<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC with Cisco ASA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30792#M22541</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checked VR to confirm we have a static route to new subnet utilizing that tunnel interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 May 2013 13:25:04 GMT</pubDate>
    <dc:creator>gswcowboy</dc:creator>
    <dc:date>2013-05-09T13:25:04Z</dc:date>
    <item>
      <title>IPSEC with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30791#M22540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everyone.&amp;nbsp; I'm hoping someone may be able to help me out with this.&amp;nbsp; I am replacing Cisco ASAs with 5020s.&amp;nbsp; I have a lab 3050 setup and I have an IPSEC VPN tunnel between the 3050 and the Cisco ASA.&amp;nbsp; In my configuration, from the PA perspective, I have one local subnet and one remote subnet.&amp;nbsp; I can pass traffic back and forth with no problem.&amp;nbsp; I am now trying to configure from the PA one local subnet to two remote subnets.&amp;nbsp; My original subnet is able to pass traffic, but the new subnet will not communicate.&amp;nbsp; I added both subnets to the interesting traffic acl on the cisco side and I added a second set of proxy-ids on the IPSec Tunnel configuration on the PA side, I just can't seem to find any logs or any reason why I can't communicate with this second subnet.&amp;nbsp; I also made sure to set up the second remote subnet the same as the first, but I'm still not having any luck.&amp;nbsp; Any help would be much appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 20:12:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30791#M22540</guid>
      <dc:creator>danielstevenson</dc:creator>
      <dc:date>2013-05-08T20:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30792#M22541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checked VR to confirm we have a static route to new subnet utilizing that tunnel interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 13:25:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30792#M22541</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2013-05-09T13:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30793#M22542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You made sure you've got your noNAT config set up on both sides of the tunnel correctly right? Usually that's the gotcha when traffic will mysteriously not pass across IPsec tunnels.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 13:36:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30793#M22542</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-05-09T13:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30794#M22543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As soon as I read your reply I knew that was the issue.&amp;nbsp; No NAT statement missing on the cisco side.&amp;nbsp; Thanks for the suggestion.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 13:48:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30794#M22543</guid>
      <dc:creator>danielstevenson</dc:creator>
      <dc:date>2013-05-09T13:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30795#M22544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad I could help! Thanks for the 'correct answer' mark too :smileygrin:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 14:15:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-with-cisco-asa/m-p/30795#M22544</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-05-09T14:15:01Z</dc:date>
    </item>
  </channel>
</rss>

