<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Defining ACL in a crypto map in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420056#M1081632</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am very new to Cisc/ASA and maybe this question is very basic but I couldn't get it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a crypto-map configured with a client and have used an ACL to define the interesting traffic. There is no Tunnel interface attached to it. We only see active crypto sa when client initiates the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question here is, how do we define the source &amp;amp; destination for the ACL to define the interesting traffic. I've pasted below a snippet of our config. The acl allows traffic from Internal subnets (belongs to us) to client subnets but the sa comes up when client initiates the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show running-config crypto map&lt;BR /&gt;crypto map VPNMAP 2 match address Client-1-ACL&lt;BR /&gt;crypto map VPNMAP 2 set pfs group5&lt;BR /&gt;crypto map VPNMAP 2 set connection-type answer-only&lt;BR /&gt;crypto map VPNMAP 2 set peer x.x.x.x&lt;BR /&gt;crypto map VPNMAP 2 set ikev1 transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map VPNMAP 2 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map VPNMAP 2 set reverse-route&lt;BR /&gt;crypto map VPNMAP interface INTERNET&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;sh run access-list Client-1-ACL&lt;BR /&gt;access-list Client-1-ACL extended permit ip object-group Internal-NETS object-group Client-NETS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You in advance &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Jun 2021 07:10:21 GMT</pubDate>
    <dc:creator>gryffindor</dc:creator>
    <dc:date>2021-06-18T07:10:21Z</dc:date>
    <item>
      <title>Defining ACL in a crypto map</title>
      <link>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420056#M1081632</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am very new to Cisc/ASA and maybe this question is very basic but I couldn't get it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a crypto-map configured with a client and have used an ACL to define the interesting traffic. There is no Tunnel interface attached to it. We only see active crypto sa when client initiates the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question here is, how do we define the source &amp;amp; destination for the ACL to define the interesting traffic. I've pasted below a snippet of our config. The acl allows traffic from Internal subnets (belongs to us) to client subnets but the sa comes up when client initiates the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show running-config crypto map&lt;BR /&gt;crypto map VPNMAP 2 match address Client-1-ACL&lt;BR /&gt;crypto map VPNMAP 2 set pfs group5&lt;BR /&gt;crypto map VPNMAP 2 set connection-type answer-only&lt;BR /&gt;crypto map VPNMAP 2 set peer x.x.x.x&lt;BR /&gt;crypto map VPNMAP 2 set ikev1 transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map VPNMAP 2 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map VPNMAP 2 set reverse-route&lt;BR /&gt;crypto map VPNMAP interface INTERNET&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;sh run access-list Client-1-ACL&lt;BR /&gt;access-list Client-1-ACL extended permit ip object-group Internal-NETS object-group Client-NETS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You in advance &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jun 2021 07:10:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420056#M1081632</guid>
      <dc:creator>gryffindor</dc:creator>
      <dc:date>2021-06-18T07:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: Defining ACL in a crypto map</title>
      <link>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420060#M1081633</link>
      <description>&lt;P&gt;The SA will come up when either end initiates traffic. The client end has a mirror image definition that defines its interesting traffic. When it initiates, their end will negotiate the ISAKMP and IPsec parameters with you and each will respectively validate the allowed sources and destinations to then create the IPsec security association (SA). It should work that way no matter which end starts the flow.&lt;/P&gt;
&lt;P&gt;(Edit: Except, as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; mentioned, where you have the "answer-only" parameter. That's quite uncommon.)&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jun 2021 07:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420060#M1081633</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-06-18T07:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Defining ACL in a crypto map</title>
      <link>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420061#M1081634</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1196799"&gt;@gryffindor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The source can be any IP address as defined in the crypto ACL (Client-1-ACL), so from your network Internal-NETS or the remote network Client-NETS, obviously the destination is the other network as per the crypto ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Usually a VPN is bi-directional, so either side can initate the traffic. However you've got the command "crypto map VPNMAP 2 set connection-type &lt;STRONG&gt;answer-only&lt;/STRONG&gt;" configured, which means the remote network (an IP address within the object Client-NETS group) has to initate traffic in order for the VPN to be established.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does that answer your question?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jun 2021 07:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420061#M1081634</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-18T07:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: Defining ACL in a crypto map</title>
      <link>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420071#M1081635</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply but, I am sorry as there is still a little confusion. I understand your point that since we have connection type as answer-only, it is client who has to initiate the traffic. But, my ACL allows from Source (internal-IP) to Destination (client-IP) then how come the initiating traffic from client is allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One more thing, since you mentioned that "&lt;EM&gt;The source can be any IP address as defined in the crypto ACL",&amp;nbsp;&lt;/EM&gt;would it work if I have the ACLs configured as&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list Client-1-ACL extended permit ip object-group&amp;nbsp;Client-NETS object-group Internal-NETS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jun 2021 07:36:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420071#M1081635</guid>
      <dc:creator>gryffindor</dc:creator>
      <dc:date>2021-06-18T07:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: Defining ACL in a crypto map</title>
      <link>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420077#M1081636</link>
      <description>&lt;P&gt;You write the ACL from your local perspective, so the source will be your local network(s) and the remote peer's network will be the destination. The remote peer mirrors that configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once the IPSec SAs have been established, either network (local or remote) as defined in the crypto ACL can be the source of the VPN traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jun 2021 07:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/defining-acl-in-a-crypto-map/m-p/4420077#M1081636</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-18T07:57:17Z</dc:date>
    </item>
  </channel>
</rss>

