04-18-2014 08:53 AM
I'm having an issue with DCs replicating and wanted to rule out the ASAs each are using for the VPN tunnels.
Once the VPN established does traffic still need an any any ip ACL to allow any and all inside traffic between these two subnets?
This is between a 5510 and 5505.
Solved! Go to Solution.
04-18-2014 10:27 AM
No, the any any is not required. The traffic that is configured for VPN is only interesting traffic designated to be encrypted. All other traffic is not encrypted and therefore does not pass through this tunnel.
If you feel the ASA is causing an issue and you control the devices on either side, you can capture the traffic and export to .pcap to wireshark for analysis.
Good luck
04-18-2014 10:27 AM
No, the any any is not required. The traffic that is configured for VPN is only interesting traffic designated to be encrypted. All other traffic is not encrypted and therefore does not pass through this tunnel.
If you feel the ASA is causing an issue and you control the devices on either side, you can capture the traffic and export to .pcap to wireshark for analysis.
Good luck
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide