10-26-2017 05:55 AM - edited 02-21-2020 06:35 AM
hi,
We have IPSec tunnel on ASAs between our two sites over the internet. I want to exclude communication between two hosts from being encrypted in IPSec. I thought if I add a "deny" statement on top of interesting traffic ACL it would work fine. But, it is till using the tunnel and I do not see ACL hits on the deny ACL.
Is there anything wrong with this approach?
10-26-2017 07:02 AM
10-26-2017 07:03 AM
10-26-2017 12:33 PM
I do not have "sysopt connection permit-vpn" enabled, and still can't get it to work.
The ASA code I am running is the latest 9.7.1.8.
I ran a packet tracer but it did not show me anything related to IPSec tunnel.
10-26-2017 01:01 PM - edited 10-26-2017 01:04 PM
Hi,
I run into this issue a lot and to fix it I usually reload my ASA. When it comes back, I find that the deny statement takes effect. Worth a shot in my opinion.
Add the deny statement in your crypto ACL as line 1. Write mem. Reload. Test.
In my experience you can't trust an ASA to treat VPN configurations made via the CLI properly, and that frustrates me because I hate GUI. So when my ASA starts behaving illogically and I can't find anything wrong, first thing I do now is reload it and that fixes it 80% of the time.
10-26-2017 02:57 PM
10-26-2017 05:05 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide