<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec VPN and ACL Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-and-acl-issue/m-p/1193657#M859570</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sysopt-connection permit ipsec is probably configured (by default, I think), which allows IPsec traffic to bypass the ACL.  You could either remove that command, not necessarily recommended, or if you are doing nat 0 for the VPN traffic, just change the ACL for that to only bypass nat for the addresses you want to allow users to access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember, if you remove "sysopt connection permit ipsec", you'll have to specifically allow access to any service you want VPN users to access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, based on the ACL 101 you posted, users will not be able to access anything; you don't have any permit statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should probably also edit your post and remove your public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 02 Jun 2009 10:54:29 GMT</pubDate>
    <dc:creator>f00f1ter</dc:creator>
    <dc:date>2009-06-02T10:54:29Z</dc:date>
    <item>
      <title>IPSec VPN and ACL Issue</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-and-acl-issue/m-p/1193656#M859564</link>
      <description>&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using Cisco ASA 5510 as my organizations firewall which we have purchased days ago. I have created a IPSec Remote Access VPN with it. My Branch office is located in another city which i need to connect it through VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured my IPSec VPN on ASA with all policies which i need and at client end installed Cisco VPN Client SW. Now i can connect to my VPN Server (ASA) from my branch office. I am also getting an IP address from the POOL which i have allocated during setup of VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public IP configure on my ASA(outside) 203.75.180.2 &lt;/P&gt;&lt;P&gt;Inside IP 10.10.4.11&lt;/P&gt;&lt;P&gt;My Local network is running on 10.10.x.x 255.255.0.0 &lt;/P&gt;&lt;P&gt;VPN Client Pool is 10.10.21.1-10.10.21.15 255.255.255.240 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to apply ACL on my VPN Traffic which i need to be restricted in a sense that i dont want my VPN users to access any resource on my headoffice except 2 web application and 1 SW application. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Initially, i can ping from head office to branch office and vice versa after VPN is connected with no ACL's configured. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now my question is that in what way i need to apply ACL between my outside and inside users as i tried to apply ACL but still all my resources are available to 10.10.21.0 users. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp 10.10.21.0 255.255.255.240 10.10.2.11 255.255.255.255 eq http &lt;/P&gt;&lt;P&gt;access-group 101 in interface outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is the ACL which i have applied on my outside interface but still after that i can access 10.10.10.2.11 from my branch office. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can anyone help me out &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-and-acl-issue/m-p/1193656#M859564</guid>
      <dc:creator>srsiddiqui</dc:creator>
      <dc:date>2019-03-11T15:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN and ACL Issue</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-and-acl-issue/m-p/1193657#M859570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sysopt-connection permit ipsec is probably configured (by default, I think), which allows IPsec traffic to bypass the ACL.  You could either remove that command, not necessarily recommended, or if you are doing nat 0 for the VPN traffic, just change the ACL for that to only bypass nat for the addresses you want to allow users to access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember, if you remove "sysopt connection permit ipsec", you'll have to specifically allow access to any service you want VPN users to access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, based on the ACL 101 you posted, users will not be able to access anything; you don't have any permit statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should probably also edit your post and remove your public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jun 2009 10:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-and-acl-issue/m-p/1193657#M859570</guid>
      <dc:creator>f00f1ter</dc:creator>
      <dc:date>2009-06-02T10:54:29Z</dc:date>
    </item>
  </channel>
</rss>

