<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX Site to Site VPN Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-site-to-site-vpn-issue/m-p/929689#M939514</link>
    <description>&lt;P&gt;Consider the following Phase 2 parameters of a VPN .The issue is i need to give clear text access-list too along with the normal Crypto ACL and NONAT ACL .Iam not able to find out the reason for the same &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 140 match address outside_cryptomap_140&lt;/P&gt;&lt;P&gt;crypto map outside_map 140 set peer 65.127.X.X&lt;/P&gt;&lt;P&gt;crypto map outside_map 140 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;a)Crytpo ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_140 extended permit icmp host 10.10.49.30 host 10.200.253.8 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_140 extended permit ip host 10.81.34.59 host 10.100.8.3 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_140 extended permit ip host 10.10.49.30 10.100.8.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b)NO NAT ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list webdmz_outbound_nat0_acl extended permit ip host 10.10.49.30 host 10.200.253.8&lt;/P&gt;&lt;P&gt;access-list webdmz_outbound_nat0_acl extended permit ip host 10.10.49.30 10.100.8.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list appdmz_outbound_nat0_acl extended permit ip host 10.81.34.59 host 10.100.8.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c)Clear text ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list webdmz_access_in extended permit tcp host 10.10.49.30 10.100.8.0 255.255.255.0 eq ssh &lt;/P&gt;&lt;P&gt;access-list webdmz_access_in extended permit icmp host 10.10.49.30 host 10.200.253.8&lt;/P&gt;&lt;P&gt;access-list appdmz_access_in extended permit ip host 10.81.34.59 host 10.100.8.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Query : In a Site to Site VPN ideally only Crypto ACL (Interesting traffic ACL ) and NO NAT ACL is required . However in some of the VPN Scenarios Clear text ACL is also required without which even after the tunnel is up , devices are unreachable and it will give a following error .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;Connection denied by webdmz_access_inâ&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)Is it really required &lt;/P&gt;&lt;P&gt;2)If not , what are those scenarios in which it needs to be given &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ankur &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 12:29:22 GMT</pubDate>
    <dc:creator>ankurs2008</dc:creator>
    <dc:date>2019-03-11T12:29:22Z</dc:date>
    <item>
      <title>PIX Site to Site VPN Issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-site-to-site-vpn-issue/m-p/929689#M939514</link>
      <description>&lt;P&gt;Consider the following Phase 2 parameters of a VPN .The issue is i need to give clear text access-list too along with the normal Crypto ACL and NONAT ACL .Iam not able to find out the reason for the same &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 140 match address outside_cryptomap_140&lt;/P&gt;&lt;P&gt;crypto map outside_map 140 set peer 65.127.X.X&lt;/P&gt;&lt;P&gt;crypto map outside_map 140 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;a)Crytpo ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_140 extended permit icmp host 10.10.49.30 host 10.200.253.8 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_140 extended permit ip host 10.81.34.59 host 10.100.8.3 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_140 extended permit ip host 10.10.49.30 10.100.8.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b)NO NAT ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list webdmz_outbound_nat0_acl extended permit ip host 10.10.49.30 host 10.200.253.8&lt;/P&gt;&lt;P&gt;access-list webdmz_outbound_nat0_acl extended permit ip host 10.10.49.30 10.100.8.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list appdmz_outbound_nat0_acl extended permit ip host 10.81.34.59 host 10.100.8.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c)Clear text ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list webdmz_access_in extended permit tcp host 10.10.49.30 10.100.8.0 255.255.255.0 eq ssh &lt;/P&gt;&lt;P&gt;access-list webdmz_access_in extended permit icmp host 10.10.49.30 host 10.200.253.8&lt;/P&gt;&lt;P&gt;access-list appdmz_access_in extended permit ip host 10.81.34.59 host 10.100.8.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Query : In a Site to Site VPN ideally only Crypto ACL (Interesting traffic ACL ) and NO NAT ACL is required . However in some of the VPN Scenarios Clear text ACL is also required without which even after the tunnel is up , devices are unreachable and it will give a following error .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;Connection denied by webdmz_access_inâ&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)Is it really required &lt;/P&gt;&lt;P&gt;2)If not , what are those scenarios in which it needs to be given &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ankur &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-site-to-site-vpn-issue/m-p/929689#M939514</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2019-03-11T12:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Site to Site VPN Issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-site-to-site-vpn-issue/m-p/929690#M939515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ankur,&lt;/P&gt;&lt;P&gt;  As you know, traffic from a higher security interface to a lower security interface is permit by default. That means if there is no access-list applied to the higher security leved interface, traffic will be permit. It is not really required.&lt;/P&gt;&lt;P&gt;  But in some firewall implementations, security admins apply access-list to that higher security leveled interface to filter traffic originated from inside, the trusted users. In this case, they permit specific traffic, then a deny any any in the end. Since the traffic is filtered, you have to specifically permit the tunnel traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2008 13:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-site-to-site-vpn-issue/m-p/929690#M939515</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-04-10T13:45:15Z</dc:date>
    </item>
  </channel>
</rss>

