<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL help and understanding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079476#M395502</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;karsten.iwen wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL that you reference with "match address" only controls the traffic that can be processed by the VPN-Tunnel. &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Karsten can you elaborate on this statement a little more please?&amp;nbsp; Also I was able to sniff the traffic coming from the VPN tunnel that was unencrypted and found that only the internal hosts specified on the ACL are being contacted from the external subnet's.&amp;nbsp; So in a way that I dont really understand, the NMI-ENCRYPT ACL is filtering external traffic as it should.&amp;nbsp; Now to tighten things up... I want to remove the broad statements and replace them with the following... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10 permit tcp host 10.63.127.120 eq 80 10.46.101.101 0.0.0.3&lt;/P&gt;&lt;P&gt;20 permit tcp host 10.63.127.150 eq 80 10.46.101.101 0.0.0.3&lt;/P&gt;&lt;P&gt;30 permit tcp host 10.63.70.205 eq 80 10.46.101.101 0.0.0.3&lt;/P&gt;&lt;P&gt;40 permit tcp host 10.63.127.180 eq 80 10.46.102.101 0.0.0.3&lt;/P&gt;&lt;P&gt;50 permit tcp host 10.63.70.205 eq 80 10.46.102.101 0.0.0.3&lt;/P&gt;&lt;P&gt;60 permit tcp host 10.63.13.6 eq 22 host 10.46.102.103&lt;/P&gt;&lt;P&gt;70 permit tcp host 10.63.67.8 eq 4182 host 10.46.104.101&lt;/P&gt;&lt;P&gt;80 permit udp host 10.63.67.8 eq 137 host 10.46.104.101&lt;/P&gt;&lt;P&gt;90 permit ip host 10.63.127.120 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;100 permit ip host 10.63.70.205 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;110 permit ip host 10.63.127.180 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;120 deny ip any any log&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Nov 2012 19:06:54 GMT</pubDate>
    <dc:creator>miguel.desantiago</dc:creator>
    <dc:date>2012-11-15T19:06:54Z</dc:date>
    <item>
      <title>ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079474#M395500</link>
      <description>&lt;P&gt;Below is output from a config running on my VPN router (ip removed for security purposes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map NMI-VPN isakmp-profile NMI-ISAKMP&lt;/P&gt;&lt;P&gt;crypto map NMI-VPN 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer X.X.X.X&lt;/P&gt;&lt;P&gt; set transform-set AES-SHA&lt;/P&gt;&lt;P&gt; set isakmp-profile NMI-ISAKMP&lt;/P&gt;&lt;P&gt; match address NMI-ENCRYPT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two questions I want answered...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. What is the &lt;STRONG&gt;match address &lt;/STRONG&gt;command and what does it do?&lt;/P&gt;&lt;P&gt;2. My NMI-ENCRYPT extended access-list has the following output...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended IP access list NMI-ENCRYPT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit ip host 10.63.127.120 10.46.0.0 0.0.255.255 (32788 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit ip host 10.63.127.120 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 permit ip host 10.63.67.8 10.46.0.0 0.0.255.255 (49459335 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 90 permit ip host 10.63.70.205 10.0.4.0 0.0.0.255 (175 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100 permit ip host 10.63.70.205 10.46.0.0 0.0.255.255 (2798 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110 permit ip host 10.63.13.6 10.46.0.0 0.0.255.255 (11048 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 120 permit ip host 10.63.127.150 10.46.0.0 0.0.255.255 (2208 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 140 permit ip host 10.63.127.180 10.46.0.0 0.0.255.255 (172179 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 150 permit ip host 10.63.127.180 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 160 deny ip any any log (53156 matches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.63.X.X is my internal network. 10.46.X.X and 10.0.4.X are external networks...&amp;nbsp; If I'm not mistaken doesn't the following ACL only restrict specific internal users to specific external subnets?&amp;nbsp; What I want to do is restrict the external subnets to specific internal hosts...&amp;nbsp; does the following ACL do this already or would I have to reconfigure the ACL?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079474#M395500</guid>
      <dc:creator>miguel.desantiago</dc:creator>
      <dc:date>2019-03-12T00:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079475#M395501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ACL that you reference with "match address" only controls the traffic that can be processed by the VPN-Tunnel. With a corresponding config on the other side, all the traffic in the permit-ACEs are allowed in both directions.&lt;/P&gt;&lt;P&gt;Normally these crypto-ACLs are configured quite broad like that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list ext NMI-ENCRYPT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit ip 10.63.0.0 0.0.255.255 10.0.4.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit ip 10.63.0.0 0.0.255.255 10.46.0.0 0.0.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That saves some ressources as the router builds one set of SAs for each line in the crypto-ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For access-control you can apply an incoming- and an outgoing ACL directly in the tunnel:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;crypto map NMI-VPN 10 ipsec-isakmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; set peer ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; set transform-set ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; match address ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; set ip access-group VPN-FILTER-SITE-X-IN in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; set ip access-group VPN-FILTER-SITE-X-OUT out&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 17:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079475#M395501</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-11-15T17:51:36Z</dc:date>
