<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL with IP Sec Site To Site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526050#M1086151</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry I wasn't very clear in what I said I don't want to connect to two routers just one, the VPN works fine without the ACL's when I apply the ACL's before or after configuring the VPN nothing works&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jan 2022 17:35:33 GMT</pubDate>
    <dc:creator>jk865</dc:creator>
    <dc:date>2022-01-03T17:35:33Z</dc:date>
    <item>
      <title>ACL with IP Sec Site To Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526043#M1086148</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to configure a site-to-site VPN between three routers one of which is passive with multiple ACLs and I'm having a bit of a meltdown. Some of the ACLs work , the VPN works If I don't apply the ACLs as soon as I apply the ACLs it stops working&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks In advnace&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The lab specifies there should be four ACLs :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NETWORK 2 and NETWORK 1 should be able to communicate via the VPN, without restrictions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NETWORK 2 should be able to communicate to the ciscolab.com server but without the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NETWORK 1 can only communicate to the INTERNET if the communication is initiated by a NETWORK 1 user. This means that communication initiated by INTERNET devices should not be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;INTERNET devices can communicate only to the pocoloco.com device and only for HTTPS communication. &amp;lt; &lt;FONT color="#008000"&gt;This seems to work.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router 1&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended VPN &lt;FONT color="#008000"&gt;Applied with VPN&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;deny ip host 172.10.0.51 172.10.0.0 0.0.0.31&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;permit ip 172.10.0.32 0.0.0.15 172.10.0.0 0.0.0.31&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;permit ip 172.10.0.48 0.0.0.7 172.10.0.0 0.0.0.31&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET &lt;FONT color="#008000"&gt;Applied S/0/0/0 OUTBOUND&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;permit ip 172.10.0.32 0.0.0.15 209.165.100.96 0.0.0.31&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;permit ip 172.10.0.48 0.0.0.7 209.165.100.96 0.0.0.31&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET_TO_CISCOLAB.COM&lt;FONT color="#008000"&gt; Applied s0/0/0 INBOUND&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;permit tcp 209.165.100.96 0.0.0.31 host 172.10.0.51 eq 443&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;encr aes 256&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;group 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp key zDGkUPC5! address 209.165.100.134&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map VPN-MAP 10 ipsec-isakmp&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;description VPN connection to Router 2&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;set peer 209.165.100.134&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;set transform-set VPN-SET&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;match address VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;router 2&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended VPN&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 172.10.0.0 0.0.0.31 172.10.0.32 0.0.0.15&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 172.10.0.0 0.0.0.31 172.10.0.48 0.0.0.7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;encr aes 256&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;group 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp key zDGkUPC5! address 209.165.100.129&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map VPN-MAP 10 ipsec-isakmp&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;description VPN connection to Router 1&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;set peer 209.165.100.129&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;set transform-set VPN-SET&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;match address VPN&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 17:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526043#M1086148</guid>
      <dc:creator>jk865</dc:creator>
      <dc:date>2022-01-03T17:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: ACL with IP Sec Site To Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526049#M1086150</link>
      <description>&lt;P&gt;IPSec is P2P protocol so connect one Router to two different Router is not acceptable.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 17:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526049#M1086150</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-01-03T17:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: ACL with IP Sec Site To Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526050#M1086151</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry I wasn't very clear in what I said I don't want to connect to two routers just one, the VPN works fine without the ACL's when I apply the ACL's before or after configuring the VPN nothing works&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 17:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526050#M1086151</guid>
      <dc:creator>jk865</dc:creator>
      <dc:date>2022-01-03T17:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: ACL with IP Sec Site To Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526051#M1086152</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1284931"&gt;@jk865&lt;/a&gt; you've already asked the same question in another post.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn/site-to-site-ipsec-vpn-in-packet-tracer/m-p/4526042#M281333" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn/site-to-site-ipsec-vpn-in-packet-tracer/m-p/4526042#M281333&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to bear in mind ACLs are stateless.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 12:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526051#M1086152</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-05T12:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: ACL with IP Sec Site To Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526058#M1086153</link>
      <description>&lt;P&gt;Sorry I thought I had posted it in the wrong place I wasn’t intending on wasting anyone’s time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’ve just hit a wall and need some help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 18:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-with-ip-sec-site-to-site-vpn/m-p/4526058#M1086153</guid>
      <dc:creator>jk865</dc:creator>
      <dc:date>2022-01-03T18:06:39Z</dc:date>
    </item>
  </channel>
</rss>

