<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Issue trying to setup VPN IPSec tunnel using extended acl in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-trying-to-setup-vpn-ipsec-tunnel-using-extended-acl/m-p/2672388#M193813</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm currently trying to setup a VPN IPSec tunnel with an ASA (9.3.1 version) with a SaaS proxy provider.&lt;/P&gt;
&lt;P&gt;In order to only redirect web traffic I've been using extended acl matching services http and https for redirection&amp;nbsp;in the tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, it appears to not work as expected.&lt;/P&gt;
&lt;P&gt;To prepare such configuration, I used templates from proxy provider.&lt;/P&gt;
&lt;P&gt;Anyone has a clue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's an extract of the configuration that I've been using:&lt;/P&gt;

&lt;PRE class="aLF-aPX-K0-aPE aLF-aPX-aLK-ayr-auR" style="-webkit-user-select: text; font-family: 'Courier New', Courier, monospace, arial, sans-serif; font-size: 14px; margin-bottom: 0px; color: rgb(0, 0, 0); line-height: normal; background-color: rgb(255, 255, 255);"&gt;
group-object service PXY_SVC
service-object tcp destination eq 443
service-object tcp destination eq 80


! ACL definition (encryption domain) for the  IPSec tunnel
 
!access-list PXY-ACL extended deny ip *src_definition* *dst_definition*  
access-list PXY-ACL extended permit object-group object PXY_SVC object SubnetTest any 
 
 
! Phase 2 config
 
crypto ipsec ikev1 transform-set esp-null-md5 esp-null esp-md5-hmac
 

 
crypto map outside 7 match address PXY-ACL
crypto map outside 7 pfs
crypto map outside 7 set connection-type originate-only
crypto map outside 7 set peer x.x.x.x x.x.x.x
crypto map outside 7 set ikev1 transform-set esp-null-md5
crypto map outside 7 set security-association lifetime seconds 3600
 
! Phase 1 config
 
crypto ikev1 enable outside
crypto ikev1 policy 5
authentication pre-share
encryption aes
hash sha
group 2
lifetime 3600
 
! Primary destination
 
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
ikev1 pre-shared-key **************
peer-id-validate nocheck
isakmp keepalive threshold 10 retry 5
 
! Secondary destination
 
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
ikev1 pre-shared-key **************
peer-id-validate nocheck
isakmp keepalive threshold 10 retry 5

object service TCP_80
service tcp destination eq www

object service TCP_443
service tcp destination eq https

nat (inside,outside) source static SubnetTest SubnetTest destination static any any service TCP_80 description NO NAT  HTTP
nat (inside,outside) source static SubnetTest SubnetTest destination static any any service TCP_443 description  NO NAT HTTPS

&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for your help!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:16:09 GMT</pubDate>
    <dc:creator>mococo001</dc:creator>
    <dc:date>2019-03-12T06:16:09Z</dc:date>
    <item>
      <title>Issue trying to setup VPN IPSec tunnel using extended acl</title>
      <link>https://community.cisco.com/t5/network-security/issue-trying-to-setup-vpn-ipsec-tunnel-using-extended-acl/m-p/2672388#M193813</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm currently trying to setup a VPN IPSec tunnel with an ASA (9.3.1 version) with a SaaS proxy provider.&lt;/P&gt;
&lt;P&gt;In order to only redirect web traffic I've been using extended acl matching services http and https for redirection&amp;nbsp;in the tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, it appears to not work as expected.&lt;/P&gt;
&lt;P&gt;To prepare such configuration, I used templates from proxy provider.&lt;/P&gt;
&lt;P&gt;Anyone has a clue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's an extract of the configuration that I've been using:&lt;/P&gt;

&lt;PRE class="aLF-aPX-K0-aPE aLF-aPX-aLK-ayr-auR" style="-webkit-user-select: text; font-family: 'Courier New', Courier, monospace, arial, sans-serif; font-size: 14px; margin-bottom: 0px; color: rgb(0, 0, 0); line-height: normal; background-color: rgb(255, 255, 255);"&gt;
group-object service PXY_SVC
service-object tcp destination eq 443
service-object tcp destination eq 80


