<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port based restrcition in VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125639#M878192</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leave the crypto acl as ip. Create a traditional interface access list to filter the traffic. Then to allow the interface acl to actually work, you need to disable sysopt connection permit-ipsec. This will stop all your ipsec traffic from bypassing your interface acls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Jan 2009 20:43:34 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2009-01-05T20:43:34Z</dc:date>
    <item>
      <title>Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125637#M878188</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are having a PIX 6.3(3) firewall on which lot of Site to Site VPNs are configured.The below is a crypto ACL which needs to be restricted on a port basis ; however when we configure it for a port basis it doesnot works and we have to continue the IP based access.I have read that port based restriction is possible for the S2S tunnels with the ACE feature of the PIX 7.0 and above ,please let us know if i can go and configure the same . Also is there any possibility of restricting the S2S Crypto ACL on a port basis on versio 6.3(3).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit ip host 10.25.X.X 192.168.3.2  255.255.255.255&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit ip host 10.25.X.X 192.168.1.10 255.255.255.255&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:31:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125637#M878188</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2019-03-11T14:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125638#M878191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help me on this&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Jan 2009 20:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125638#M878191</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-05T20:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125639#M878192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leave the crypto acl as ip. Create a traditional interface access list to filter the traffic. Then to allow the interface acl to actually work, you need to disable sysopt connection permit-ipsec. This will stop all your ipsec traffic from bypassing your interface acls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Jan 2009 20:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125639#M878192</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-01-05T20:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125640#M878193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot .Please tell me if there is any specific reason to let the Crypto ACLs IP based only . Also the option you have told fits in 6.3(3) and 6.3(5) however if we plan to upgrade the PIX to 7.0 , can we put port based restriction according to group-policy / tunnel group feature ?If yes , do we need to disable  " sysopt connection permit-ipsec" for 7.0 also (while configuring ACE)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jan 2009 08:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125640#M878193</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-06T08:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125641#M878194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you can do it in 7, or you can use the vpn-filter feature. If you use vpn-filter, you leave the sysopt enabled. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jan 2009 13:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125641#M878194</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-01-06T13:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125642#M878195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for resolving my query ; however i still have one question which iam trying hard to figure out is if there is any specific reason to let the Crypto ACLs IP based only .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jan 2009 15:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125642#M878195</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-06T15:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125643#M878196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ankur&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really nice question &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We generally tend to leave the ACL's to IP based, to reduce complexity ! It just reduces the processing power of the router to a great extent.. It is simple, u know.. and the issue is, the crypto ACL's have to match between the source and destination.. on a remote branch it might be logical to have a port based ACL, but think of a DC, where many tunnels are terminating.. it would be a big nightmare for the administrator to have port based crypto ACL's in that case.. it can also cause relatively high CPU usage if IP based ACL's are not used !! Hence I would recommend you to stick on with IP based ACL's and restrict access on the internal interface using standard ACL's, as the other poster suggested..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.. all the best..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jan 2009 21:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125643#M878196</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2009-01-06T21:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125644#M878197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is not the answer i am looking for as the question of feasibility to put in a large DC arises when at least port based Crypto ACL works ,the issue is that it doesnot works at all The IP based crypto ACL works with "sysopt connection permit-ipsec" command  , however it doesnot works if TCP / UDP is specified in place of IP access in Crypto ACLS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jan 2009 11:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125644#M878197</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-07T11:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125645#M878198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ankur&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think your question was "is there any specific reason to let the Crypto ACLs IP based only " for which I had given a reply.. If your question was something different, I would have answered appropriately..  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any case, theoritically it should work.. what TCP ports are you trying to put on the crypto ACL ? with the normal TCP ports of the application, you must also allow protocols like icmp etc, to make sure you keep the tunnel alive... The IPSEC tunnel is basically built, when any traffic is destined to a particular destination, with a particular port, defined in the crypto ACL ! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you explain me your requirement ? what kind of application ? Do you have the configs that you had tested for port based ACL ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jan 2009 20:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125645#M878198</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2009-01-07T20:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125646#M878199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following are the 2 ACLs.IP based Crypto ACL works while port based Crypto ACL doesnot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP based Crypto ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit ip host 10.25.1.3 host 192.168.3.2 &lt;/P&gt;&lt;P&gt;access-list S2SVPN permit ip host 10.25.1.4 host 192.168.1.10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port based Crypto ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit tcp host 10.25.1.3 host 192.168.3.2 eq 22&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit tcp host 10.25.1.4 host 192.168.1.10 eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ankur&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Jan 2009 07:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125646#M878199</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-09T07:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125647#M878200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have sent the config , please respond to this &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2009 16:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125647#M878200</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-13T16:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125648#M878201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can some body please throw some light on this &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2009 07:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125648#M878201</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-21T07:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125649#M878202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing I can think of is that the ACL's do not match on both sides of the VPN. If one side uses port based ACL and the other uses IP based, the proxy-id's will not match and the VPN will not work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jan 2009 15:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125649#M878202</guid>
      <dc:creator>pim.sijnja</dc:creator>
      <dc:date>2009-01-22T15:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125650#M878203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i ensure that Both the sides are using mirror images whether it is IP based crypto ACL or port based crypto ACL .The only thing is latter doesnot works .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Jan 2009 20:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125650#M878203</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2009-01-23T20:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Port based restrcition in VPN</title>
      <link>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125651#M878204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so if you used the port based acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit tcp host 10.25.1.3 host 192.168.3.2 eq 22 &lt;/P&gt;&lt;P&gt;access-list S2SVPN permit tcp host 10.25.1.4 host 192.168.1.10 eq 22 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your mirror on the other end would have to be...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit tcp host 192.168.3.2 eq 22 host 10.25.1.3&lt;/P&gt;&lt;P&gt;access-list S2SVPN permit tcp host 192.168.1.10 eq 22 host 10.25.1.4 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this what you're trying to do?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Jan 2009 20:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-restrcition-in-vpn/m-p/1125651#M878204</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-01-23T20:30:21Z</dc:date>
    </item>
  </channel>
</rss>

