<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block specific IP's from attempting to establish an SSLVPN connect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851972#M1101451</link>
    <description>&lt;P&gt;Ok, I *thought* that might be it.&amp;nbsp; Right now, I have no rules in there.&amp;nbsp; If I were to create 1 rule to block traffic, would I also have to create a 2nd "any/any" rule to allow all the other traffic?&amp;nbsp; I'm assuming there is the usual "deny any" that would take effect if I put a rule in here?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Jun 2023 14:21:57 GMT</pubDate>
    <dc:creator>irbk</dc:creator>
    <dc:date>2023-06-09T14:21:57Z</dc:date>
    <item>
      <title>Block specific IP's from attempting to establish an SSLVPN connection</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851912#M1101435</link>
      <description>&lt;P&gt;Logged into my ASA this AM and I'm seeing a ton of "authentication rejected" warnings coming across from 3 different IP's.&amp;nbsp; Seems like someone trying to brute force SSLVPN.&amp;nbsp; I want to block these IP's from even being able to connect to my ASA (which is a 5525 if it makes any difference).&amp;nbsp; It doesn't seem like there is a straightforward way to block them because the VPN terminates on the ASA itself.&amp;nbsp; What's the best way to block this attack while still allowing legitimate SSLVPN connections?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851912#M1101435</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T13:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851914#M1101436</link>
      <description>&lt;P&gt;If these user use same public ip' then use acl control plane apply to outside with IN direction&lt;/P&gt;
&lt;P&gt;This will prevent these user to try sslvpn to asa.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851914#M1101436</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-09T13:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851915#M1101437</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1476229"&gt;@irbk&lt;/a&gt; from the ASA itself you can use a &lt;STRONG&gt;control-plane&lt;/STRONG&gt; ACL to restrict those IP addresses and permit other VPN connections..&lt;/P&gt;
&lt;P&gt;Or block those IP addresses on an ACL on the upstream ISP router.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851915#M1101437</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-09T13:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851918#M1101438</link>
      <description>&lt;P&gt;I'm a bit hesitant to do that as I don't want to accidently block all incoming traffic.&amp;nbsp; My ASA is in a remote datacenter so if I flub up a command, I can't lay hands on it to fix it.&amp;nbsp; 2 questions, is it possible to do in the ASDM?&amp;nbsp; What might the rule look like if I had an object group called "BlackListedIPs"?&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851918#M1101438</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T13:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851924#M1101439</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1476229"&gt;@irbk&lt;/a&gt; connections "through" the ASA do not apply as they are controlled via a normal interface ACL and SSH/ASDM connections "to" the box are controlled separately to an ACL applied to an interface.&lt;/P&gt;
&lt;P&gt;Here is an example from the CLI.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="062621_1101_ftdcontrolp4.png" style="width: 532px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/186936i66A86971BB5AD2AD/image-dimensions/532x123?v=v2" width="532" height="123" role="button" title="062621_1101_ftdcontrolp4.png" alt="062621_1101_ftdcontrolp4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Notice the access-group has &lt;STRONG&gt;control-plane &lt;/STRONG&gt;appended to the end to signify it's used by the control plane.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851924#M1101439</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-09T13:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851926#M1101440</link>
      <description>&lt;P&gt;How about something like&lt;/P&gt;&lt;P&gt;shun 179.60.149.83&lt;/P&gt;&lt;P&gt;That will block the IP for some period of time with out the chance of breaking anything else?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851926#M1101440</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T13:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851927#M1101441</link>
      <description>&lt;P&gt;To be more tune your access list use deny (ip of host) any tcp port 443 in acl and permit any any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then apply it to outside directions IN with keyword control plane&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851927#M1101441</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-09T13:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851938#M1101443</link>
      <description>&lt;P&gt;I was able to block the connections (there were only 4 IP's banging the ASA then another 2 once I blocked the original 4) using SHUN which is all I needed to do.&amp;nbsp; I'm sorry but the control-plane access list just scares me.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851938#M1101443</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T13:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851940#M1101444</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1476229"&gt;@irbk&lt;/a&gt; no worries, shun will work. Note that the shun configuration is not displayed in the ASA configuration.&lt;/P&gt;
&lt;P&gt;FYI, you'd not lock yourself out via SSH/ASDM as these are control independantly from an normal interface ACL and the control plane ACL.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851940#M1101444</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-09T13:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851947#M1101445</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;yeah, thanks.&amp;nbsp; I'm aware that SHUN isn't displayed in the ASDM and also it doesn't survive a router reboot I believe?&amp;nbsp; I'm not super sure if "shun 179.60.149.83" will only block it for 15 min or until I either remove it or reboot the ASA.&amp;nbsp; I think if you use the "threat detection" within the ASA itself, by default, it only SHUNs for like 15 min.&amp;nbsp; I'm not sure if I put in a manual command if that will stay persistent.&amp;nbsp; It's been 20ish minutes now and I'm not seeing the connection attempts come back, so either the SHUN lasts longer than 15 min or the bot/script kiddie moved onto a different IP&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851947#M1101445</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T13:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851955#M1101446</link>
      <description>&lt;P&gt;Out of curiosity, is there a place within the ASDM to do the control-plane blocking or is that CLI only?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851955#M1101446</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T13:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851959#M1101447</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I'm not super sure if "shun 179.60.149.83" will only block it for 15 min or until I either remove it or reboot the ASA&lt;BR /&gt;&lt;/SPAN&gt;you need manual no shun to remove it, there no timeout for this command&lt;BR /&gt;&lt;A href="https://www.networkstraining.com/block-attacks-with-a-cisco-asa-firewall-and-ids-using-the-shun-command/" target="_blank"&gt;https://www.networkstraining.com/block-attacks-with-a-cisco-asa-firewall-and-ids-using-the-shun-command/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 13:59:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851959#M1101447</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-09T13:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851963#M1101448</link>
      <description>&lt;P&gt;Oh sweet!&amp;nbsp; Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 14:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851963#M1101448</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T14:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851967#M1101449</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1476229"&gt;@irbk&lt;/a&gt; yes you can configure control plane ACLs in ASDM.&lt;/P&gt;
&lt;SECTION class="body taskbody"&gt;&lt;HR noshade="noshade" /&gt;
&lt;DIV class="tableContainer"&gt;
&lt;TABLE class="stepTable" border="0"&gt;
&lt;TBODY&gt;
&lt;TR id="ID-2124-000001f6__step_827CE565C3CD4C8C87C816C0DE5771C6" class="li step"&gt;
&lt;TD width="10%" align="left" valign="top"&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;1&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD align="left" valign="top"&gt;
&lt;P class="ph cmd"&gt;Choose &lt;STRONG&gt;&lt;SPAN class="ph uicontrol"&gt;Configuration&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Device Management&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Management Access&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Management Access Rules&lt;/SPAN&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;SECTION class="itemgroup info"&gt;
&lt;P class="p"&gt;The rules are organized by interface. Each group is equivalent to the extended ACL that is created and assigned to the interface as a &lt;STRONG&gt;control plane ACL&lt;/STRONG&gt;. These ACLs also appear on the Access Rules and ACL Manager pages.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/asdm719/firewall/asdm-719-firewall-config/access-rules.html?bookSearch=true" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/asdm719/firewall/asdm-719-firewall-config/access-rules.html?bookSearch=true&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 14:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851967#M1101449</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-09T14:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851970#M1101450</link>
      <description>&lt;P&gt;Sorry &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;already answer you.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 14:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851970#M1101450</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-09T14:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851972#M1101451</link>
      <description>&lt;P&gt;Ok, I *thought* that might be it.&amp;nbsp; Right now, I have no rules in there.&amp;nbsp; If I were to create 1 rule to block traffic, would I also have to create a 2nd "any/any" rule to allow all the other traffic?&amp;nbsp; I'm assuming there is the usual "deny any" that would take effect if I put a rule in here?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 14:21:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851972#M1101451</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-06-09T14:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851983#M1101454</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1476229"&gt;@irbk&lt;/a&gt; actually for management (control plane) ACLs, which control to-the-box traffic, &lt;STRONG&gt;there is no implicit deny at the end&lt;/STRONG&gt; of a set of management rules for an interface. Instead, any connection that does not match a management access rule is then evaluated by regular access control rules. &lt;/P&gt;
&lt;P&gt;...but you could define create a permit any if you wish.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 14:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4851983#M1101454</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-09T14:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Block specific IP's from attempting to establish an SSLVPN connect</title>
      <link>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4920182#M1104108</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been able to do some Lab work in EVE-NG and while it's not the live environment, I added some control-plane rules and managed to not break everything.&amp;nbsp; It worked as you explained it would.&amp;nbsp; What I wanted to do was create a "black list" that contained all the IP's that hit my ASA with obviously fake creds.&amp;nbsp; The black list would be dropped by a control-plane rule.&amp;nbsp; I'd check out where these black list IPs were and block the entire subnet of that IP.&amp;nbsp; I'd also create a "white list" of all the IP's that should be hitting the ASA, put the white list rule first, and that way I could allow an individual IP in the white list to connect even if it was part of a black listed IP subnet.&amp;nbsp; Info sec disagreed with my approach and wanted to setup a default deny instead.&amp;nbsp; Basically if the IP's weren't on the white list, then they didn't connect.&amp;nbsp; It seemed to work correctly in the Lab so I said I'd go for it.&amp;nbsp;&amp;nbsp;Then I went to production and ran across a snag, what I tried was this&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in_1 extended permit ip object-group ToASAWhitelist any&lt;BR /&gt;access-list outside_access_in_1 extended deny ip any any&amp;nbsp;&lt;BR /&gt;access-group outside_access_in_1 in interface outside control-plane&lt;BR /&gt;&lt;BR /&gt;This seemed to work at first, but then I got reports that access to our internal websites was failing.&amp;nbsp; I disabled the "deny ip any any" and was able to access our site again.&amp;nbsp; I'm not really sure where I went wrong?&amp;nbsp; I ended up going with my OG idea&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in_1 extended permit ip object-group ToASAWhitelist any&lt;BR /&gt;access-list outside_access_in_1 extended deny ip object-group BlackListedIPs any&lt;BR /&gt;access-group outside_access_in_1 in interface outside control-plane&lt;BR /&gt;&lt;BR /&gt;It seems to work but it's not the "default deny" that info sec wanted.&amp;nbsp; I'm not sure where I went wrong?&amp;nbsp; Access to an internal website should be traffic through the ASA and not to the ASA so a control-plane rule shouldn't have affected it, right?&amp;nbsp; Ideas as to where I went wrong?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 12:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-specific-ip-s-from-attempting-to-establish-an-sslvpn/m-p/4920182#M1104108</guid>
      <dc:creator>irbk</dc:creator>
      <dc:date>2023-09-08T12:34:23Z</dc:date>
    </item>
  </channel>
</rss>

