<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Karsten, thanks for your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547436#M235406</link>
    <description>&lt;P&gt;Karsten, thanks for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand the traffic is expected IPSec-protected in both direction.&lt;/P&gt;&lt;P&gt;At point 2, are you meaning "the complete traffic" consist all of the protocol can be passed through by default even I didn't configure the access-group command ?&lt;/P&gt;</description>
    <pubDate>Wed, 20 Aug 2014 17:34:32 GMT</pubDate>
    <dc:creator>Kurt Lei</dc:creator>
    <dc:date>2014-08-20T17:34:32Z</dc:date>
    <item>
      <title>ASA LAN-to-LAN access-list direction</title>
      <link>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547434#M235404</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I'm setting up the LAN-to-LAN IPSec VPN on below setting. Phase 1 &amp;amp; 2 comes up successfully.&lt;/P&gt;&lt;P&gt;172.25.139.64/26 --- ASA1 ----- Checkpoint&amp;nbsp;------ 172.25.128.0/24&lt;/P&gt;&lt;P&gt;==============================ASA 1 ==================================================&lt;/P&gt;&lt;P&gt;access-list 120 extended permit ip 172.25.128.0 255.255.255.0&amp;nbsp;172.25.139.64 255.255.255.192&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list 220 extended permit ip 172.25.139.64 255.255.255.192 172.25.128.0 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map cpdc1 20 match address 220&lt;BR /&gt;crypto map cpdc1 20 set peer x.x.x.x&lt;BR /&gt;crypto map cpdc1 20 set transform-set dcset1&lt;BR /&gt;crypto map cpdc1 20 set security-association lifetime seconds 120&lt;BR /&gt;crypto map cpdc1 interface outside&lt;/P&gt;&lt;P&gt;========================================================================================&lt;/P&gt;&lt;P&gt;For my understanding, the access-list used to define the&amp;nbsp;interesting traffic to be encrypted. However, in ASA, which access-list is used to define the reserve path (i.e. 172.25.128.0/24 to 172.25.139.64/26)&amp;nbsp;? Is it used&amp;nbsp;with &lt;STRONG&gt;access-group &amp;nbsp;120 access_in in outside&amp;nbsp;&lt;/STRONG&gt;command ?&lt;/P&gt;&lt;P&gt;I found I can still&amp;nbsp;ping on both direction even I didn't set access-group command. I'm wondering whether access-group is controlling the reverse path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kurt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547434#M235404</guid>
      <dc:creator>Kurt Lei</dc:creator>
      <dc:date>2019-03-12T04:39:32Z</dc:date>
    </item>
    <item>
      <title>You have to distinguish two</title>
      <link>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547435#M235405</link>
      <description>&lt;P&gt;You have to distinguish two things:&lt;/P&gt;&lt;P&gt;1) Which traffic is protected by IPsec.&lt;/P&gt;&lt;P&gt;That is done with the ACL 220 that you specified in your crypto map. The traffic from 172.25.128./24 to 172.25.139.64/26 has to be protected. At the same time, the reverse treffic is expected to arrive IPsec-protected.&lt;/P&gt;&lt;P&gt;2) Which traffic you want to allow inside the tunnel.&lt;/P&gt;&lt;P&gt;By default, the complete traffic that is specified in the crypto ACL is allowed to flow in both directions. You can reach the other side and the other side can reach you.&lt;/P&gt;&lt;P&gt;If you want to restrict that, there are two choices:&lt;/P&gt;&lt;P&gt;1) Using a "vpn-filter" in a group-policy that is applied to your tunnel-group. That's the new way of controling traffic. But in reality it's a PITA as there is only one ACL and that ACL controls the traffic in both directions. The used ACL does &lt;STRONG&gt;not&lt;/STRONG&gt;&amp;nbsp;use the "normal" syntax of Source and Destination but Remote and Local which makes filtering outbound traffic a little bit complex.&lt;/P&gt;&lt;P&gt;2) The old way where the incoming traffic has to be allowed by the outside ACL. That's the ACL that you apply with the access-group command and that normally is used to control traffic from the outside to your DMZ/inside ...&lt;/P&gt;&lt;P&gt;To enable the old behavior, you need the command "no sysopt connection permit-vpn".&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 16:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547435#M235405</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-20T16:42:43Z</dc:date>
    </item>
    <item>
      <title>Karsten, thanks for your</title>
      <link>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547436#M235406</link>
      <description>&lt;P&gt;Karsten, thanks for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand the traffic is expected IPSec-protected in both direction.&lt;/P&gt;&lt;P&gt;At point 2, are you meaning "the complete traffic" consist all of the protocol can be passed through by default even I didn't configure the access-group command ?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 17:34:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547436#M235406</guid>
      <dc:creator>Kurt Lei</dc:creator>
      <dc:date>2014-08-20T17:34:32Z</dc:date>
    </item>
    <item>
      <title>Again you have to look at two</title>
      <link>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547437#M235408</link>
      <description>&lt;P&gt;Again you have to look at two ways of the communication:&lt;/P&gt;&lt;P&gt;1) inside to outside&lt;/P&gt;&lt;P&gt;If you have an ACL on the internal interface, that always has to allow the traffic for the VPN. If it's denied there the traffic doesn't even really "enter the ASA".&lt;/P&gt;&lt;P&gt;2) VPN to inside&lt;/P&gt;&lt;P&gt;Long time ago the interface ACL was needed because after decryption, the cleartext packet was compared to the interface ACL. So this ACL had to allow the wanted traffic which also gave you a way to have a very specific way of allowing and denying traffic.&lt;/P&gt;&lt;P&gt;In actual releases, this is not done any more by default. Think of it as if the VPN would be terminated &lt;STRONG&gt;inside&lt;/STRONG&gt; the ASA and not at the outside interface where you apply your crypto map. If the traffic is inside, it can freely flow to all attached networks. I assume here that you don't use outgoing ACLs, but they are only rarely used. In this situation you don't need any ACL on the outside interface. Even more, if you have one, it doesn't matter what's in there.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 17:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-lan-to-lan-access-list-direction/m-p/2547437#M235408</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-20T17:44:30Z</dc:date>
    </item>
  </channel>
</rss>

