09-04-2013 08:55 AM
I have a Site-to-Site VPN setup in a lab environment using two ASA5505s. Site-to-Site VPN is functional however, what I wanted to do is deny all traffic from the Remote LAN and permit only one host to access the local LAN. Is this practical or can it be done? If so, what am I missing that the following ACLs do not seem to have any effect?
Remote LAN: 172.16.1.0/24
Local LAN: 192.168.1.0/24
access-list outside_access_in extended permit tcp host 172.16.1.100 host 192.168.1.100 range 5000 10000
access-list outside_access_in extended deny ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0
access-group outside_access_in in interface outside
Appreciate any help anyone can give.
Solved! Go to Solution.
09-04-2013 06:50 PM
Hi tsabsuavyaj,
By default, the command sysopt connection permit-vpn is enabled which will bypass your referenced interface access-list for all VPN traffic.
To resolve this, you can either:
Please let me know if you have additional questions/clarifications.
Kind Regards,
Kevin
**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.
09-04-2013 10:40 AM
I would suggest you to configure vpn-filters to restrict the hosts across lan to lan tunnel.
For more information, you can go through below link:-
Please let me know if it helps.
Regards,
Naresh
09-04-2013 06:44 PM
Thanks for referencing the document. It looks close to what I am after, but I am not sure as cisco's documentation is difficult to follow through.
Sent from Cisco Technical Support Android App
09-04-2013 06:50 PM
Hi tsabsuavyaj,
By default, the command sysopt connection permit-vpn is enabled which will bypass your referenced interface access-list for all VPN traffic.
To resolve this, you can either:
Please let me know if you have additional questions/clarifications.
Kind Regards,
Kevin
**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.
09-04-2013 08:23 PM
Kevin,
I appreciate your explanation, this makes perfect sense. However, this task appears to be more trouble than what it is worth. I will give it a shot and call it the day.
Many thanks,
Tsabsuavyaj
09-04-2013 08:55 PM
Kevin,
Executing the command no sysopt connection permit-vpn disable all VPN traffic completely. However, just by changing the proxy-ACL as you stated on the second bullet above works perfectly.
Example:
object network obj-local
subnet 192.168.1.100 255.255.255.255
object network obj-remote
subnet 172.16.1.100 255.255.255.255
access-list VPN-INTERESTING-TRAFFIC extended permit ip object obj-local object obj-remote
nat (inside,outside) source static obj-local obj-local destination static obj-remote obj-remote object network obj-local
Many thanks,
Tsabsuavyaj
09-04-2013 09:00 PM
Yes that first option can have significant impact because all VPN communications must then be explicitly allowed in the outside interface's ACL in order to traverse the ASA.
I'm glad that the second option worked well for you. Please note that if you haven't changed the distant-end of your L2L vpn to reflect your proxy-ACL change on your side then you may experience reliability issues with your VPN. Specifically, when the VPN goes to rekey the ACLs won't match and the VPN could go down as a result.
We're here if you need additional help.
Kind Regards,
Kevin
**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide