<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL - VPN Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-vpn-issue/m-p/4136392#M1073016</link>
    <description>&lt;P&gt;I am stuck on an internet border router issue. Recently, installed a cisco 1920 router with IOS version 15.0 for new mobile in the field project. I have Cox as my ISP and Verizon (VPN) as service provided for my mobile devices in the field. I have a server on-premise that will be collecting the data sent from the mobile devices to the server sitting behind the inside interface on the internet border router. It took about a week for me to realize the mobile devices in the field could not send data to the internal server because the VPN ACL, had to be modified to permit the private IP addresses of the mobile devices over the VPN tunnel.&lt;BR /&gt;My mobile devices are able to send data to the on-premise server and access the internet.&lt;BR /&gt;When I attempt to apply an ACL on the outside interface on my router the mobile devices on the VPN communication is dropped. Cisco best practices suggest applying an ACL to the outside internet on the border router. How can I apply an ACL(in) to the outside interface of my border router without stopping communication from drops on the VPN tunnel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VZW_VPNTUNNEL 1 ipsec-isakmp&lt;BR /&gt;description Verizon Wireless Tunnel&lt;BR /&gt;set peer 198.200.200.1&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;description GRE Tunnel to Verizon Wireless&lt;BR /&gt;ip address 10.5.71.2 255.255.255.252&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;tunnel source 198.200.200.1&lt;BR /&gt;tunnel destination 179.40.100.100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description outside link to VZW VPN&lt;BR /&gt;ip address 198.200.200.1 255.255.255.240&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip flow ingress&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;crypto map VZW_VPNTUNNEL&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;ip address 192.168.18.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;router bgp 85505&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;neighbor 10.5.71.1 remote-as 86167&lt;BR /&gt;neighbor 10.5.71.1 default-originate&lt;BR /&gt;neighbor 10.5.71.5 remote-as 86167&lt;BR /&gt;neighbor 10.5.71.5 default-originate route-map prepend&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 198.200.200.2&lt;/P&gt;&lt;P&gt;ip dns server&lt;BR /&gt;ip nat inside source list 25 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 198.200.200.2&lt;BR /&gt;ip route 192.168.18.1 255.255.255.0 GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;ip access-list extended PAT_ACL&lt;BR /&gt;permit ip 172.16.16.0 0.0.0.255 any&lt;BR /&gt;permit ip 172.16.20.0 0.0.0.255 any&lt;BR /&gt;ip access-list extended VZW_VPN&lt;BR /&gt;permit gre host 198.200.200.1 host 179.40.100.100&lt;BR /&gt;permit icmp host 198.200.200.1 host 179.40.100.100&lt;BR /&gt;permit udp host 198.200.200.1 host 179.40.100.100 eq isakmp&lt;BR /&gt;permit esp host 198.200.200.1 host 179.40.100.100&lt;BR /&gt;permit tcp host 201.101.83.243 eq 20500 172.16.16.0 0.0.0.255&lt;BR /&gt;permit tcp 172.16.16.0 0.0.0.255 eq 20500 host 201.101.83.243&lt;BR /&gt;permit icmp 172.16.16.0 0.0.0.255 host 192.168.18.12&lt;BR /&gt;permit tcp host 201.101.83.243 eq 20500 172.16.20.0 0.0.0.255&lt;BR /&gt;permit tcp 172.16.20.0 0.0.0.255 eq www host 192.168.18.12&lt;BR /&gt;permit tcp 172.16.20.0 0.0.0.255 eq 6080 host 192.168.18.12&lt;BR /&gt;permit tcp 172.16.20.0 0.0.0.255 eq 443 host 198.200.200.1&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 8.8.8.8&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 198.200.200.2&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 198.200.200.1&lt;BR /&gt;permit icmp 172.16.20.0 0.0.0.255 host 8.8.8.8&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 8.8.4.4&lt;BR /&gt;permit icmp 172.16.20.0 0.0.0.255 host 192.168.18.12&lt;BR /&gt;permit icmp 172.16.20.0 0.0.0.255 host 198.200.200.2&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;!access-list 10 permit 192.168.87.0 0.0.0.255&lt;BR /&gt;access-list 10 permit 192.168.18.0 0.0.0.255&lt;BR /&gt;access-list 10 permit 172.16.16.0 0.0.0.255&lt;BR /&gt;access-list 10 permit 172.16.20.0 0.0.0.255 log&lt;BR /&gt;access-list 10 deny any&lt;BR /&gt;access-list 25 permit 172.16.20.0 0.0.0.255&lt;BR /&gt;access-list 25 permit 172.16.16.0 0.0.0.255 log&lt;BR /&gt;access-list 120 deny tcp any any eq 22 log&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 15 Aug 2020 21:48:21 GMT</pubDate>
    <dc:creator>reginaldjohnson</dc:creator>
    <dc:date>2020-08-15T21:48:21Z</dc:date>
    <item>
