I'm trying to build a LAN-2-LAN ipsec vpn. I know I need an acl to specify interesting traffic, but every acl example I can find just uses the blanket "permit ip". I'm wanting to build a vpn based on specific tcp/udp ports. If I build the acl using specific tcp/udp ports, do I have to include any protocols or ports for the vpn tunnel itself? Does someone have an example of a vpn acl that specifies ports? Thanks!
Hi Did you ever get this to work? I have tried both Interesting traffic ACLs and ACLs on the inside interface with no luck. I need to block access to all but specific ports for PCI compliance. Any suggestions?
Thank you I have been trying to figure this out for a year. Worked like a charm! The one thing that drove me crazy after applying the policy was I had to clear the sa out of the FW. After making changes to the access clear the SA with CLEAR CRYPTO IPSEC SA PEER xxx.xxx.xxx.xxx.
I tried this back in pre-8.2x days and didn't like the way the ACE logic was defined - where the remote host had to be the first entry in the ACE.
For instance, if I wanted only telnet traffic from local host A to remote host B to bring the tunnel up, the ACE had to be written with remote Host B in the first entry. However, if for another lan-2-lan VPN config I wanted FTP from remote host B to local host A to be the interesting traffic that brought the tunnel up, still remote host B was the first entry in the ACE. Bothe ACE's had remote host B in the first entry, but in only the second ACE did remote host B initiate the traffic. With this wierd way Cisco wrote the code, one can never tell by the ACE entry which way the intended traffic was going.
So I held off rolling out a couple of ASA-5540s to replace our aging 3030 concentrators. I was told by Cisco a couple of years ago that the entire VPN code in the ASA OS was being re-written, and one of the changes was going to be to the ACE logic, where the source IP would be the first entry in the ACE, not the remote IP. This would match up to all other ACL logic that Cisco uses.
Do you know if this has been done in either 8.2.3, or now the newest 8.3.2? Or is it still required to put the remote host IP in the first entry of an ACE? Again, this is for the vpn-filter logic only that I am concerned with.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...