HQ ASA 5510 to branch ASA 5510 IPsec site to site VPN - branch is not sending responses back over VPN
We have two Cisco ASA firewall with a "healthy" site to site IPsec VPN between them. Traffic sent over the VPN is not translated, while all other traffic to internet is translated to public IP address.
The problem is while the HQ ASA encrypts and sends traffic correctly to branch ASA, the branch ASA does not encrypt the responses, nor does it send over the VPN - it sends the responses to internet (to a RFC1918 address).
The configuration looks correct, the VPN is established. Any help or a point in the right direction would be appreciated.
This is what we see on the branch...
sh crypto ipsec sa interface: Outside Crypto map tag: Outside_map, seq num: 12, local addr: x.x.x..210
access-list Outside_12_cryptomap extended permit ip 10.40.14.0 255.255.255.0 192.168.65.0 255.255.255.0 local ident (addr/mask/prot/port): (10.40.14.0/255.255.255.0/0/0) remote ident (addr/mask/prot/port): (192.168.65.0/255.255.255.0/0/0) current_peer: 18.104.22.168
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...