I've just created a VPN between 2 PIX boxes. We've defined interesting traffic using an ACL, however we want to control what ports go through (ie SMTP, POP3 etc) but can't seem to do it. We have a 506 at a remove site and a 515 at head office. I created an inbound ACL on the inside interface of the 506 to control these. Then I created an inbound ACL on the 515 on the outside interface. However, when we done this everything was going through - even ports that were blocked. We could even see the hit count on the deny any any line going up. Although I've read somewhere here this morning that VPN traffice ignores ACL's ?? But if that's the case why does it increase the hit count?
Anyway, after this we thought that perhaps there was a session open and that was allowing these prohibited connections through. So we shutdown and brought back up again the outside interface on the 515. When we done th is the VPN woudln't come up any more, phase one was successful but phase 2 failed - the logs said it was blocked by ACL. When we removed the inbound ACL on the outside interface of the 515 the VPN came up again. So where is it that we're supposed to put this ACL? What is the norm?
Anyway, after this we thought that perhaps there was a session open and that was allowing these prohibited connections through. So we shutdown and brought back up again the outside interface on the 515. When we done th is the VPN woudln't come up any more, phase one was successful but phase 2 failed - the logs said it was blocked by ACL. When we removed the inbound ACL on the outside interface of the 515 the VPN came up again. So where is it that we're supposed to put this ACL? What is the norm?