    </item>
    <item>
      <title>ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079476#M395502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;karsten.iwen wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL that you reference with "match address" only controls the traffic that can be processed by the VPN-Tunnel. &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Karsten can you elaborate on this statement a little more please?&amp;nbsp; Also I was able to sniff the traffic coming from the VPN tunnel that was unencrypted and found that only the internal hosts specified on the ACL are being contacted from the external subnet's.&amp;nbsp; So in a way that I dont really understand, the NMI-ENCRYPT ACL is filtering external traffic as it should.&amp;nbsp; Now to tighten things up... I want to remove the broad statements and replace them with the following... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10 permit tcp host 10.63.127.120 eq 80 10.46.101.101 0.0.0.3&lt;/P&gt;&lt;P&gt;20 permit tcp host 10.63.127.150 eq 80 10.46.101.101 0.0.0.3&lt;/P&gt;&lt;P&gt;30 permit tcp host 10.63.70.205 eq 80 10.46.101.101 0.0.0.3&lt;/P&gt;&lt;P&gt;40 permit tcp host 10.63.127.180 eq 80 10.46.102.101 0.0.0.3&lt;/P&gt;&lt;P&gt;50 permit tcp host 10.63.70.205 eq 80 10.46.102.101 0.0.0.3&lt;/P&gt;&lt;P&gt;60 permit tcp host 10.63.13.6 eq 22 host 10.46.102.103&lt;/P&gt;&lt;P&gt;70 permit tcp host 10.63.67.8 eq 4182 host 10.46.104.101&lt;/P&gt;&lt;P&gt;80 permit udp host 10.63.67.8 eq 137 host 10.46.104.101&lt;/P&gt;&lt;P&gt;90 permit ip host 10.63.127.120 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;100 permit ip host 10.63.70.205 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;110 permit ip host 10.63.127.180 10.0.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;120 deny ip any any log&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 19:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079476#M395502</guid>
      <dc:creator>miguel.desantiago</dc:creator>
      <dc:date>2012-11-15T19:06:54Z</dc:date>
    </item>
    <item>
      <title>ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079477#M395503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could include port-number in the crypto-acl, but keep in mind that in general the ACL on the other side should be mirrored to this ACL. This config makes all overcomplicated. You are using the wrong tool for the job here. The crypto-acl is for defining the encryption-domains, and the tunnel-ACLs ("set ip access-group ...") is for access-control.&lt;/P&gt;&lt;P&gt;And of course you have to make sure that your subnets are alligned on subnet-borders. Your first five destinations are not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 20:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079477#M395503</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-11-15T20:05:47Z</dc:date>
    </item>
    <item>
      <title>ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079478#M395504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karsten&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After searching and reading I finally decrypted what your were saying.&amp;nbsp; I found that the &lt;STRONG&gt;match address &lt;/STRONG&gt;command specifies what traffic will be encrypted by the crypto map. So &lt;STRONG&gt;permit &lt;/STRONG&gt;means &lt;STRONG&gt;encrypt &lt;/STRONG&gt;and &lt;STRONG&gt;deny &lt;/STRONG&gt;means &lt;STRONG&gt;do not encrypt.&amp;nbsp; &lt;/STRONG&gt;I'm sure this is exactly what you said but I really couldn't understand your terminology...&amp;nbsp; however, thanks for all your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Miguel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2012 17:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079478#M395504</guid>
      <dc:creator>miguel.desantiago</dc:creator>
      <dc:date>2012-11-19T17:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079479#M395505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that's exactly what the crypto-ACL does. Sorry that I implied that without explaining the way the ACL does in that case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2012 17:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079479#M395505</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-11-19T17:30:25Z</dc:date>
    </item>
    <item>
