<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: block ip addresses that try to brute force into VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4827715#M1100132</link>
    <description>&lt;P&gt;Sorry for my info.&lt;/P&gt;
&lt;P&gt;What you permit and what you deny in control-plane acl??&lt;/P&gt;</description>
    <pubDate>Wed, 03 May 2023 14:01:38 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-05-03T14:01:38Z</dc:date>
    <item>
      <title>block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4823779#M1099979</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Starting from the last three weeks these IP Addresses are attempting to VPN into our network. In the ISE LiveLogs we can see that there are multiple attempts from these ip addresses. These IP addresses were added to the prefilter block rule on the FTD firewall. But still the authentication traffic is reaching the ISE server. shouldn't it be blocked the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any ideas why this address is still able to attempt auth, even though it should be getting denied before it even gets that far?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-04-27 152407.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/183190i4AF0714BF7CD1B97/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-04-27 152407.png" alt="Screenshot 2023-04-27 152407.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 06:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4823779#M1099979</guid>
      <dc:creator>mikeyasg</dc:creator>
      <dc:date>2023-04-28T06:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4823789#M1099980</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1329002"&gt;@mikeyasg&lt;/a&gt; if the pre-filter rule you are referring to is configured on the FTD acting as the Remote Access VPN concentrator, then that will not work. The pre-filter and Access Control rules control traffic "through" the firewall and not "to" the firewall itself, so it cannot block those connections.&lt;/P&gt;
&lt;P&gt;Rarely used, but you could use a control-plane ACL to deny the specific IP addresses and permit the rest of the remote access vpn connections. Example: &lt;A href="https://integratingit.wordpress.com/2021/06/26/ftd-control-plane-acl/" target="_blank"&gt;https://integratingit.wordpress.com/2021/06/26/ftd-control-plane-acl/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Or deny the traffic on the upstream ISP router.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 07:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4823789#M1099980</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-28T07:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4823790#M1099981</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;gt;...&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;These IP addresses were added to the&lt;FONT color="#FF6600"&gt; prefilter&lt;/FONT&gt; block rule on the FTD firewall.&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp; - Depends on what you mean by that&amp;nbsp; , guess that should not be 'prefilter block' , but&lt;FONT color="#008000"&gt; just &lt;U&gt;bloc&lt;/U&gt;k&lt;/FONT&gt; or deny/drop (e.g.)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 07:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4823790#M1099981</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-04-28T07:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824072#M1099984</link>
      <description>&lt;P&gt;this VPN is RAVPN or L2L VPN ?&lt;BR /&gt;if it L2L VPN then the solution is Control-plane&amp;nbsp;&lt;BR /&gt;if it RAVPN then I think Duo can solve the issue &amp;lt;&amp;lt;- this I need to dive deep to check best solution for you but idea is the ASA make first auth and then send to ISE for second auth, here only the user that pass first Auth will send to ISE for more Auth, the ASA will drop other attempt&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 10:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824072#M1099984</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-28T10:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824326#M1100007</link>
      <description>&lt;P&gt;Agree with &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; . Filter on an upstream router or terminate RA VPN on a firewall in the DMZ. then the Internet-facing firewall rules would apply to the incoming traffic.&lt;/P&gt;
&lt;P&gt;Regarding Duo, generally the Duo configuration (whether SSO, Duo Auth Proxy or Duo Access Gateway) will be still trying to perform the first authentication against your primary authentication source - e.g., AD via ISE. So the attempts will still be logged by ISE (or AD if you bypass ISE for AuthC and only use it for AuthZ).&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 16:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824326#M1100007</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-04-28T16:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824330#M1100008</link>
      <description>&lt;H2&gt;Can I use Duo to protect ASA local account logins?&lt;/H2&gt;
&lt;P&gt;Absolutely! To protect users local to the ASA, with the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="local" href="https://duo.com/docs/ciscoasa-ldap" target="_blank"&gt;Duo LDAPS configuration for SSL VPN&lt;/A&gt;, continue to use the "LOCAL" AAA Server Group for authentication and add the Duo LDAP AAA server group for secondary authentication.&lt;/P&gt;
&lt;P&gt;To protect local ASA users connecting with the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="local" href="https://duo.com/docs/ciscoasa-radius" target="_blank"&gt;Duo RADIUS configuration for SSL VPN&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;clients, use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="local" href="https://duo.com/docs/authproxy-reference#duo_only_client" target="_blank"&gt;duo_only_client&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="local" href="https://duo.com/docs/authproxy-reference#radius_server_duo_only" target="_blank"&gt;radius_server_duo_only&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;configurations in your Authentication Proxy setup, and again continue to use the "LOCAL" AAA Server Group for authentication and add the Duo RADIUS AAA server group for secondary authentication.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://duo.com/docs/cisco-faq" target="_blank"&gt;https://duo.com/docs/cisco-faq&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 16:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824330#M1100008</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-28T16:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824510#M1100012</link>
      <description>&lt;P&gt;The vpn is RAVPN and we are thinking to use control plane ACL as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;suggested. if it is applicable for RAVPN or blocking these ip on the upstream router. But blocking the traffic on upstream router would be adding the addresses everytime we face these issue.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2023 07:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824510#M1100012</guid>
      <dc:creator>mikeyasg</dc:creator>
      <dc:date>2023-04-29T07:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824512#M1100013</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1329002"&gt;@mikeyasg&lt;/a&gt; yes control-plane ACL works on RAVPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2023 07:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824512#M1100013</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-29T07:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824530#M1100016</link>
      <description>&lt;P&gt;Please can you confirm that&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One IP is outside interface IP of FW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other is IP from ravpn pool ??&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2023 09:31:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4824530#M1100016</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-29T09:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4826690#M1100080</link>
      <description>&lt;P&gt;The outside interface is the vpn concentrator and the endpoint that is making the remote connection will get ip from the ravpn pool. But the screenshot that i shared is neither the outside interface nor the ip from the pool rather it is the ip address that belongs to the endpoint initiating the vpn connection.&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2023 13:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4826690#M1100080</guid>
      <dc:creator>mikeyasg</dc:creator>
      <dc:date>2023-05-02T13:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4826731#M1100082</link>
      <description>&lt;P&gt;then if you sure that these IP is not OUT and VPN Pool&amp;nbsp;&lt;BR /&gt;as other mention you can use ACL&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Client-internet-ASA-INside-ISE&amp;nbsp;&lt;BR /&gt;apply ACL to INside allow only Mgmt IP to send to ISE plus first IP of VPN Pool (for more sure allow all VPN Pool)&amp;nbsp;&lt;BR /&gt;that it.&amp;nbsp;&lt;BR /&gt;you will ask then how RAVPN connect to ISE , the RAVPN not direct connect to ISE for auth, the FW do this, FW work as proxy to auth RAVPN.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2023 14:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4826731#M1100082</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-02T14:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4827706#M1100131</link>
      <description>&lt;P&gt;Thank You all and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;We were able to use the control plane ACL and it was successful Thank You for your support.&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2023 13:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4827706#M1100131</guid>
      <dc:creator>mikeyasg</dc:creator>
      <dc:date>2023-05-03T13:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4827715#M1100132</link>
      <description>&lt;P&gt;Sorry for my info.&lt;/P&gt;
&lt;P&gt;What you permit and what you deny in control-plane acl??&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2023 14:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/4827715#M1100132</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-03T14:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: block ip addresses that try to brute force into VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/5072091#M1111375</link>
      <description>&lt;P&gt;Having a router upstream from the FTD, wouldn't it be possible to create a correlation policy and use the Cisco IOS Null Route Module to automate blocking the offending IP's at the upstream router?&lt;/P&gt;&lt;P&gt;I began looking into this option this morning but am not clear as to how to create and associate the remediation step with the correlation policy.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 15:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-ip-addresses-that-try-to-brute-force-into-vpn/m-p/5072091#M1111375</guid>
      <dc:creator>willb1</dc:creator>
      <dc:date>2024-04-17T15:05:52Z</dc:date>
    </item>
  </channel>
</rss>

