cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1491
Views
5
Helpful
2
Replies

VPN Filter not working as expected...denying traffic....

jordisuste
Level 1
Level 1

Hi,

I have a problem with a vpn-filter. I am using an ASA 5520. In the VPN ACL, the traffic to be encrypted, I have VPN acl:

access-list VPN line 1 extended permit ip 172.16.11.0 255.255.255.0 host 172.16.20.80
access-list VPN line 2 extended permit ip 172.16.11.0 255.255.255.0 host 172.16.20.82 
access-list VPN line 3 extended permit ip 172.16.11.0 255.255.255.0 host 172.16.20.84
access-list VPN line 4 extended permit ip 172.16.11.0 255.255.255.0 host 172.16.20.90
access-list VPN line 5 extended permit ip 172.16.11.0 255.255.255.0 host 172.16.20.78

This works very good. But now I want to restrict traffic and alllow only few tcp ports. I added next commands:

access-list Allow_TCP_Only extended permit tcp 172.16.11.0 255.255.255.0 host 172.16.20.78 eq http
access-list Allow_TCP_Only extended permit tcp 172.16.11.0 255.255.255.0 host 172.16.20.78 eq 3333
access-list Allow_TCP_Only extended permit tcp 172.16.11.0 255.255.255.0 host 172.16.20.78 eq 4444
access-list Allow_TCP_Only extended permit tcp 172.16.11.0 255.255.255.0 host 172.16.20.80 eq http
access-list Allow_TCP_Only extended permit tcp 172.16.11.0 255.255.255.0 host 172.16.20.80 eq 3333
access-list Allow_TCP_Only extended permit tcp 172.16.11.0 255.255.255.0 host 172.16.20.80 eq 4444

group-policy Filter_TCP internal
group-policy Filter_TCP attributes
vpn-filter value Allow_TCP_Only

tunnel-group 1.1.1.1 general-attributes
default-group-policy Filter_TCP

And now, the connection doesn't work.Tunnel is created but traffic is blocked?

Any help appreciated.

Thanks!

2 Replies 2

praprama
Cisco Employee
Cisco Employee

Hi,

You are seeing the problem because the VPN Filter ACL is configured in a reverse manner. Please refer to the document below:

http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/vpngrp.html#wp1134794

"When a vpn-filter command is  applied to a group-policy that governs a LAN to LAN VPN connection, the  ACL should be configured with the remote network in the src_ip position of the ACL and the local network in the dest_ip position of the ACL"

As it says, the remote end subnet should be mentioned in the source IP section of the ACL. So the ACL should be modified to look like below:

access-list Allow_TCP_Only extended permit tcp host 172.16.20.78 eq http 172.16.11.0 255.255.255.0

Let me know if this helps!!

Thanks and Regards,

Prapanch

Thanks. You are right. When I read the documentation I assumed things I shouldn't! I will try and let you know.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: