<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Filtering Tunnels in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739896#M980521</link>
    <description>&lt;P&gt;I have an ASA 5520 7.2 (I bleieve)&lt;/P&gt;&lt;P&gt;I am allowing an Ipsec tunnel thru this firewall, but the ASA itself is not an endpoint for this tunnel. Is it possible to filter the traffic that goes thru the tunnel and if so how?&lt;/P&gt;&lt;P&gt;All I really want to do is limit the devices allowed to use this tunnel ie allow IP 1 to IP 2 and drop everything else.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 10:16:03 GMT</pubDate>
    <dc:creator>chrish</dc:creator>
    <dc:date>2019-03-11T10:16:03Z</dc:date>
    <item>
      <title>Filtering Tunnels</title>
      <link>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739896#M980521</link>
      <description>&lt;P&gt;I have an ASA 5520 7.2 (I bleieve)&lt;/P&gt;&lt;P&gt;I am allowing an Ipsec tunnel thru this firewall, but the ASA itself is not an endpoint for this tunnel. Is it possible to filter the traffic that goes thru the tunnel and if so how?&lt;/P&gt;&lt;P&gt;All I really want to do is limit the devices allowed to use this tunnel ie allow IP 1 to IP 2 and drop everything else.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739896#M980521</guid>
      <dc:creator>chrish</dc:creator>
      <dc:date>2019-03-11T10:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Tunnels</title>
      <link>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739897#M980522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you explain, is the vpn client inside or outside the firewall? What is the endpoint? As long as you don't want to filter traffic once the tunnel is established you should be able write a simple access-list to restrict which ip addresses are able to vpn. Also, is this remote access or lan to lan?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2007 15:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739897#M980522</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-17T15:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Tunnels</title>
      <link>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739898#M980523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a lan to lan static tunnel. &lt;/P&gt;&lt;P&gt;Filtering traffic that is traveling thru the established tunnel is what I am trying to accomplish. &lt;/P&gt;&lt;P&gt;The endpoints are 2 devices by a company called SonicWall. The tunnel simply passes thru my firewall and I don't have access to the other devices to insure the security I desire.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2007 16:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739898#M980523</guid>
      <dc:creator>chrish</dc:creator>
      <dc:date>2007-05-17T16:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering Tunnels</title>
      <link>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739899#M980524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If an encrypted VPN site to site tunnel is passing through your firewall I do not know of any way that you can examine or filter that traffic. Part of the purpose of IPSec VPN is that no intermediate device along the VPN path can see the data being transported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2007 16:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-tunnels/m-p/739899#M980524</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2007-05-18T16:37:44Z</dc:date>
    </item>
  </channel>
</rss>

