<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix - using acls on split tunnel vpn?  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771741#M970313</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the descriptive post. I hope we can help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you remove sysopt connection permit-ipsec you will write the access you want to allow in an outside acl like so...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip &lt;REMOTE.VPN.CLIENT.SUBNET&gt; host x.x.x.1&lt;/REMOTE.VPN.CLIENT.SUBNET&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip &lt;REMOTE.VPN.CLIENT.SUBNET&gt; host x.x.x.2&lt;/REMOTE.VPN.CLIENT.SUBNET&gt;&lt;/P&gt;&lt;P&gt;etc.&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option 2 would be to use split tunneling&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split_tunnel_acl standard permit host x.x.x.1&lt;/P&gt;&lt;P&gt;access-list split_tunnel_acl standard permit host x.x.x.2 &lt;/P&gt;&lt;P&gt;vpngroup jetvpn split-tunnel split_tunnel_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;note: I also noticed that you used the same acl for your nat 0 and your split tunnel...you should always use different acl's even if they contain the same entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Aug 2007 21:16:29 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-08-30T21:16:29Z</dc:date>
    <item>
      <title>pix - using acls on split tunnel vpn?</title>
      <link>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771740#M970312</link>
      <description>&lt;P&gt;Greetings, this is my first post to this list so please forgive me if this is a silly question or Ive somehow missed an answer in searching the forum archives. I did find some similar previous questions but didnt see how I could apply them directly to my situation. So here goes...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im familar with firewalls/vpns but not so much with cisco pix's. I have a PIX 515 running v6.1 and what I think should be a simple VPN access-list question but cant seem to figure it out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Essentially this is my layout&lt;/P&gt;&lt;P&gt;172.16.0.0/16 ---- pix ----- internet ---- pcs with cisco vpn client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the following Ive enabled a split tunnel ipsec vpn for roaming clients who have a 4.x cisco vpn client and presently when the tunnel comes up all traffic is allowed from the client to the internal network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server RADIUS (inside) host 172.16.0.3 ********** timeout 5&lt;/P&gt;&lt;P&gt;access-list sw_vpn_clt_nonat permit ip 172.16.0.0 255.255.0.0 192.168.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool sw_vpn_clt_pool 192.168.254.1-192.168.254.254&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list sw_vpn_clt_nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map mymap client authentication RADIUS&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup jetvpn address-pool sw_vpn_clt_pool&lt;/P&gt;&lt;P&gt;vpngroup jetvpn dns-server 172.16.0.7&lt;/P&gt;&lt;P&gt;vpngroup jetvpn default-domain jasper.jasperengines.com&lt;/P&gt;&lt;P&gt;vpngroup jetvpn idle-time 7200&lt;/P&gt;&lt;P&gt;vpngroup jetvpn password *************&lt;/P&gt;&lt;P&gt;vpngroup jetvpn split-tunnel sw_vpn_clt_nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What Id like to do is tighten down that vpn tunnel substansially with an acl to allow only access to a few internal resources. From my simple understanding  'sysopt connection permit-ipsec' is whats allowing all traffic to pass thru the tunnel when it comes up. And sure enough if I remove that command the tunnel will come up but not allow me to pass traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So at that point Im unsure where to add the ACL to allow only what I want to pass thru the VPN. It seems presently theres a dynamic acl thats built per connection, eg:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JETPIX# show crypto map&lt;/P&gt;&lt;P&gt;Crypto Map: "mymap" interfaces: { outside }&lt;/P&gt;&lt;P&gt;        client configuration address initiate&lt;/P&gt;&lt;P&gt;        client configuration address respond&lt;/P&gt;&lt;P&gt;        client authentication RADIUS&lt;/P&gt;&lt;P&gt;Crypto Map "mymap" 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;        Dynamic map template tag: dynmap&lt;/P&gt;&lt;P&gt;Crypto Map "mymap" 30 ipsec-isakmp&lt;/P&gt;&lt;P&gt;        Peer = 51.28.133.45&lt;/P&gt;&lt;P&gt;        access-list  dynacl337 permit ip any host 192.168.254.30 (hitcnt=52) &lt;/P&gt;&lt;P&gt;            dynamic (created from dynamic map dynmap/10)&lt;/P&gt;&lt;P&gt;JETPIX# show access-list&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-list  dynacl337 permit ip any host 192.168.254.30 (hitcnt=52) &lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So Im prone to think I need to somehow change my 'crypto dynamic-map' command to refer to a list, but Ive had no luck with that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help any one could provide would be greatly appreciated.&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771740#M970312</guid>
      <dc:creator>m.brentlinger</dc:creator>
      <dc:date>2019-03-11T11:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: pix - using acls on split tunnel vpn?</title>
      <link>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771741#M970313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the descriptive post. I hope we can help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you remove sysopt connection permit-ipsec you will write the access you want to allow in an outside acl like so...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip &lt;REMOTE.VPN.CLIENT.SUBNET&gt; host x.x.x.1&lt;/REMOTE.VPN.CLIENT.SUBNET&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip &lt;REMOTE.VPN.CLIENT.SUBNET&gt; host x.x.x.2&lt;/REMOTE.VPN.CLIENT.SUBNET&gt;&lt;/P&gt;&lt;P&gt;etc.&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option 2 would be to use split tunneling&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split_tunnel_acl standard permit host x.x.x.1&lt;/P&gt;&lt;P&gt;access-list split_tunnel_acl standard permit host x.x.x.2 &lt;/P&gt;&lt;P&gt;vpngroup jetvpn split-tunnel split_tunnel_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;note: I also noticed that you used the same acl for your nat 0 and your split tunnel...you should always use different acl's even if they contain the same entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2007 21:16:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771741#M970313</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-08-30T21:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: pix - using acls on split tunnel vpn?</title>
      <link>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771742#M970314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! Thats very helpful. Ill give it a try and post my results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have a question: You note I'm using the same acl for my nat 0 and split tunnel; you suggest I should always use different acl's even if they contain the same entries. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im guessing you proposed that just so I wouldnt inadvertantly break something by making a change to an ACL that affected 2 things when I really may just want it to be a change for one? Or is there a larger reason that Im missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2007 13:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771742#M970314</guid>
      <dc:creator>m.brentlinger</dc:creator>
      <dc:date>2007-08-31T13:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: pix - using acls on split tunnel vpn?</title>
      <link>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771743#M970315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hum. no such luck, with option2; the following completely blocked all vpn client traffic, and a 'sysopt connection permit-ipsec' is all that would allow it to pass again, though my acl had no effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no vpngroup jetvpn split-tunnel sw_vpn_clt_nonat&lt;/P&gt;&lt;P&gt;access-list sw_vpn_clt_acl permit tcp 172.16.0.0 255.255.0.0 192.168.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list sw_vpn_clt_acl permit tcp 192.168.254.0 255.255.255.0 host 172.16.0.87  eq 1494&lt;/P&gt;&lt;P&gt;access-list sw_vpn_clt_acl permit icmp any any&lt;/P&gt;&lt;P&gt;vpngroup jetvpn split-tunnel sw_vpn_clt_acl&lt;/P&gt;&lt;P&gt;no sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your first option worked great though... thanks very much for all your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2007 18:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771743#M970315</guid>
      <dc:creator>m.brentlinger</dc:creator>
      <dc:date>2007-08-31T18:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: pix - using acls on split tunnel vpn?</title>
      <link>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771744#M970316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your split tunnel acl that you tried doesn't really make sense. Which network is the remote network? 172.16 or 192.168? You also want to change tcp to ip in the first statement and you should not narrow it down to individual ports like you did in the second statement. The drawbacks of doing it that way I guess. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to look at it as not really creating a detailed access-list, all you are doing is defining which hosts you are allowing access to over the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh, and when you do option 2 you have to leave in the sysopt command!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad the first option worked out. Thanks for the rating.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2007 18:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-using-acls-on-split-tunnel-vpn/m-p/771744#M970316</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-08-31T18:12:25Z</dc:date>
    </item>
  </channel>
</rss>

