<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404663#M1080866</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried with the control-plane and still I have access using a specific IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Konstantinos&lt;/P&gt;</description>
    <pubDate>Tue, 18 May 2021 13:49:24 GMT</pubDate>
    <dc:creator>kostasthedelegate</dc:creator>
    <dc:date>2021-05-18T13:49:24Z</dc:date>
    <item>
      <title>Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404493#M1080849</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a pair of 2120 managed by FMC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to block an IP that tries to connect to my vpn.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have fastpath policy and access policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have put it in Security intelligence and it still passes to my authentication server, where it is blocked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where is the best point to cut it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Konstantinos&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 08:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404493#M1080849</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2021-05-18T08:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404494#M1080850</link>
      <description>&lt;P&gt;Assuming the VPN is hosted on the Firepower 2120s, the prefilter and access control policies you can setup in the GUI all apply to traffic THROUGH the device - not traffic TO the device.&lt;/P&gt;
&lt;P&gt;However, you should be able to create a control plane ACL via Flexconfig to restrict a single IP.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/td-p/3765784" target="_blank"&gt;https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/td-p/3765784&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 08:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404494#M1080850</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-18T08:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404495#M1080851</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/864895"&gt;@kostasthedelegate&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not possible on FTD AFAIK, the ACP and Pre-Filter rules are for traffic "through" the FTD, not "to" the FTD itself (VPN). You alternative is to place an ACL on the upstream router and block the IP address(es) and permit all else.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 08:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404495#M1080851</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-18T08:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404505#M1080853</link>
      <description>&lt;P&gt;Hello Marvin,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the answer&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the ACL on the Flexconfig where should be applied?&lt;/P&gt;&lt;P&gt;Are there any instructions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regads,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Konstantinos&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 08:49:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404505#M1080853</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2021-05-18T08:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404620#M1080857</link>
      <description>&lt;P&gt;Hello everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created the flexconfig object below&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture2.PNG" style="width: 830px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/120634i58C9050A89DCDE22/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture2.PNG" alt="Capture2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see after deployment in the cli that the commands are created&lt;/P&gt;&lt;PRE&gt;access-list VPN-Blacklist extended deny object-group ProxySG_ExtendedACL_154618915929 object-group x-Blacklist any
access-list VPN-Blacklist extended permit object-group ProxySG_ExtendedACL_154618915933 any any
access-group VPN-Blacklist in interface xxxxx
access-group VPN-Blacklist in interface yyyyy&lt;/PRE&gt;&lt;P&gt;But still the IP is not blocked&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 13:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404620#M1080857</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2021-05-18T13:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404643#M1080860</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/864895"&gt;@kostasthedelegate&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've never tried on FTD using Flexconfig (I wasn't sure it worked) but certainly when configuring using ASA, you append the word "control-plane" E.g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-group OUTSIDE_CP in interface OUTSIDE &lt;STRONG&gt;control-plane&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 13:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404643#M1080860</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-18T13:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404648#M1080861</link>
      <description>&lt;P&gt;That's right &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; - we need to specify the "control-plane" parameter in the access-group command.&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 13:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404648#M1080861</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-18T13:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404663#M1080866</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried with the control-plane and still I have access using a specific IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Konstantinos&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 13:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404663#M1080866</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2021-05-18T13:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404670#M1080868</link>
      <description>&lt;P&gt;Did you clear the connections for that IP after applying the ACL? Existing connections won't be affected by an ACL update.&lt;/P&gt;
&lt;P&gt;If you have cleared the connections and are still seeing the address able to access the VPN, it might be time to ask the TAC to look at in in real time for you.&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 13:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404670#M1080868</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-18T13:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4404672#M1080869</link>
      <description>&lt;P&gt;No I did not!!&lt;BR /&gt;I will try it and update.&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 13:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4404672#M1080869</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2021-05-18T13:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Block IP</title>
      <link>https://community.cisco.com/t5/network-security/block-ip/m-p/4405241#M1080889</link>
      <description>&lt;P&gt;I issued&amp;nbsp;&lt;/P&gt;&lt;P&gt;clear conn address x.x.x.x&lt;/P&gt;&lt;P&gt;but it did not change sth.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 May 2021 08:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip/m-p/4405241#M1080889</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2021-05-19T08:32:18Z</dc:date>
    </item>
  </channel>
</rss>

