[c-nsp] ASA VPN <-> DMZ

Vinny Abello vinny at abellohome.net
Fri Jun 8 09:52:44 EDT 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Alternately, you can also change the default behavior of the ASA by issuing:

no sysopt connection permit-vpn

This will cause all traffic from VPN tunnels to be subject to the access-lists on the ingress interface. Note that Cisco recommends using the vpn-filter method. But again, it's bidirectional, so it's kind of a one off thing in the behavior of access-lists in the ASA. Making tunnels subject to the interface access-list seems to be more consistent in my mind, but again it's not the Cisco recommended configuration.

- -Vinny

On 6/7/2012 6:14 PM, Josh Farrelly wrote:
> You should be able to use the VPN filter.
> 
> http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/v
> pn_groups.html#wpxref83949
> 
> "A vpn-filter command is applied to post-decrypted traffic after it
> exits a tunnel and pre-encrypted traffic before it enters a tunnel. An
> ACL that is used for a vpn-filter should NOT also be used for an
> interface access-group. When a vpn-filter command is applied to a group
> policy that governs Remote Access VPN client connections, the ACL should
> be configured with the client assigned IP addresses in the src_ip
> position of the ACL and the local network in the dest_ip position of the
> ACL."
> 
> In essence, you need to configure the ACL inverse from what you think
> (e.g. switch the src & dst entries). Also keep in mind it governs
> traffic in both directions.
> 
> Regards,
> 
> Josh Farrelly
> 
> 
> -----Original Message-----
> From: cisco-nsp-bounces at puck.nether.net
> [mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Jay Nakamura
> Sent: Friday, 8 June 2012 1:29 a.m.
> To: cisco-nsp
> Subject: [c-nsp] ASA VPN <-> DMZ
> 
> So, the set up is, ASA has inside and DMZ interface.  DMZ being the
> lower security level than the inside interface for obvious reasons.
> From the ASA, L2L IPSec tunnel to another location, where crypto map ACL
> covers the subnet for inside and DMZ interface IP subnets.
> 
> As far as I know, this automatically lets remote VPN site to communicate
> with Inside and DMZ hosts and Inside/DMZ hosts can communicate with
> remote VPN site without any firewalling.
> 
> Is there any way to let remote VPN site to initiate traffic to DMZ but
> not let DMZ initiate traffic to the remote VPN?  I know I can apply a
> "VPN filter" to the L2L tunnel but that's not stateful inspection.
> 
> Thanks!
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)

iEYEARECAAYFAk/SA6wACgkQUyX7ywEAl3o8QgCfXCpRz2Ff1ELZOOFMh62jMWGa
e9gAn2yChSzus3DgHscW2EpqKz6W9y10
=d888
-----END PGP SIGNATURE-----


More information about the cisco-nsp mailing list