1-22
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring IPsec and ISAKMP
Configuring IPsec
ACEs containing deny statements filter out outbound traffic that does not require IPsec protection
(for example, routing protocol traffic). Therefore, insert initial deny statements to filter outbound traffic
that should not be evaluated against permit statements in a crypto access list.
For an inbound, encrypted packet, the security appliance uses the source address and ESP SPI to
determine the decryption parameters. After the security appliance decrypts the packet, it compares the
inner header of the decrypted packet to the permit ACEs in the ACL associated with the packet SA. If the
inner header fails to match the proxy, the security appliance drops the packet. It the inner header matches
the proxy, the security appliance routes the packet.
When comparing the inner header of an inbound packet that was not encrypted, the security appliance
ignores all deny rules because they would prevent the establishment of a Phase 2 SA.
Note To route inbound, unencrypted traffic as clear text, insert deny ACEs before permit ACEs.
Figure 1-1 shows an example LAN-to-LAN network of ASAs.
Table 1-3 Special Meanings of Permit and Deny in Crypto Access Lists Applied to Outbound Traffic
Result of Crypto Map
Evaluation Response
Match criterion in an ACE
containing a permit statement
Halt further evaluation of the packet against the remaining ACEs in the
crypto map set, and evaluate the packet security settings against those in
the IKEv1 transform sets or IKEv2 proposals assigned to the crypto
map. After matching the security settings to those in a transform set or
proposal, the ASA applies the associated IPsec settings. Typically for
outbound traffic, this means that it decrypts, authenticates, and routes
the packet.
Match criterion in an ACE
containing a deny statement
Interrupt further evaluation of the packet against the remaining ACEs in
the crypto map under evaluation, and resume evaluation against the
ACEs in the next crypto map, as determined by the next seq-num
assigned to it.
Fail to match all tested permit
ACEs in the crypto map set
Route the packet without encrypting it.