<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Encrypting TCP traffic by service using site-to-site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/encrypting-tcp-traffic-by-service-using-site-to-site-vpn/m-p/354550#M1063509</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First, have you tried the crypto ACL without the `eq 3389' keyword?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suspect that the problem lies with that port, which the above would prove/disprove.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use the log keyword on the crypto ACL entry, then it should output a line on the console port indicating which source and destination ports are in use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Sep 2004 15:10:04 GMT</pubDate>
    <dc:creator>aacole</dc:creator>
    <dc:date>2004-09-16T15:10:04Z</dc:date>
    <item>
      <title>Encrypting TCP traffic by service using site-to-site VPN</title>
      <link>https://community.cisco.com/t5/network-security/encrypting-tcp-traffic-by-service-using-site-to-site-vpn/m-p/354549#M1063508</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone shed some light on the following problem I am having?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have set up a site-to-site VPN, and am able to have traffic encrypted/decrypted perfectly when protecting ALL IP traffic between local and remote hosts. My problem lies when I want to tie things down to only protecting specific tcp traffic between the hosts.&lt;/P&gt;&lt;P&gt;For example, I only want to protect Terminal Services tcp 3389 traffic between local and remote hosts. Is this Possible??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is a bit of the config that works, as well as the TCP-specific service access-lists which dont work below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Working Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network TS-Client-Group &lt;/P&gt;&lt;P&gt;  description TS Clients &lt;/P&gt;&lt;P&gt;  network-object TSC1 255.255.255.255 &lt;/P&gt;&lt;P&gt;  network-object TSC2 255.255.255.255 &lt;/P&gt;&lt;P&gt;  network-object TSC3 255.255.255.255 &lt;/P&gt;&lt;P&gt;  network-object TSC4 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip host TSC1 host RFUTS1 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip host TSC2 host RFUTS1 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip host TSC3 host RFUTS1 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip host TSC4 host RFUTS1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip host TSC1 host RFUTS1  &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip host TSC2 host RFUTS1 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip host TSC3 host RFUTS1 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip host TSC4 host RFUTS1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_cryptomap_20&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set pfs group2&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer PIX-Peer&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-AES-256-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address PIX-Peer netmask 255.255.255.255 no-xauth no-config-mode &lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption aes-256&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I alter the protected traffic access-lists to specific TCP traffic, things stop working. &lt;/P&gt;&lt;P&gt;Even when adding access-lists allowing esp and isakmp traffric between all specific hosts...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit tcp host TSC1 host RFUTS1 eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit tcp host TSC2 host RFUTS1 eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit tcp host TSC3 host RFUTS1 eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit tcp host TSC4 host RFUTS1 eq 3389&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/encrypting-tcp-traffic-by-service-using-site-to-site-vpn/m-p/354549#M1063508</guid>
      <dc:creator>chrispresland</dc:creator>
      <dc:date>2020-02-21T07:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypting TCP traffic by service using site-to-site VPN</title>
      <link>https://community.cisco.com/t5/network-security/encrypting-tcp-traffic-by-service-using-site-to-site-vpn/m-p/354550#M1063509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First, have you tried the crypto ACL without the `eq 3389' keyword?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suspect that the problem lies with that port, which the above would prove/disprove.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use the log keyword on the crypto ACL entry, then it should output a line on the console port indicating which source and destination ports are in use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2004 15:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/encrypting-tcp-traffic-by-service-using-site-to-site-vpn/m-p/354550#M1063509</guid>
      <dc:creator>aacole</dc:creator>
      <dc:date>2004-09-16T15:10:04Z</dc:date>
    </item>
  </channel>
</rss>

