<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access-list and vpn tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736970#M1007146</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was not suggesting the inside interface has anything to do with it. The bypass is done on the outside access list because of the way the firewall works with the security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic from the inside to the outside is allowed anyway (unless your rules don't specify it), so it doesn't need any ACL and you need to bypass the IPSEC on the outside ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Jan 2008 14:56:12 GMT</pubDate>
    <dc:creator>pjhenriqs</dc:creator>
    <dc:date>2008-01-28T14:56:12Z</dc:date>
    <item>
      <title>access-list and vpn tunnel</title>
      <link>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736965#M1007131</link>
      <description>&lt;P&gt;I have a 515 running ASA 7.2 software which is configured as a remote access vpn, site to site tunnel, and is a firewall between hosts on the inside and the Internet.  VPN was working fine until I placed an ACL on the inside interface.  I was always under the impression that vpn traffic was exempt from ACLs, but just to make sure I added an ACL that permitted hosts on the inside network to hosts on the remote access network.  Inside network being 10.0.0.0/8 and the vpn remote access network being 192.168.8.0/24&lt;/P&gt;&lt;P&gt;my access list read &lt;/P&gt;&lt;P&gt;permit ip any 192.168.8.0 255.255.255.0&lt;/P&gt;&lt;P&gt;and was getting hits.  Now though I've been having problems with remote access clients being able to use certain protocols and apps.  They are able to establish the tunnel, but when trying to make a connection to say remote desktop, they temporarily make the connection but then get the error&lt;/P&gt;&lt;P&gt;"because of an error in data encryption, your session will end."  I've removed the ACL, but the behavior persists.  No other changes have been made, I've rebooted the firewall and my Internet router.  The same behavior is apparent on the site to site tunnel as well.  I enabled some debugging on crypto, but nothing really looks wrong with the connections being made, only the traffic being sent over the tunnels.  Anyone have any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736965#M1007131</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2019-03-11T10:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: access-list and vpn tunnel</title>
      <link>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736966#M1007132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it turned out to be a service policy rule was causing the problem, but could someone clarify the ACL and vpn question?  That is, if I have an acl on the inside interface, do I need to account for VPN traffic, or is all vpn traffic, tunnels included, exempt from acl inspection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Apr 2007 20:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736966#M1007132</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-04-14T20:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: access-list and vpn tunnel</title>
      <link>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736967#M1007135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi mate, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I dont know the answer to your query, but am desperately trying to find out...I have some un-explained VPN behaviour, which I'm attributing the the ACLs currently, but the ACLs on the outside interface are not allowing IPSec, yet the tunel is established, and there are no hits against the inside ACLs, so it seems as though the Crypto ACLs take precedence over the interface ACLs...but I would like confirmation...so please post a reply if you were able to find out....?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 14:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736967#M1007135</guid>
      <dc:creator>8c-stone</dc:creator>
      <dc:date>2008-01-28T14:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: access-list and vpn tunnel</title>
      <link>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736968#M1007139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A basic question, are you allowing the IPSEC to bypass the access lists?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config)# sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have this command?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe this would be the only reason that would make your tunnel be established if there is nothing on your outside ACL's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Paulo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 14:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736968#M1007139</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-28T14:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: access-list and vpn tunnel</title>
      <link>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736969#M1007142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All my practical testing and experience led me to the conclusion that the sysopt connection command doesn't exempt the vpn traffic from acls I had in place on my inside interface.  In other words, I needed to account for the vpn subnet when configuring my inside access list, otherwise the inside hosts were unable to communicate return traffic to those vpn clients initiating traffic.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 14:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736969#M1007142</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2008-01-28T14:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: access-list and vpn tunnel</title>
      <link>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736970#M1007146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was not suggesting the inside interface has anything to do with it. The bypass is done on the outside access list because of the way the firewall works with the security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic from the inside to the outside is allowed anyway (unless your rules don't specify it), so it doesn't need any ACL and you need to bypass the IPSEC on the outside ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 14:56:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-and-vpn-tunnel/m-p/736970#M1007146</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-28T14:56:12Z</dc:date>
    </item>
  </channel>
</rss>

