09-21-2017 12:12 AM - edited 02-21-2020 06:20 AM
hi all,
i would like to 'lock down' crypto ACL used for S2S/L2L IPSec from IP to ISAKMP and ESP ports only.
could anyone confirm if thinking below is correct? no need for GRE port 47?
object service UDP_500
service udp source eq 500 destination eq 500
object service UDP_4500
service udp source eq 4500 destination eq 4500
object service ESP_50
service esp
object-group service VPN_PORTS
service-object object UDP_500
service-object object UDP_4500
service-object object ESP_50
no access-list S2S_ACL extended permit ip host 1.1.1.1 host 2.2.2.2
access-list S2S_ACL extended permit object-group VPN_PORTS host 1.1.1.1 host 2.2.2.2
Solved! Go to Solution.
09-21-2017 07:26 AM
Yes.
GRE tunnels are not supported on ASA. is this ACL for routers behind the ASA's?
09-21-2017 06:21 AM
Hi johnlloyd_13,
You only need to allow UDP port 500, 4500 and ESP protocol. GRE is encapsulated and encrypted by ESP so need to open that.
09-21-2017 06:55 AM
hi,
so my above config is confirmed acceptable?
09-21-2017 06:56 AM
Yes, It is correct.
09-21-2017 07:21 AM
hi,
thanks! one last thing, i configure the same ACL to 'mirror' the crypto ACL on the other ASA correct?
meaning, change the ACE from IP to the grouped VPN ports.
09-21-2017 07:26 AM
Yes.
GRE tunnels are not supported on ASA. is this ACL for routers behind the ASA's?
09-21-2017 07:34 AM
yes, GRE tunnels are terminated on routers behind ASA.
09-21-2017 07:35 AM
That's Great. Go ahead with the above configuration.
09-21-2017 12:12 PM
Well, although the ACL can work, it doesn't make much sense. We need to look at two scenarios:
1) No NAT between the IPsec-peers. You need UDP(500,500) and ESP. That is covered.
2) If there is NAT, the connection is started with UDP(500,500), but the source-port can get changed to something different. After detecting NAT, the initiator switches to UDP(4500,4500) and again the source can be changed to something else. Here, no ESP is seen by the ACL as everything is encapsulated in UDP.
09-21-2017 06:03 PM
hi karsten,
thanks for diving in! my scenario is depicted on your item 1.
i've got GRE tunnels terminated on a router that's behind the ASA that would trigger the 'interesting' traffic (crypto ACL).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide