02-21-2025 11:42 AM
I tested today the establishment of a Route Based IPsec VPN between the ASA and the FTD.
Everything works fine however I was surprised that on the ASA I didn't have to add a single ACL.
I wonder if traffic destined to the tunnel is treated like traffic from a higher security "zone" to a lower security "zone"?
Solved! Go to Solution.
02-21-2025 11:53 AM
@krzysztofmaciejewskiit it's enabled as default, it would only appear in the configuration if it explictly disabled.
ASA(config)# no sysopt connection permit-vpn
ASA(config)# show run | i sysopt
no sysopt connection permit-vpn
ASA(config)#
ASA(config)# sysopt connection permit-vpn
ASA(config)# show run | i sysopt
ASA(config)#
So if you cannot see it in the configuration it is enabled.
02-21-2025 12:32 PM
Yes as Mr Rob mention and check vti level is 0 by defualt.
Traffic initiate from asa inside to vti
So from inside 90 to 0 allow by defualt (no need sysop here)
And retrun traffic is allow since it have conn
For traffic initiate from FTD
The traffic from 0 to 90 is not allow unless you use sysop (by defualt enable)
The return traffic is allow since it have conn
Thanks to all
MHM
02-21-2025 11:45 AM
@krzysztofmaciejewskiit Access control lists can be applied on a VTI interface to control traffic through VTI. To permit any packets that come from an IPsec tunnel without checking ACLs for the source and destination interfaces, the sysopt connection permit-vpn command is used.
02-21-2025 11:48 AM
Thanks for the information, I didn't know about that.
However, in my case there is no this command entered, and still all traffic destined to and from the tunnel passes correctly.
02-21-2025 11:53 AM
@krzysztofmaciejewskiit it's enabled as default, it would only appear in the configuration if it explictly disabled.
ASA(config)# no sysopt connection permit-vpn
ASA(config)# show run | i sysopt
no sysopt connection permit-vpn
ASA(config)#
ASA(config)# sysopt connection permit-vpn
ASA(config)# show run | i sysopt
ASA(config)#
So if you cannot see it in the configuration it is enabled.
02-21-2025 12:10 PM
A very interesting one. Thanks for the helpful reply!
02-21-2025 12:11 PM
Sysop connection not work and not effect route based vpn in FTD (use zone)
You need ACP' or you already use prefilter pass all traffic in ftd
For ASA I think you need it.
MHM
02-21-2025 12:14 PM
https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/216276-configure-route-based-site-to-site-vpn-t.html <<- the note I mentioned above list here.
MHM
02-21-2025 12:19 PM - edited 02-21-2025 12:32 PM
Check below
MHM
02-21-2025 12:22 PM - edited 02-21-2025 12:38 PM
@MHM Cisco World wrote:
For ASA if you not specify secuirty level then it by defualt set to 100 and I think it same as inside interface.
This with use same secuirty inter will make traffic pass from inside to vti.
Abd hence also sysop no have any effect here.
MHM
No actually By default, the security level for VTI interfaces is 0. You cannot configure the security level.
02-21-2025 12:17 PM
Yes, on FTD I intentionally allowed this traffic using Access Control. However, on the ASA I did nothing completely, no ACLs or using the sysopt command.
02-21-2025 12:21 PM
I explain why in my second comments'
Use show interface ip breif check secuirty level.
MHM
02-21-2025 12:26 PM
security levels are set manually, zone inside 90, outside 10.
02-21-2025 12:32 PM
Yes as Mr Rob mention and check vti level is 0 by defualt.
Traffic initiate from asa inside to vti
So from inside 90 to 0 allow by defualt (no need sysop here)
And retrun traffic is allow since it have conn
For traffic initiate from FTD
The traffic from 0 to 90 is not allow unless you use sysop (by defualt enable)
The return traffic is allow since it have conn
Thanks to all
MHM
02-21-2025 12:33 PM
All clear and logical.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide