03-18-2003 08:05 AM - edited 02-21-2020 12:25 PM
After searching Cisco's website, reading posts on this board and other boards, and reading a limited number of good books on the Cisco PIX firewall, I still have a question that I cannot definitively answer for myself.
Scenario: PIX 525 site-to-site VPN with Checkpoint NG 650 firewall as the remote VPN peer.
Goal: Limit inbound, de-crypted traffic from the network behind the remote VPN peer to access only specific hosts and ports on the network behind the PIX 525 firewall.
Question: What is the best way (or options) to accomplish the above goal?
1. Is it better to use the "sysopt connection permit-ipsec" command to allow IPSec VPN traffic to "by-pass" inbound ACLs on the outside interface as well as the ACLs that "define" which traffic is to be tunneled between the PIX firewall and Checkpoint NG 650 firewall?
OR
2. Is it better to configure the PIX without the sysopt connection permit-ipsec command and instead utilize an inbound ACL to filter both IPSec VPN traffic (based on source, destination and ports) and the decrypted traffic (based on source, destination and ports) ? Is my understanding correct, with this option, that once VPN traffic is processed and authenticated that the decrypted traffic must meet the filter conditions defined in the inbound access-list applied to the outside interface on the PIX firewall?
I'm aware that Cisco recommends using the "sysopt connection permit-ipsec" command because not doing so can lead to high processor utilization.
For the project at hand, the importance of limiting the decrypted traffic to only certain hosts and ports outweighs porcessor utilization.
Thanks in advance for any and all posts regarding this matter!
03-19-2003 02:24 PM
Hi,
Ans1: your understanding is right.
Ans2:your understanding abt the ACL processing seems right.
I'd like to add some more to it:
1 - configure port based ipsec cyrpto ACLs b/w the two devices, to make sure that you encrypt/decrypt only what you want, but in case of CheckPoint, it may have some problems.
2- you can filter traffic inbound/outbound on the inside pix interface as well to limit it to certain ports/IPs.
my 2 cents.
Thanks - Afaq
03-20-2003 05:38 AM
Thanks Afaq.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide