<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simplify ACL lists and IPsec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3194766#M1065742</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Yes, you can classify branch office rules and global edge rules on the ASA5555.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The branch office rules will pertain to internet access and the ASA5555 ACL could be for the IPSec traffic originating from the branches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Kias&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Oct 2017 05:17:14 GMT</pubDate>
    <dc:creator>Kias</dc:creator>
    <dc:date>2017-10-06T05:17:14Z</dc:date>
    <item>
      <title>Simplify ACL lists and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3193460#M1065740</link>
      <description>&lt;P&gt;Hey&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a large network with a ASA5555-X in middle and about 30-40 ASA's in branch offices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maintaing ACL lists on the branch office firewalls are a lot of work. Is it possible in any way to IPsec the wanted subnets and use the the main ACL list on one of the ASA5555X interfaces instead.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;F.eks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;client --&amp;gt; IP --&amp;gt; ASA BRANCH--&amp;gt; IPSEC &amp;lt;--- ASA5555X ---&amp;gt; ACL ---&amp;gt; Servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3193460#M1065740</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2020-02-21T14:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Simplify ACL lists and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3193466#M1065741</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;Of course you could do that, but it would be wasteful of bandwidth to send traffic accross the WAN only to be dropped at the main office. It is best practice to drop traffic as close to source as possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cheers,&lt;/P&gt;&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2017 08:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3193466#M1065741</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-10-04T08:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Simplify ACL lists and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3194766#M1065742</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Yes, you can classify branch office rules and global edge rules on the ASA5555.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The branch office rules will pertain to internet access and the ASA5555 ACL could be for the IPSec traffic originating from the branches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Kias&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 05:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3194766#M1065742</guid>
      <dc:creator>Kias</dc:creator>
      <dc:date>2017-10-06T05:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: Simplify ACL lists and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3199269#M1065743</link>
      <description>&lt;P&gt;This sounds like a good idea. How do I make the IPsec traffic hit the global edge rules on the 5555X ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example I have:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;branch subnett ---&amp;gt; 10.16.100.0/22&lt;/P&gt;
&lt;P&gt;branch subnett ---&amp;gt; 172.16.124.0/24&lt;/P&gt;
&lt;P&gt;branch subnett ---&amp;gt; 10.16.120.0/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When they have a direct connection, I dont see how I can get everyhing to use one ACL list on the remote 5555X.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanx&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2017 11:04:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3199269#M1065743</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2017-10-16T11:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: Simplify ACL lists and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3199280#M1065744</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume the following:&lt;/P&gt;
&lt;P&gt;HQ --&amp;gt; 1.1.1.1/16&lt;/P&gt;
&lt;P&gt;branch 1 subnett ---&amp;gt; 10.16.100.0/22&lt;/P&gt;
&lt;P&gt;branch 2 subnett ---&amp;gt; 172.16.124.0/24&lt;/P&gt;
&lt;P&gt;branch 3 subnett ---&amp;gt; 10.16.120.0/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3 Site to site VPNs from HQ to branches will be established. In this scenario, traffic from branch 3 to branch 1 will be routed through HQ as the hop. At HQ the ACL is defined to control the branch 3 -&amp;gt; 1 via ACL. Also&amp;nbsp; NoNat and hair pining are required for the VPN's which I beleive is one time config.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Kias&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2017 11:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simplify-acl-lists-and-ipsec/m-p/3199280#M1065744</guid>
      <dc:creator>Kias</dc:creator>
      <dc:date>2017-10-16T11:12:29Z</dc:date>
    </item>
  </channel>
</rss>

