02-13-2019 11:12 AM - edited 02-21-2020 08:48 AM
Hey folks, this is my first post here so I am hoping someone can assist. I am setting up a site-to-site connection in my lab using ASA firewalls and ISR routers on each end. The goal is to establish an IPSec tunnel between the ASA's and pass GRE tunnel traffic / EIGRP through the ASA's between the ISR routers. The ASA's, btw, are both running 8.4.
I have been able to establish the IPSec tunnel and also have the GRE tunnel and EIGRP working. However, I need to lock this down on the ASA as currently my access-list referenced by the crypto map is set to permit ip any any.
My attempts to lock this down have failed so far and all the reading I've done on the internet does not seem to be helping as it mostly references running IPSec/GRE on routers only.
Another note is that, on one end, we need to split-tunnel local traffic to the internet. So, the GRE tunnel traffic would not be NAT'd, but the local direct out to the internet (default route) would be NAT'd.
So I could use some help here. I've attached a network diagram. I will grab the configs and add them shortly.
Thanks,
Jim
02-13-2019 12:19 PM
As for "locking down" traffic going over the tunnel, you could just add an ACL to the VTI interface on the ASAs.
Regarding split tunnel. Since you are using GRE you should be able to advertise the routes you want to go over the GRE tunnel in EIGRP and just configure a default route for internet traffic.
02-13-2019 01:09 PM
02-13-2019 01:39 PM
02-13-2019 12:50 PM - edited 02-13-2019 01:00 PM
On the asa's the crypto acl should contain the GRE source/destination IP's, then you should do twice-nat for that traffic on the asa as well. With that, the rest of the traffic will be natted and not be sent on the tunnel.
02-13-2019 01:38 PM
02-13-2019 03:45 PM
Made an additional tweak to NAT in the remote-side ASA.
Changed from:
02-14-2019 11:25 AM
Folks, think I might have gotten some more of this. I updated the crypto acl's today to permit GRE between the loopbacks on each side. The tunnel (IPSec and GRE) are still up and passing traffic. So I think the last piece is to create the acl's for the NAT'd default outbound traffic to the internet.
Here's the snippets if someone can validate I'd appreciate it.
object network FS#52_ISR4431_LOOPBACK0
host 10.218.232.1
description GRE Tunnel Source
object network CTYHL_ISR4551_LOOPBACK0
host 10.218.232.2
description GRE tunnel dest
access-list FS#52_CRYPTOMAP_ACL extended permit gre object FS#52_ISR4431_LOOPBACK0 object CTYHL_ISR4551_LOOPBACK0 log
nat (Inside,outside) source static FS#52_ISR4431_LOOPBACK0 FS#52_ISR4431_LOOPBACK0 destination static CTYHL_ISR4551_LOOPBACK0 CTYHL_ISR4551_LOOPBACK0 no-proxy-arp
!
route outside 0.0.0.0 0.0.0.0 1.1.1.2 1
crypto map outside_map 1 match address FS#52_CRYPTOMAP_ACL
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 1.1.1.2
crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5
crypto map outside_map 1 set security-association lifetime kilobytes unlimited
crypto map outside_map interface outside
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide