<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: without IPS block malicious VPN traffic hitting to cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4415977#M1081423</link>
    <description>&lt;P&gt;I appreciate your response, Thanks very much!!&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jun 2021 08:51:46 GMT</pubDate>
    <dc:creator>anilkumar.cisco</dc:creator>
    <dc:date>2021-06-10T08:51:46Z</dc:date>
    <item>
      <title>without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414622#M1081369</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have&amp;nbsp;ASA5525, without IPS enabled, it is used mainly for anyconnect VPN.. and we are suspecting hitting of malicious traffic on VPN from outside.&lt;/P&gt;&lt;P&gt;How we can block this on outside interface if i know the malicious traffic source IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea or expert advise. I don't have IPS in my environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Anil Singh&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 12:05:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414622#M1081369</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-06-08T12:05:43Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414624#M1081370</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/166962"&gt;@anilkumar.cisco&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use a control-plane ACL on the ASA, this will permit/deny traffic from known source destined "to" the ASA itself.&lt;/P&gt;
&lt;P&gt;Use a normal ACL permitting/denying traffic and then define the access-group but append "control-plane" at the end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-group CPLANE in interface OUTSIDE &lt;STRONG&gt;control-plane&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 12:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414624#M1081370</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-08T12:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414646#M1081371</link>
      <description>&lt;P&gt;I am little bit bothered about this ACL..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it will not impact to normal traffic or VPN traffic..&amp;nbsp;and stopped&amp;nbsp;the anyconnect hack attempts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for the config that will drop all traffic to all services on the firewalls outside interface – including all VPN / anyconnect traffic – if its in a denied object-group it will get dropped to the outside and AnyConnect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is your opinion on the below two solution&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we also&amp;nbsp;shun the ip’s manually to block them accessing ASA, as per below link&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ref link: &lt;A href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisco.com%2Fc%2Fen%2Fus%2Fsupport%2Fdocs%2Fsecurity%2Fasa-5500-x-series-next-generation-firewalls%2F113685-asa-threat-detection.html%23anc0&amp;amp;data=04%7C01%7Canilkumar.singh%40bt.com%7C62de845c3a854b19068c08d929cd2e2a%7Ca7f356889c004d5eba4129f146377ab0%7C0%7C0%7C637586783495374002%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=S7%2BoM%2F2wKsiwNwJD3EeGrBpS9v6friCodWP%2F1fCZ7uU%3D&amp;amp;reserved=0" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html#anc0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what about botnet traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Anil Singh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 12:50:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414646#M1081371</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-06-08T12:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414667#M1081372</link>
      <description>&lt;P&gt;The control-plane ACL would block/permit traffic "to" the ASA itself, so yes it will control VPN (anyconnect) traffic, was that not your intention?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Normal traffic, which is traffic "through" the ASA, such as outbound internet acess from inside hosts will not be affected by the control-plane ACL. A normal interface or global ACL would control traffic "through" the ASA, inbound or outbound.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 13:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414667#M1081372</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-08T13:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414673#M1081373</link>
      <description>&lt;P&gt;Yes.. that was my intention.. thanks for clarifying that..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just want to understand, how shun the IP manually or botnet traffic could be used here..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regard&lt;/P&gt;&lt;P&gt;Anil Singh&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 13:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414673#M1081373</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-06-08T13:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414683#M1081374</link>
      <description>&lt;P&gt;It's used to stop attacks before they reach the internal network infrastructure....so traffic "through" the ASA, not "to" the ASA which is a VPN. So the control-plane ACL would meet your requirements.&lt;/P&gt;
&lt;P&gt;Another option is put an ACL inbound on the upstream router blocking the malicous IP addresses and permit all other.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 13:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414683#M1081374</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-08T13:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414692#M1081375</link>
      <description>&lt;P&gt;so if by mistake, legitimate IP will be added in CPLANE ACL, then it cannot be able to established VPN tunnet via Annyconnect.. correct..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so this way we can also confirm, that our CPLANE ACL are working perfectly..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 13:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414692#M1081375</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-06-08T13:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414694#M1081376</link>
      <description>&lt;P&gt;Yes.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 13:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4414694#M1081376</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-06-08T13:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: without IPS block malicious VPN traffic hitting to cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4415977#M1081423</link>
      <description>&lt;P&gt;I appreciate your response, Thanks very much!!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 08:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/without-ips-block-malicious-vpn-traffic-hitting-to-cisco-asa/m-p/4415977#M1081423</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-06-10T08:51:46Z</dc:date>
    </item>
  </channel>
</rss>