      <title>ACL - VPN Issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-vpn-issue/m-p/4136392#M1073016</link>
      <description>&lt;P&gt;I am stuck on an internet border router issue. Recently, installed a cisco 1920 router with IOS version 15.0 for new mobile in the field project. I have Cox as my ISP and Verizon (VPN) as service provided for my mobile devices in the field. I have a server on-premise that will be collecting the data sent from the mobile devices to the server sitting behind the inside interface on the internet border router. It took about a week for me to realize the mobile devices in the field could not send data to the internal server because the VPN ACL, had to be modified to permit the private IP addresses of the mobile devices over the VPN tunnel.&lt;BR /&gt;My mobile devices are able to send data to the on-premise server and access the internet.&lt;BR /&gt;When I attempt to apply an ACL on the outside interface on my router the mobile devices on the VPN communication is dropped. Cisco best practices suggest applying an ACL to the outside internet on the border router. How can I apply an ACL(in) to the outside interface of my border router without stopping communication from drops on the VPN tunnel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VZW_VPNTUNNEL 1 ipsec-isakmp&lt;BR /&gt;description Verizon Wireless Tunnel&lt;BR /&gt;set peer 198.200.200.1&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;description GRE Tunnel to Verizon Wireless&lt;BR /&gt;ip address 10.5.71.2 255.255.255.252&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;tunnel source 198.200.200.1&lt;BR /&gt;tunnel destination 179.40.100.100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description outside link to VZW VPN&lt;BR /&gt;ip address 198.200.200.1 255.255.255.240&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip flow ingress&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;crypto map VZW_VPNTUNNEL&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;ip address 192.168.18.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;router bgp 85505&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;neighbor 10.5.71.1 remote-as 86167&lt;BR /&gt;neighbor 10.5.71.1 default-originate&lt;BR /&gt;neighbor 10.5.71.5 remote-as 86167&lt;BR /&gt;neighbor 10.5.71.5 default-originate route-map prepend&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 198.200.200.2&lt;/P&gt;&lt;P&gt;ip dns server&lt;BR /&gt;ip nat inside source list 25 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 198.200.200.2&lt;BR /&gt;ip route 192.168.18.1 255.255.255.0 GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;ip access-list extended PAT_ACL&lt;BR /&gt;permit ip 172.16.16.0 0.0.0.255 any&lt;BR /&gt;permit ip 172.16.20.0 0.0.0.255 any&lt;BR /&gt;ip access-list extended VZW_VPN&lt;BR /&gt;permit gre host 198.200.200.1 host 179.40.100.100&lt;BR /&gt;permit icmp host 198.200.200.1 host 179.40.100.100&lt;BR /&gt;permit udp host 198.200.200.1 host 179.40.100.100 eq isakmp&lt;BR /&gt;permit esp host 198.200.200.1 host 179.40.100.100&lt;BR /&gt;permit tcp host 201.101.83.243 eq 20500 172.16.16.0 0.0.0.255&lt;BR /&gt;permit tcp 172.16.16.0 0.0.0.255 eq 20500 host 201.101.83.243&lt;BR /&gt;permit icmp 172.16.16.0 0.0.0.255 host 192.168.18.12&lt;BR /&gt;permit tcp host 201.101.83.243 eq 20500 172.16.20.0 0.0.0.255&lt;BR /&gt;permit tcp 172.16.20.0 0.0.0.255 eq www host 192.168.18.12&lt;BR /&gt;permit tcp 172.16.20.0 0.0.0.255 eq 6080 host 192.168.18.12&lt;BR /&gt;permit tcp 172.16.20.0 0.0.0.255 eq 443 host 198.200.200.1&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 8.8.8.8&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 198.200.200.2&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 198.200.200.1&lt;BR /&gt;permit icmp 172.16.20.0 0.0.0.255 host 8.8.8.8&lt;BR /&gt;permit udp 172.16.20.0 0.0.0.255 eq domain host 8.8.4.4&lt;BR /&gt;permit icmp 172.16.20.0 0.0.0.255 host 192.168.18.12&lt;BR /&gt;permit icmp 172.16.20.0 0.0.0.255 host 198.200.200.2&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;!access-list 10 permit 192.168.87.0 0.0.0.255&lt;BR /&gt;access-list 10 permit 192.168.18.0 0.0.0.255&lt;BR /&gt;access-list 10 permit 172.16.16.0 0.0.0.255&lt;BR /&gt;access-list 10 permit 172.16.20.0 0.0.0.255 log&lt;BR /&gt;access-list 10 deny any&lt;BR /&gt;access-list 25 permit 172.16.20.0 0.0.0.255&lt;BR /&gt;access-list 25 permit 172.16.16.0 0.0.0.255 log&lt;BR /&gt;access-list 120 deny tcp any any eq 22 log&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Aug 2020 21:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-vpn-issue/m-p/4136392#M1073016</guid>
      <dc:creator>reginaldjohnson</dc:creator>
      <dc:date>2020-08-15T21:48:21Z</dc:date>
    </item>
  </channel>
</rss>

