10-02-2017 10:20 AM - edited 03-12-2019 04:35 AM
Hello All,
I have a site to site VPN setup and no explicit ACL to allow OUTSIDE to INSIDE traffic. As per my understanding the traffic should not flow from site 1 to site 2. However, this is not the case.
The traffic from site 1 is reaching site 2.
Can anyone explain why this happened?
Regards,
Mohamed Salman
Solved! Go to Solution.
10-04-2017 06:16 AM
Hello @MOHAMMED SALMAN,
The reason is the sysopt feature I explained before, this is the one that performs the bypass for the traffic since it is being recevied from VPN either IPSec or SSL.
In order to perform the test, you need to change the command on the configuration but also you need to clear any connection and xlate present on the device, if you don´t do it... the ASA will take the traffic as allowed since you already have traffic passing through. Do this step and change the command, you should see the difference.
HTH
Gio
10-02-2017 10:44 AM
Hi,
Does your interface has different security level?
10-02-2017 11:29 AM
absolutely
ciscoasa(config-ikev1-policy)# sho nameif
Interface Name Security
GigabitEthernet0/0 OUTSIDE 0
GigabitEthernet0/1 INSIDE 100
GigabitEthernet0/2 DMZ 50
ciscoasa(config-ikev1-policy)# sho int ip br
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0 192.168.12.110 YES CONFIG up up
GigabitEthernet0/1 192.168.10.110 YES CONFIG up up
GigabitEthernet0/2 192.168.11.110 YES CONFIG up up
GigabitEthernet0/3 unassigned YES unset administratively down up
GigabitEthernet0/4 unassigned YES unset administratively down up
GigabitEthernet0/5 unassigned YES unset administratively down up
GigabitEthernet0/6 unassigned YES unset administratively down up
Management0/0 unassigned YES unset administratively down up
10-02-2017 11:59 AM
10-02-2017 01:16 PM
ciscoasa(config)# sho run all sysopt
no sysopt traffic detailed-statistics
no sysopt connection timewait
sysopt connection tcpmss 1380
sysopt connection tcpmss minimum 0
sysopt connection permit-vpn
sysopt connection reclassify-vpn
no sysopt connection preserve-vpn-flows
no sysopt radius ignore-secret
no sysopt noproxyarp OUTSIDE
no sysopt noproxyarp INSIDE
no sysopt noproxyarp DMZ
I tried "no sysopt connection permit-vpn" but the behaviour did not change
10-03-2017 01:29 PM
10-03-2017 09:06 PM
10-04-2017 12:03 AM
I believe I am not clear enough with my query.
The IPSEC tunnel is up and running. I am able to ping from LAN 1 to LAN 2.
My question is when the traffic reaches from LAN 1 to LAN 2, which is OUTSIDE to INSIDE then why is the traffic allowed without an explicit ACL.
10-04-2017 06:16 AM
Hello @MOHAMMED SALMAN,
The reason is the sysopt feature I explained before, this is the one that performs the bypass for the traffic since it is being recevied from VPN either IPSec or SSL.
In order to perform the test, you need to change the command on the configuration but also you need to clear any connection and xlate present on the device, if you don´t do it... the ASA will take the traffic as allowed since you already have traffic passing through. Do this step and change the command, you should see the difference.
HTH
Gio
10-04-2017 01:58 PM
Ah! I did not clear the SA last time I tried :) Thanks!!!!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide