• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

vpn tunnels

oddyager

Diamond Member
I enabled ezvpn on both local and remote sites and if I do a show crypto session detail, I see 2 connections, one of which is suspicious...

Router#show crypto session detail
Crypto session current status

Code: C - IKE Configuration mode, D - Dead Peer Detection
K - Keepalives, N - NAT-traversal, X - IKE Extended Authentication

Interface: Serial1/0
Session status: UP-ACTIVE
Peer: 10.10.1.3 port 500 fvrf: (none) ivrf: (none)
Phase1_id: NSSOLVPN
Desc: (none)
IKE SA: local 10.10.2.1/500 remote 10.10.1.3/500 Active
Capabilities:CDX connid:505 lifetime:13:24:54
IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 192.168.1.0/255.255.255.0
Active SAs: 2, origin: dynamic crypto map
Inbound: #pkts dec'ed 0 drop 0 life (KB/Sec) 4420431/680
Outbound: #pkts enc'ed 0 drop 0 life (KB/Sec) 4420431/680
IPSEC FLOW: permit ip 65.189.69.56/255.255.255.248 host 10.10.1.3
Active SAs: 2, origin: dynamic crypto map
Inbound: #pkts dec'ed 0 drop 0 life (KB/Sec) 4579180/599
Outbound: #pkts enc'ed 0 drop 0 life (KB/Sec) 4579180/599

Where 10.10.1.3 is the outside i/f of the remote router, and 10.10.2.1 is the local i/f.

The first IPSEC FLOW line is fine I believe. What I'm curious about is the second IPSEC FLOW line which is permitting 65.189.69.56 (when I did dns lookup it points to someplace in Texas) that seems to be connecting to the remote site. The remote router isn't being used for internet surfing or any other purpose other then to be an endpoint of vpn. Is this something I have to deny (access list?) on the remote router?
 
Back
Top