<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is the difference among Normal ACL, crypto ACL, ACL Manager in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-is-the-difference-among-normal-acl-crypto-acl-acl-manager/m-p/2467694#M270076</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to Cisco Site to site VPN. I have deployed new site to site VPN. Request help to understand few concepts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1). i need to understand the basic difference among &lt;SPAN style="font-size: 10pt;"&gt;Normal ACL, crypto ACL, ACL Manager.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;2). If i want to pass my traffic through VPN rather than direct open internet, where exactly i should make ACL entry?&amp;nbsp; is NAT Exempt mandatory?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3). &lt;SPAN style="font-size: 10pt;"&gt;If i make same ACL entry in Normal ACL rules and also in Crypto ACL rules, which one will be preffered for sending traffic?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;4). what are the available commands on CLI for checking whether specified traffic is going through VPN or direct open internet? &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;is there any what to verify the same on ASDM?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:42:00 GMT</pubDate>
    <dc:creator>viral_cisco</dc:creator>
    <dc:date>2019-03-12T03:42:00Z</dc:date>
    <item>
      <title>What is the difference among Normal ACL, crypto ACL, ACL Manager</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-difference-among-normal-acl-crypto-acl-acl-manager/m-p/2467694#M270076</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to Cisco Site to site VPN. I have deployed new site to site VPN. Request help to understand few concepts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1). i need to understand the basic difference among &lt;SPAN style="font-size: 10pt;"&gt;Normal ACL, crypto ACL, ACL Manager.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;2). If i want to pass my traffic through VPN rather than direct open internet, where exactly i should make ACL entry?&amp;nbsp; is NAT Exempt mandatory?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3). &lt;SPAN style="font-size: 10pt;"&gt;If i make same ACL entry in Normal ACL rules and also in Crypto ACL rules, which one will be preffered for sending traffic?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;4). what are the available commands on CLI for checking whether specified traffic is going through VPN or direct open internet? &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;is there any what to verify the same on ASDM?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-difference-among-normal-acl-crypto-acl-acl-manager/m-p/2467694#M270076</guid>
      <dc:creator>viral_cisco</dc:creator>
      <dc:date>2019-03-12T03:42:00Z</dc:date>
    </item>
    <item>
      <title>What is the difference among Normal ACL, crypto ACL, ACL Manager</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-difference-among-normal-acl-crypto-acl-acl-manager/m-p/2467695#M270081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you are partly referring to the terms used in the ASDM Configuration section.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont personally use ASDM really all that much as I do most configurations through CLI so I might not be familiar with all the terms used on ASDM side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally speaking the terms you mention mean the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Normal ACL&lt;/STRONG&gt; I assume refers to the ACLs that you are using on the ASA interfaces to control traffic. These ACLs are usually attached in the inbound direction to the ASA interface in which case they control traffic that is coming from network behind that interface towards (inbound) to that interface. In other words they are heading out towards some destination hosts behind a different ASA interface. There is usually no need to define a outbound ACL.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt; usually refers to the ACL you define in a L2L VPN configuration to define the local/remote networks of the VPN Connection. This tells the ASA between which networks or hosts traffic should be forwarded through VPN and through which VPN. I guess a Split Tunnel ACL in VPN Client setups could also be called a Crypto ACL but to me it usually refers to L2L VPN connections ACL&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ACL Manager&lt;/STRONG&gt; I am not completely sure about this. There is a section in the ASDM called this. It seems to me to be the section where you can see all the ACLs configured on your ASA firewall currently. Notice though that not all of the ACLs are necesarily attached to any interface or used in some other role.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to your second question,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt; that is used in the&lt;STRONG&gt; "crypto map"&lt;/STRONG&gt; configuration tells the ASA what traffic needs to be forwarded through a VPN connection. You define source network/host and a destination network/host (or multiple of both) which tells the ASA what traffic to forward.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration is not that clear. Most of the time you will configure &lt;STRONG&gt;NAT0&lt;/STRONG&gt; as you might be connecting 2 offices together through the Internet with the help of L2L VPN. Then its natural to configure &lt;STRONG&gt;NAT0 &lt;/STRONG&gt;so that your 2 LAN networks can directly communicate using their local IP addresses. In some cases you might on the other hand want to use a public IP address even through the L2L VPN connection. In this case you naturally would not configure NAT0 (unless you actually had a public IP address/subnet in your LAN network) but you would rather define that public IP address as the source in the &lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to your third question,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These 2 different ACLs (if we are talking about &lt;STRONG&gt;interface ACLs&lt;/STRONG&gt; and &lt;STRONG&gt;Crypto ACLs&lt;/STRONG&gt;) dont really "compete" with each other. When traffic attempts to pass through the ASA the interface ACL is first check. Then the NAT is applied (depends if its configured or not) and after this the traffic is matched against the &lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So lets say you configured a L2L VPN and your aim was to have the LAN networks at both ends connect to eachother with their original IP addresses then you would need a &lt;STRONG&gt;NAT0&lt;/STRONG&gt; configuration to avoid NAT happening. You would also configure the actual local and remote network in the &lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt;. Now lets say you forgot to configure &lt;STRONG&gt;NAT0&lt;/STRONG&gt; then your traffic would probably match the Dynamic PAT for Internet traffic. And naturally when this NAT is applied the source address doesnt match the one in the&lt;STRONG&gt; Crypto ACL&lt;/STRONG&gt; anymore so the traffic is NOT passed on to the L2L VPN but rather forwarded to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to your fourth question,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are several things that we can check. Naturally you can check the L2L VPN configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You first check the Crypto Map configurations with&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run crypto map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find the section for the correct L2L VPN connection on the basis of the peer IP address for example. (The lines related to one L2L VPN connection always have the same &lt;STRONG&gt;&lt;NUMBER&gt;&lt;/NUMBER&gt;&lt;/STRONG&gt; after the Crypto Map name)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find the following looking CLI configuration line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map &lt;MAP name=""&gt; &lt;NUMBER&gt; match address &lt;ACL name=""&gt;&lt;/ACL&gt;&lt;/NUMBER&gt;&lt;/MAP&gt;&lt;/STRONG&gt;&lt;MAP name=""&gt;&lt;/MAP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can check what the ACL has configured with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-list &lt;ACL name=""&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will tell you what traffic is supposed to be passed through the L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To confirm what would happen to a certain packet that is coming from the LAN through ASA towards some remote address you can use the "packet-tracer" command. This will show a VPN Phase if it matches some VPN configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example commands could be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp &lt;SOURCE ip=""&gt; 12345 &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside udp &lt;SOURCE ip=""&gt; 12345 &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside icmp &lt;SOURCE ip=""&gt; 8 0 &lt;DESTINATION ip=""&gt; &lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above are the example commands for some TCP/UDP or ICMP test. The source interface in this case is &lt;STRONG&gt;"inside" &lt;/STRONG&gt;where the connecting host would be located at. In your ASA the interface might have a different name,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Packet Tracer is also available through the ASDM in its top menus.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 13:12:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-difference-among-normal-acl-crypto-acl-acl-manager/m-p/2467695#M270081</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-07T13:12:14Z</dc:date>
    </item>
  </channel>
</rss>

