04-18-2017 10:47 AM
Hi all,
I am experimenting with IPsec tunnels between a router at a remote location and an ASA (the 'hub', at HQ).
The idea is that users at the remote locations (the 'spokes'), obtain all their network access (including internet) over the tunnel. So, as far as my router is concerned, all it should be communicating with is the public static IP of my HQ's ASA.
The outside interface on the router, has 'crypto map vpn-to-hq', but does this in itself 'lock down' the interface?
How secure is this in way of external threats pounding on my router's external public IP, or in ensuring my users can't circumvent the tunnel?
Do I need an access list on the router's outside interface blocking all ingress traffic from all IPs except the ASA, and another access list blocking all egress traffic to any IP's except the ASA's?
Thank you for reading!
Best Regards,
Elliot
Solved! Go to Solution.
04-18-2017 02:01 PM
As always, it depends ...
When assuming that your crypto-ACL has a form of "permit ip BRANCH-NETWOK any" then the router still allows all incoming traffic to the router itself. You could "tune" that, but IMO it makes the setup more complex (and complexity is one of the first enemies of security).
Configuring your router with a strict incoming ACL will make things easier and also protect your router if there would show up a bug in the handling of the crypto ACL.
An outgoing ACL could also restrict traffic flowing to the internet when something with your crypto-setup goes wrong.
04-18-2017 02:01 PM
As always, it depends ...
When assuming that your crypto-ACL has a form of "permit ip BRANCH-NETWOK any" then the router still allows all incoming traffic to the router itself. You could "tune" that, but IMO it makes the setup more complex (and complexity is one of the first enemies of security).
Configuring your router with a strict incoming ACL will make things easier and also protect your router if there would show up a bug in the handling of the crypto ACL.
An outgoing ACL could also restrict traffic flowing to the internet when something with your crypto-setup goes wrong.
04-19-2017 02:23 AM
Hi Karsten,
Thank you for your reply.
Yes, my crypto-ACL does indeed permit only the remote site's IP range. Here's a snippet of my config:
I understand from your reply then, that despite it introducing extra complexity to the overall config, it would be recommended to lock it down with ACL's against inbound and outbound data?
Thank you.
Best Regards,
Elliot
04-20-2017 03:45 AM
Locking it down with an ACL is the least complex and most easiest way. I would always do that as a first line of defense.
For your ACL VPN-TRAFFIC: You don't need the second line with "permit icmp" as icmp is part of IP.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide