<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing ASA outside Interface by restricting tcp connections to outside IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4166611#M1074741</link>
    <description>&lt;P&gt;Update: Cisco ASA does not offer CPP (Control plane policing) therefore DDOS protection cannot be configured using the MPF method shown in the OP. That method is used to protect traffic traversing through the ASA and not to the ASA.&lt;/P&gt;&lt;P&gt;Thanks to &lt;SPAN class="lia-user-login"&gt;Mohammed al Baqari&lt;/SPAN&gt; for the insight.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Oct 2020 12:10:42 GMT</pubDate>
    <dc:creator>Jay47110</dc:creator>
    <dc:date>2020-10-14T12:10:42Z</dc:date>
    <item>
      <title>Securing ASA outside Interface by restricting tcp connections to outside IP</title>
      <link>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165042#M1074630</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an ASA 5516-X used to provide remote access VPN solution to clients. Since the outside interface is webvpn enabled I&amp;nbsp; am trying to avoid DDOS attacks to the outside IP by restriction the number of tcp connection attempts to-the-box. I have used mpf to implement the following:&lt;/P&gt;&lt;P&gt;access-list limit-conn-outside extended permit ip any host (ASA outside interface IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map CMAP&lt;/P&gt;&lt;P&gt;match limit-conn-outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map PMAP&lt;/P&gt;&lt;P&gt;class CMAP&lt;/P&gt;&lt;P&gt;set connection conn-max 600 embryonic-conn-max 900 per-client-max 20 per-client-embryonic-max 30&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;service policy PMAP interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, In the "show service-policy interface outside" I am unable to see the current conn stats. Although the ASA currently has several webvpn connections to its outside IP address on port 443, the show command does not display the current number of conns at all. Which makes me this that the service policy is not working somehow.&lt;/P&gt;&lt;P&gt;Interface outside:&lt;BR /&gt;Service-policy: PMAP&lt;BR /&gt;Class-map: CMAP&lt;BR /&gt;Set connection policy: conn-max 600 embryonic-conn-max 900 per-client-max 20 per-client-embryonic-max 30&lt;BR /&gt;&lt;STRONG&gt;current embryonic conns 0, current conns 0, drop 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there something I am missing from the config?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 13:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165042#M1074630</guid>
      <dc:creator>Jay47110</dc:creator>
      <dc:date>2020-10-12T13:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Securing ASA outside Interface by restricting tcp connections to outside IP</title>
      <link>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165050#M1074633</link>
      <description>&lt;P&gt;As this match happens after NAT has taken place you need to specify the internal IPs or subnet in the ACL.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 10:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165050#M1074633</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-12T10:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Securing ASA outside Interface by restricting tcp connections to outside IP</title>
      <link>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165073#M1074636</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to restrict inbound connections from external IPs to the ASA's outside Interface IP. As ASA is designated for Remote access VPNs no NAT is configured on it.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 10:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165073#M1074636</guid>
      <dc:creator>Jay47110</dc:creator>
      <dc:date>2020-10-12T10:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Securing ASA outside Interface by restricting tcp connections to outside IP</title>
      <link>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165075#M1074637</link>
      <description>&lt;P&gt;So you are trying to limit the number of remote access VPN users that connect to the ASA?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 10:55:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165075#M1074637</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-12T10:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: Securing ASA outside Interface by restricting tcp connections to outside IP</title>
      <link>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165113#M1074640</link>
      <description>&lt;P&gt;Not really the number of users as that is dictates by the licence but the number of active connections to-the-box. As from what I've researched a successful remote access VPN connection will create only create 2 connections i.e. 1x TCP(TLS) and 1x UDP(DTLS) to the ASA's outside interface IP. And since my ASA is not used for anything else apart from remote access VPN, I want to only allow a restricted number of inbound to-the-box connections in an attempt to avoid DDOS attacks. For example, someone trying to DDOS by brute forcing authentication on the webvpn login page using random username and passwords.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 13:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4165113#M1074640</guid>
      <dc:creator>Jay47110</dc:creator>
      <dc:date>2020-10-12T13:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: Securing ASA outside Interface by restricting tcp connections to outside IP</title>
      <link>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4166611#M1074741</link>
      <description>&lt;P&gt;Update: Cisco ASA does not offer CPP (Control plane policing) therefore DDOS protection cannot be configured using the MPF method shown in the OP. That method is used to protect traffic traversing through the ASA and not to the ASA.&lt;/P&gt;&lt;P&gt;Thanks to &lt;SPAN class="lia-user-login"&gt;Mohammed al Baqari&lt;/SPAN&gt; for the insight.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 12:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-asa-outside-interface-by-restricting-tcp-connections-to/m-p/4166611#M1074741</guid>
      <dc:creator>Jay47110</dc:creator>
      <dc:date>2020-10-14T12:10:42Z</dc:date>
    </item>
  </channel>
</rss>