! ACL definition (encryption domain) for the  IPSec tunnel
 
!access-list PXY-ACL extended deny ip *src_definition* *dst_definition*  
access-list PXY-ACL extended permit object-group object PXY_SVC object SubnetTest any 
 
 
! Phase 2 config
 
crypto ipsec ikev1 transform-set esp-null-md5 esp-null esp-md5-hmac
 

 
crypto map outside 7 match address PXY-ACL
crypto map outside 7 pfs
crypto map outside 7 set connection-type originate-only
crypto map outside 7 set peer x.x.x.x x.x.x.x
crypto map outside 7 set ikev1 transform-set esp-null-md5
crypto map outside 7 set security-association lifetime seconds 3600
 
! Phase 1 config
 
crypto ikev1 enable outside
crypto ikev1 policy 5
authentication pre-share
encryption aes
hash sha
group 2
lifetime 3600
 
! Primary destination
 
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
ikev1 pre-shared-key **************
peer-id-validate nocheck
isakmp keepalive threshold 10 retry 5
 
! Secondary destination
 
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
ikev1 pre-shared-key **************
peer-id-validate nocheck
isakmp keepalive threshold 10 retry 5

object service TCP_80
service tcp destination eq www

object service TCP_443
service tcp destination eq https

nat (inside,outside) source static SubnetTest SubnetTest destination static any any service TCP_80 description NO NAT  HTTP
nat (inside,outside) source static SubnetTest SubnetTest destination static any any service TCP_443 description  NO NAT HTTPS

&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for your help!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-trying-to-setup-vpn-ipsec-tunnel-using-extended-acl/m-p/2672388#M193813</guid>
      <dc:creator>mococo001</dc:creator>
      <dc:date>2019-03-12T06:16:09Z</dc:date>
    </item>
    <item>
      <title>Hi,Looking at the config:</title>
      <link>https://community.cisco.com/t5/network-security/issue-trying-to-setup-vpn-ipsec-tunnel-using-extended-acl/m-p/2672389#M193814</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Looking at the config:-&lt;/P&gt;&lt;P&gt;access-list PXY-ACL extended deny ip *src_definition* *dst_definition* &amp;nbsp;&lt;BR /&gt;access-list PXY-ACL extended permit object-group object PXY_SVC object SubnetTest any&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can run into issues if *src_definition* *dst_definition* are included in PXY_SVC. You might want to set permit statement above the deny entry.&lt;/P&gt;&lt;P&gt;Suggested way would be to create IP based proxy ACL rather port based and then use VPN filter to restrict traffic to be sent over VPN tunnel.&lt;/P&gt;&lt;P&gt;Here is a good read on VPN filter and their implementation:-&lt;BR /&gt;http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html&lt;/P&gt;&lt;P&gt;In such case , you will have&amp;nbsp;&lt;BR /&gt;access-list PXY-ACL extended permit object-group SubnetTest any , as proxy ACL and then restrict the traffic using VPN filter.&lt;/P&gt;&lt;P&gt;{This post should be under VPN rather Firewalling domain for better visibility}&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 07:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-trying-to-setup-vpn-ipsec-tunnel-using-extended-acl/m-p/2672389#M193814</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-07-19T07:20:28Z</dc:date>
    </item>
    <item>
      <title>Please share the output</title>
      <link>https://community.cisco.com/t5/network-security/issue-trying-to-setup-vpn-ipsec-tunnel-using-extended-acl/m-p/2672390#M193815</link>
      <description>&lt;P&gt;Please share the output of&lt;/P&gt;&lt;P&gt;show crypto isa sa&lt;/P&gt;&lt;P&gt;&amp;nbsp;debug crypto ikev1 127&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 16:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-trying-to-setup-vpn-ipsec-tunnel-using-extended-acl/m-p/2672390#M193815</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2015-07-19T16:31:46Z</dc:date>
    </item>
  </channel>
</rss>

