: 112, #pkts digest: 112 #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0 Usually this indicates that the encryption domains on both sides of the VPN are not matched up exactly. If possible, please send us the encryption domains and nat-exemptions you currently have configured on the other side of the tunnel. What concerns me is, if I am reading this correctly, traffic from 10.129.10.0/24 is not being encrypted and 10.129.10.40 is my end of the tunnel. 10.129.30.0/24 lies behind the the 10.129.10.40 server. Is it possible for me to check if traffic being sent over the IPSec tunnel is being encrypted? I am sorry if this is an extremely easy question, but I am really new to IPSec. Thank you to everyone for their help. Jay
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20110825155205.A0D131065670>