cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2221
Views
5
Helpful
1
Replies

Permit return traffic (established traffic) on a VPN filter

bascheew
Level 1
Level 1

For interface ACLs, the inspection rules will permit return traffic through the ACL. On a VPN filter, inspection does not appear to have any effect since there is no interface for inspection to be applied.  How can a VPN filter be used so that traffic originating from the far side is blocked, but any traffic originating from the near side is permitted back through?

1 Accepted Solution

Accepted Solutions

The traffic permitted by the VPN-filter is statefully inspected and return traffic is allowed back. But still the VPN-filter doesn't work as typically expected as the filter doesn't have a direction.

Example (192.168.1.1 is a remote IP, 10.10.10.10 is the local server):

access-list VPN-FILTER permit tcp host 192.168.1.1 host 10.10.10.10 eq 80

The remote host can reach the local server and return-packets are allowed through statefull inspection. As there is the implicit "deny any" at the end, no other traffic (regardless of direction) is allowed.

Now you want that the internal server is allowed to RDP to the remote server. Now it gets awkward and the ACL looks like the following:

access-list VPN-FILTER permit tcp host 192.168.1.1 host 10.10.10.10 eq 80
access-list VPN-FILTER permit tcp host 192.168.1.1 eq 3389 host 10.10.10.10

The ACL gets clearer when realizing that the syntax is not

access-list ACL-NAME permit/deny SOURCE DESTINATION

it is for the VPN-filter

access-list ACL-NAME permit/deny REMOTE LOCAL

And if the local server want's to RDP to the remote system, the port tcp/3389 is used on the remote system.

One implication of this is that you can't configure that you can ping the other side, but they can't ping you. As there is no source/destination-type, an ICMP-ACE is always applied in both directions.

How to get out of this situation?

  1. Wait until Cisco implements filter with direction. But I'm not sue when/if that will happen
  2. Use the old style "no sysopt connection permit-vpn" and control the access with interface ACLs.
  3. Use a router for site-to-site-VPNs where you can apply ACLs per direction to the VPN-tunnel.

View solution in original post

1 Reply 1

The traffic permitted by the VPN-filter is statefully inspected and return traffic is allowed back. But still the VPN-filter doesn't work as typically expected as the filter doesn't have a direction.

Example (192.168.1.1 is a remote IP, 10.10.10.10 is the local server):

access-list VPN-FILTER permit tcp host 192.168.1.1 host 10.10.10.10 eq 80

The remote host can reach the local server and return-packets are allowed through statefull inspection. As there is the implicit "deny any" at the end, no other traffic (regardless of direction) is allowed.

Now you want that the internal server is allowed to RDP to the remote server. Now it gets awkward and the ACL looks like the following:

access-list VPN-FILTER permit tcp host 192.168.1.1 host 10.10.10.10 eq 80
access-list VPN-FILTER permit tcp host 192.168.1.1 eq 3389 host 10.10.10.10

The ACL gets clearer when realizing that the syntax is not

access-list ACL-NAME permit/deny SOURCE DESTINATION

it is for the VPN-filter

access-list ACL-NAME permit/deny REMOTE LOCAL

And if the local server want's to RDP to the remote system, the port tcp/3389 is used on the remote system.

One implication of this is that you can't configure that you can ping the other side, but they can't ping you. As there is no source/destination-type, an ICMP-ACE is always applied in both directions.

How to get out of this situation?

  1. Wait until Cisco implements filter with direction. But I'm not sue when/if that will happen
  2. Use the old style "no sysopt connection permit-vpn" and control the access with interface ACLs.
  3. Use a router for site-to-site-VPNs where you can apply ACLs per direction to the VPN-tunnel.
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: