Tom@I-McNamara wrote:
> 
> Thanks for that.  I had read that previously and it helped
> somewhat.
> However, my problem comes from interaction of the various
> technologies.
That article helped me a lot to understand interactions of various
technologies and transformations of packets. I've used table from that
article to play some "what if" scenarios with a pencil and a piece of paper
;-)

> For instance, I want to use some static packet filtering to
> keep IP spoofing
> out, denying private IPs from coming in from the outside
> interface, but when
> I do it breaks my IPSec tunnel as it has 10 network inside and
> triggers the
> deny 10.0.0.0 rule I have.  Now I opened the specific 10
> network that I am
> using inside to solve that problem, but that opens up a hole.
No, this doesn't open up a hole. IOS checks all incoming packet against
crypto map. If IOS receives unencrypted packet that should be encrypted
(according to access-list associated with crypto map), IOS will definitely
drop it.
 
> If I have a NAT'ed network, does the ACL get applied to the
> inside address or the Outside address?
Which ACL are you talking about? Lets see what happens with packet from your
network destined to the Internet. According to the artice, input access list
on an input interface is applied to packet before NAT, so at this point
packet has inside local address. Output access-list on an output interface
is applied to packet after NAT, consequently at this point packet has inside
global address. Therefore you should use inside global addresses in your
output access list on an external interface.
Packet destined to IPSec peer shouldn't be NAT'ed.
 
> I guess there are a few other things, obviously I am going to
> play with it
> some more and learn, I am just in search of some good
> information about the
> subject so that I can get a good basis of knowledge.

I advise you to check some example configurations on cisco's site. There are
tons of useful examples with explanations, configs, debug outputs etc...
http://www.cisco.com/pcgi-bin/Support/browse/psp_view.pl?p=Internetworking:IPSec&s=Implementation_and_Configuration#Samples_and_Tips

Best regards,

Victor


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=62801&t=62727
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to