Preview Tool

Cisco Bug: CSCsz17027 - L2TP: DACL w/ Wildcard Mask not applied to L2TP over IPSec Clients

Last Modified

Nov 08, 2016

Products (1)

  • Cisco ASA 5500-X Series Firewalls

Known Affected Releases

8.0(3) 8.0(4)

Description (partial)


When using downloadable ACLs from RADIUS server and DACL on RADIUS Server is misconfigured using a
wildcard mask, the DACL is not applied to L2TP over IPSec clients.  These users establish an L2TP over
IPSec connection and these users can access all resources.

ACS Cisco IOS/PIX 6.x RADIUS Attributes
[009\001] cisco-av-pair
ip:inacl#1=deny ip any
ip:inacl#2=permit ip any any

Expected Behavior:
L2TP over IPSec users would not be able to establish a connection to the ASA & ASA would report this
misconfiguration in the logs.  This is the behavior seen when testing the same scenario/configuration
with the Cisco Remote Access VPN Client.


- RADIUS DACL configured with wildcard mask
- AAA-Server group not configured with <CmdBold>acl-netmask-convert autodetect<noCmdBold>
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.