<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN access-list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977937#M439663</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also it depends on what type of vpn connection u use to connect.... cisco vpn, cisco anyconnect,&amp;nbsp; something like that...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Jul 2012 10:33:45 GMT</pubDate>
    <dc:creator>nkarthikeyan</dc:creator>
    <dc:date>2012-07-11T10:33:45Z</dc:date>
    <item>
      <title>VPN access-list</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977932#M439658</link>
      <description>&lt;P&gt;folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have a problem with my vpn client not connecting to other corporate vpn server, I have a INBOUND access-list on my router which is permitting only the below access-list. When i remove the below access-list from the interface remote vpn works fine. what other protocols i shld allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended test &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit esp any host X.X.X.X&lt;/P&gt;&lt;P&gt; permit udp any eq non500-isakmp host X.X.X.X&lt;/P&gt;&lt;P&gt;permit udp any eq isakmp host X.X.X.X&lt;/P&gt;&lt;P&gt;permit ahp any host X.X.X.X&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977932#M439658</guid>
      <dc:creator>clark-white</dc:creator>
      <dc:date>2019-03-11T23:29:27Z</dc:date>
    </item>
    <item>
      <title>VPN access-list</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977933#M439659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not quite sure about the Direction of the ports you mentioned above :- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try &lt;/P&gt;&lt;P&gt;permit esp any host X.X.X.X&lt;/P&gt;&lt;P&gt; permit udp any&amp;nbsp; host X.X.X.X eq non500-isakmp&lt;/P&gt;&lt;P&gt;permit udp any&amp;nbsp; host X.X.X.X eq isakmp&lt;/P&gt;&lt;P&gt;permit udp any&amp;nbsp; host X.X.X.X eq 4500&lt;/P&gt;&lt;P&gt;permit ah&amp;nbsp; any host X.X.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 00:03:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977933#M439659</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2012-07-11T00:03:48Z</dc:date>
    </item>
    <item>
      <title>VPN access-list</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977934#M439660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;folks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic flow is from internet (means to other corporate network) to internal LAN , what i have mentioned above is for the&amp;nbsp; return&amp;nbsp; Inbound traffic on the Internet router. For outbound traffic i hvae permitted everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 05:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977934#M439660</guid>
      <dc:creator>clark-white</dc:creator>
      <dc:date>2012-07-11T05:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN access-list</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977935#M439661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;for the typical IPSec-VPN the following ACEs are enough:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier; "&gt;permit udp any host x.x.x.x eq 500 4500 &lt;/STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;! ISAKMP and NAT-Traversal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier; "&gt;permit esp any host x.x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;! VPN-Data-Packets when no NAT-Traversal is used&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't need to allow the protocol AH (Authentication Header), as it is not used for VPNs anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 06:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977935#M439661</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-11T06:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: VPN access-list</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977936#M439662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Clarke,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand your query. There should not be any issue... the ports looks fine.... It should work....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But we need to have few other ports to be added to work this out.... You just check your logs / do packet capture to check&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if anything specifically for the vpn client or vpn server specific ports. See for example if a VPN client uses some specific port to get the vpn connection..... If the VPN request comes with some specific source port... then it will not allow.... Also this depends on the VPN client configuration as well.... if u configured the vpn to use udp nat traversal... it should work....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try allowing tcp and udp ports 10000,10001-cisco &amp;amp; 2746-checkpoint/eras vpn clinets.... if not working try allowing the range 1024-65535 for tcp and udp..... and check the hits and get the confirmed.... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 10:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977936#M439662</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-11T10:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPN access-list</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977937#M439663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also it depends on what type of vpn connection u use to connect.... cisco vpn, cisco anyconnect,&amp;nbsp; something like that...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 10:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977937#M439663</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-11T10:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN access-list</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977938#M439664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; i will apply the configs and update the post, also by enabling log for acces-list and it will pop in console the port numbers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 22:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access-list/m-p/1977938#M439664</guid>
      <dc:creator>clark-white</dc:creator>
      <dc:date>2012-07-12T22:45:58Z</dc:date>
    </item>
  </channel>
</rss>

