Also, check to see if the interface is actually seeing network traffic.
You can manually put the sniffing interface into promiscuous mode to see if the interface is seeing network traffic. On the Sensor, run the snoop utility as user root (see below). The snoop command syntax is snoop -d name_of_interface (without /dev). You should see network traffic being displayed. Use ctrl-c to break out of snoop.
Sun Microsystems Inc. SunOS 5.6 Generic August 1997
# snoop -d spwr0
Using device /dev/spwr (promiscuous mode)
10.1.10.1 -> 18.104.22.168 IP D=22.214.171.124 S=10.1.10.1 LEN=60, ID=0
What you are saying is that the CSPM is not letting you add the sensor with Host ID 30 and Org ID 100, probably this means that you have another sensor configured already or you had it before and it has not removed successfully. I suggest either you reset the CSPM or do a fresh install and try again.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...