Compare cert salaries and plan your next career move
redwarrior wrote: » I'm not sure why you would want to specify specific ports in a cryptomap ACL. Why not just specify the interesting traffic (networks, etc.) and then use a separate ACL to restrict what is allowed to cross the tunnel? Are you trying to set up a split-tunnel VPN and send some types of traffic out to the internet while others go through the VPN? If that's the case, I would think that any traffic heading from a remote site back to a protected network should be tunneled regardless of protocol?
mikearama wrote: » +1 to red Actually, when I first read your post, ct, I thought "why not put ports in the acl". That way you could define the interesting traffic via the ranges defined, AND at the same time narrow down what protocols/applications can be used between the ranges. But I checked our 5550 and 5540 acl's, and sure enough none have ports included... only ranges. Did a little digging and found this cisco doc:Most Common L2L and Remote Access IPSec VPN Troubleshooting Solutions - Cisco Systems Scroll down to the Verify that ACLs are Correct section, and note the NOTE: Incorrect Example given... and how they highlighted the "eq 25". Go figure... they consider adding the port to be incorrect. Interesting.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.