      <title>ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079480#M395506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I apply this to the outside crypto map NMI-VPN will it work?&amp;nbsp; I only want to restrict access into our network and I'm not concerned if my internal network of 10.63.X.X talks to anyone in 10.46.X.X/16 or 10.0.4.X/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set ip access-group NMI-VPN-FILTER-OUT out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended NMI-VPN-FILTER-OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit tcp 10.46.101.100 0.0.0.3 host 10.63.127.120 eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit tcp 10.46.101.100 0.0.0.3 host 10.63.127.150 eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit tcp 10.46.101.100 0.0.0.3 host 10.63.70.205 eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 permit tcp 10.46.102.100 0.0.0.3 host 10.63.127.180 eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 permit tcp 10.46.102.100 0.0.0.3 host 10.63.70.205 eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit tcp host 10.46.102.103 host 10.63.13.6 eq 22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 permit tcp host 10.46.104.101 host 10.63.67.8 eq 4182&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80 permit udp host 10.46.104.101 host 10.63.67.8 eq 137&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 90 permit ip 10.0.4.0 0.0.0.255 host 10.63.127.120&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100 permit ip 10.0.4.0 0.0.0.255 host 10.63.127.180&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110 permit ip 10.0.4.0 0.0.0.255 host 10.63.70.205&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 120 deny ip any any log&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2012 18:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079480#M395506</guid>
      <dc:creator>miguel.desantiago</dc:creator>
      <dc:date>2012-11-19T18:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079481#M395507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to control the traffic flowing into your network you have to use the "in" parameter in the "set ip access-group" command. And for the Traffic flowing from your network to the remote-network you have to include the return-traffic into the ACL or activate the IOS-firewall on the router.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2012 19:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079481#M395507</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-11-19T19:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079482#M395508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help.&amp;nbsp; I usually get mixed up over the "in" and "out" parameter.&amp;nbsp; So the "out" on applies to anything coming from my internal network and the "in" applies to anything coming from the external network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also will this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list extended NMI-VPN-FILTER-IN &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit tcp 10.46.101.100 0.0.0.3 host 10.63.127.120 eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit tcp 10.46.101.100 0.0.0.3 host 10.63.127.150 eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit tcp 10.46.101.100 0.0.0.3 host 10.63.70.205 eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 permit tcp 10.46.102.100 0.0.0.3 host 10.63.127.180 eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 permit tcp 10.46.102.100 0.0.0.3 host 10.63.70.205 eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit tcp host 10.46.102.103 host 10.63.13.6 eq 22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 permit tcp host 10.46.104.101 host 10.63.67.8 eq 4182&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80 permit udp host 10.46.104.101 host 10.63.67.8 eq 137&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 90 permit tcp host 10.0.4.205 host 10.63.70.205 eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110 deny ip any any log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list extended NMI-VPN-FILTER-OUT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit ip any 10.46.0.0 0.0.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any 10.0.4.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 deny any an&lt;/SPAN&gt;y &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2012 15:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079482#M395508</guid>
      <dc:creator>miguel.desantiago</dc:creator>
      <dc:date>2012-11-26T15:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help and understanding</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079483#M395509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, coming from your VPN-peer, only the defined communication is allowed which is controlled with your ACL NMI-VPN-FILTER-IN. For your OUT-Filter, you have to decide of that is really needed. If your crypto-ACL doesn't include anything else then 10.46/16 and 10.0.4.0/24, then you don't need that filter. It would only be needed if you want to restrict certein systems to communicate to the other side. If you don't specify your "out"-filter, then everything that is specified in your crypto-ACL will be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But be aware that these ACLs are not stefull. If you telnet from your inside host (e.g. 10.63.127.120) to a remote host (e.g. 10.0.4.100) then the return-packet would be matched at seq. 110 of the ACL NMI-VPN-FILTER-IN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2012 16:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-and-understanding/m-p/2079483#M395509</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-11-26T16:10:24Z</dc:date>
    </item>
  </channel>
</rss>

