cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1383
Views
5
Helpful
2
Replies

easy VPN - split tunnel

Hello,

I'm trying to find  reasons of strange (for me) easy VPN behaviour. I added split tunneling  into server configuration and my 1st ACL looks like:

access-list 102 permit ip 20.0.0.0 0.0.0.255 10.10.10.0 0.0.0.255

when I pinged (from source 10.10.10.X) to 20.0.0.20 I saw increasing numbers of encr and decr packets:

#pkts encaps: 38, #pkts encrypt: 38, #pkts digest: 38

    #pkts decaps: 46, #pkts decrypt: 46, #pkts verify: 46

When I changed my ACL:

access-list 102 permit tcp 20.0.0.0 0.0.0.255 10.10.10.0 0.0.0.255 eq telnet

I expected only telnet will be pushed into tunnel but I found that ping also increased numbers of encr&decr packets.

Do  you know why ? Is it just limitation and I can't split it into  different protocols ? I'm confused becaseu client is aware of ACL  (protocol tcp and telnet port):

r4#sh crypto ipsec client ezvpn

Easy VPN Remote Phase: 4

Tunnel name : VPN

Inside interface list: Ethernet1/0

Outside interface: FastEthernet0/0

Current State: IPSEC_ACTIVE

Last Event: SOCKET_UP

Address: 20.0.0.5

Mask: 255.255.255.255

Save Password: Allowed

Split Tunnel List: 1

       Address    : 20.0.0.0

       Mask       : 255.255.255.0

      Protocol   : 0x6

       Source Port: 0

      Dest Port  : 23

Current EzVPN Peer: 10.0.0.1

regards

Hubert

2 Replies 2

Marcin Latosiewicz
Cisco Employee
Cisco Employee

Hubert,

Check what was actually added you your SA DB.

"show crypto ipsec sa | i caps|ident" will give you a nice overview.

M.