The headend is an ASA5510 running 7.2(2).
I will post the config if requested, but here is the gist of it:
I have a nat exempt ACL and a corresponding nat 0 statement
I have an identical acl for the crypto map
I have sysopt connection permit-vpn
I have an appropriate transform set
I have a crypto map defined and applied. (includes a dynmap for remote users, dynmap is seq 99, site-to-site is seq 10)
I have isakmp enable outside
I have appropriate isakmp policies defined.
I have a tunnel group with the IP address of the peer defined and the shared key defined.
I have done numerous clear xlates and clear ipsec/isakmp sa.
When interesting traffic arrives at the interface, a debug crypto isakmp or ipsec shows no activity.
A packet trace runs and succeeds until:
Forward Flow based lookup yields rule:
out id=0x45c8ec0, priority=70, domain=encrypt, deny=false
hits=1, user_data=0x0, cs_id=0x3c4c550, reverse, flags=0x0, protocol=0
src ip=192.168.0.14, mask=255.255.255.255, port=0
dst ip=192.168.10.0, mask=255.255.255.0, port=0
Drop-reason: (acl-drop) Flow is denied by configured rule
I am stumped, I've done this 100 times and this one is killing me. Random thoughts:
I've cleared the service policies I had applied
I've cleared the default group policy.
The "interesting" traffic in this case originates on a "DMZ" interface. I've tried security 100 and 80. The interface has no ACLs applied to it in either direction.