<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Applying an ACL to a route-based IPsec VPN tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922983#M1104229</link>
    <description>&lt;P&gt;You should only need access rules for incoming traffic on the VTI interface (as long as you are not bypassing access list for VPN connections.) Traffic in the outbound direction should be filtered on the ingress interface where that is actually entering the ASA.&lt;/P&gt;
&lt;P&gt;That being said, if 10.2.3.231 is the remote side and you are querying the remote side using SQL, then the SQL port should be part of the source.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list VENDOR_IN extended permit tcp host 10.2.3.231 eq 1433 10.110.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Sep 2023 21:29:19 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2023-09-13T21:29:19Z</dc:date>
    <item>
      <title>Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922961#M1104224</link>
      <description>&lt;P&gt;We have a route-based VPN configured to a vendor, and I attempted to apply an access list to the tunnel interface. All traffic was blocked. I've not been able to find documentation on how to apply and ACL for this type of VPN,&amp;nbsp; but this isn't working. Our side only needs to query the vendor's server via SQL:&lt;/P&gt;&lt;P&gt;access-list VENDOR_IN extended permit tcp host 10.2.3.231 10.110.0.0 255.255.0.0 eq 1433&lt;BR /&gt;access-list VENDOR_OUT extended permit ip 10.110.0.0 255.255.0.0 host 10.2.3.231&lt;/P&gt;&lt;P&gt;access-group VENDOR_IN in interface vti-interface_100&lt;BR /&gt;access-group VENDOR_OUT out interface vti-interface_100&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 20:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922961#M1104224</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2023-09-13T20:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922971#M1104226</link>
      <description>&lt;P&gt;what device is this ? ASA&amp;nbsp; or router ?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 21:02:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922971#M1104226</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-09-13T21:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922973#M1104227</link>
      <description>&lt;P&gt;My bad. It's an ASA.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 21:04:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922973#M1104227</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2023-09-13T21:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922983#M1104229</link>
      <description>&lt;P&gt;You should only need access rules for incoming traffic on the VTI interface (as long as you are not bypassing access list for VPN connections.) Traffic in the outbound direction should be filtered on the ingress interface where that is actually entering the ASA.&lt;/P&gt;
&lt;P&gt;That being said, if 10.2.3.231 is the remote side and you are querying the remote side using SQL, then the SQL port should be part of the source.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list VENDOR_IN extended permit tcp host 10.2.3.231 eq 1433 10.110.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 21:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4922983#M1104229</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-09-13T21:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923431#M1104250</link>
      <description>&lt;P&gt;Marius, I appreciate your info, but the ACL example just isn't making sense to me. Just to set things straight, 10.2.3.231 is our source, and it's reaching across the tunnel to a host in 10.100.0.0/16 on the SQL port. Installing an ACL with 1433 as the source port seems to me that you're making an ACL for a stateless firewall. I don't want anything coming back from the vendor that's initiated from his end, hence a "deny ip any any" from 10.110.0.0/16 to 10.2.3.231, which is to be applied on the VTI interface. Also, based on what I'm understanding, since the SQL query will be initiated from our end, and that ACL will be applied on the Ethernet interface, correct?&lt;/P&gt;&lt;P&gt;You've brought up some ideas in my head about VTI interfaces. My concept of traffic flow through these needs to be shored up. I'm just not grasping inbound and outbound flows with respect to the inside interface of the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your time.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 12:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923431#M1104250</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2023-09-14T12:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923452#M1104251</link>
      <description>&lt;P&gt;I'm beginning to understand the concept here, so thanks for your patience. You have to think of the ACLs applied to VTI interfaces differently from a normal interface, so I'm probably OK with the ACL now. I'll have to think about this some more.&lt;/P&gt;&lt;P&gt;We also have "no sysopt connection permit-vpn" configured, and there is no entry in the OUTSIDE ACL for traffic from the vendor to come into our network. Does that mean no traffic can be initiated from the vendor, as is the case with policy-based VPNs? I wasn't sure if the "no sysopt" command also worked with route-based tunnels, and that was the main reason for trying to apply an ACL on the VTI interface.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 13:12:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923452#M1104251</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2023-09-14T13:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923455#M1104252</link>
      <description>&lt;P&gt;Route based VPN for ASA and you want filter for traffic pass.&lt;/P&gt;
&lt;P&gt;That work I think you need only to apply acl to tunnel interface ""nameif"" of route based VPN not to tunnel source.&lt;/P&gt;
&lt;P&gt;And also you need no sysop permit vpn&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 13:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923455#M1104252</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-14T13:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: Applying an ACL to a route-based IPsec VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923549#M1104255</link>
      <description>&lt;P&gt;You are so welcome&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 16:24:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-an-acl-to-a-route-based-ipsec-vpn-tunnel/m-p/4923549#M1104255</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-14T16:24:19Z</dc:date>
    </item>
  </channel>
</rss>

