cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
514
Views
0
Helpful
2
Replies

Bypass Upstream Corporate Router ACL with IPSEC VPN

mlenco
Level 1
Level 1

Hello

My Corporate office has an enterprise routing infrastructure. I want to setup a Site to Site IPSEC VPN as well as a AnyConnect webvpn solution for my users through the enterprise. If the corporate security guys create an ACL on the upstream router, from my Cisco ASA 5585, to allow IPSEC between the /28 (the segment between my outside ASA interface and the PO trunk on the upstream corporate router) then I can send ip any any between the subnet on my inside interface and the subnet on the inside interface on the distant ASA (still on the corporate enterprise infrastructure, holding routing constant, correct. In short, if a packet is encrypted in an IPSEC packet, IPSEC is not filtered then you can send any traffic even if there are more restrictive ACE on an upstream router ACL, correct?

 

Thanks!

 

Matt

CCNP

1 Accepted Solution

Accepted Solutions

You are right, the corporate router can't look into the VPN-packet. So whatever is transported inside the VPN, it bypasses the corporate security-ACL.

To get VPN-traffic to your ASA, you need the following protocols/ports:

  1. UDP/500, UDP4500, IP/50 for IPsec
  2. TCP/443, UDP/443 for AnyConnect with SSL/TLS

View solution in original post

2 Replies 2

You are right, the corporate router can't look into the VPN-packet. So whatever is transported inside the VPN, it bypasses the corporate security-ACL.

To get VPN-traffic to your ASA, you need the following protocols/ports:

  1. UDP/500, UDP4500, IP/50 for IPsec
  2. TCP/443, UDP/443 for AnyConnect with SSL/TLS

Thanks, that is what I thought.