candersoncc
IS-IT--Management
I have mostly implemented IPSec tunnels on Cisco PIX firewalls in the past. After setting up a tunnel between a couple of Cisco IOS devices, I did some testing and found that IPSec traffic bypasses the access list on the outside interface.
On the PIX, this is an option, so you can use "no sysopt connection permit-ipsec" to force traffic to be run against the ACL. Is there something similar on IOS, or is there no way to run IPSec traffic through an access list after it is decrypted?
On the PIX, this is an option, so you can use "no sysopt connection permit-ipsec" to force traffic to be run against the ACL. Is there something similar on IOS, or is there no way to run IPSec traffic through an access list after it is decrypted?