<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Whitelist on CPLANE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5238158#M1118304</link>
    <description>&lt;P&gt;The control plane ACL has a blacklist of known bad IP addresses, then a whitelist with every IP I could find/trust. This included the list of our partner orgs servers and it would still stop working after an amount of time.&lt;/P&gt;&lt;P&gt;Looking into the RAVPN protection you listed, I was able to upgrade to 9.18(4). I see that it listed 9.18(4)40. I'm unsure of the difference. If it helps we are running an ASAv&lt;/P&gt;</description>
    <pubDate>Tue, 17 Dec 2024 23:22:11 GMT</pubDate>
    <dc:creator>zgovernale</dc:creator>
    <dc:date>2024-12-17T23:22:11Z</dc:date>
    <item>
      <title>Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237554#M1118272</link>
      <description>&lt;P&gt;Cisco ASA Software Version 9.18(3)55&lt;/P&gt;&lt;P&gt;SSP OS Version 2.12(0.519)&lt;/P&gt;&lt;P&gt;I've been working with a managed service partner to try Whitelisting as a way to combat brute-force attacks. I've added a whitelist of known IP addresses to allow access and deny any other access.&lt;/P&gt;&lt;P&gt;We also have a tunnel for communication to a partner network. The issue I'm running into is that we lose that communication once this ACL is enacted. It's not right away but within the following hour. Note: I've added the partner IP range into the whitelist, I also don't have a FTN to enable geolocation blocking.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a better place to put a whitelist so that it won't impact internal communications?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 17:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237554#M1118272</guid>
      <dc:creator>zgovernale</dc:creator>
      <dc:date>2024-12-16T17:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237557#M1118273</link>
      <description>&lt;P&gt;What is VPN you use RA VPN of S2S&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 17:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237557#M1118273</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-16T17:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237558#M1118274</link>
      <description>&lt;P&gt;The whitelist is meant to cover the people trying to RA VPN. The S2S is our tunneled connection to our partner org.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 17:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237558#M1118274</guid>
      <dc:creator>zgovernale</dc:creator>
      <dc:date>2024-12-16T17:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237559#M1118275</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1823973"&gt;@zgovernale&lt;/a&gt; what did you configure in the control plane ACL? If connections drop after an hour it could be an existing connection that timeouts and thus was unintentionally blocked in the cplane ACL. Check the logs to compare with the cplane ACL&lt;/P&gt;
&lt;P&gt;For RAVPN protection and your hardware supports it, upgrade and use threat protection. &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-asa/222315-configure-threat-detection-services-for.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-asa/222315-configure-threat-detection-services-for.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 17:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237559#M1118275</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-16T17:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237560#M1118276</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 17:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5237560#M1118276</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-16T17:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5238158#M1118304</link>
      <description>&lt;P&gt;The control plane ACL has a blacklist of known bad IP addresses, then a whitelist with every IP I could find/trust. This included the list of our partner orgs servers and it would still stop working after an amount of time.&lt;/P&gt;&lt;P&gt;Looking into the RAVPN protection you listed, I was able to upgrade to 9.18(4). I see that it listed 9.18(4)40. I'm unsure of the difference. If it helps we are running an ASAv&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 23:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5238158#M1118304</guid>
      <dc:creator>zgovernale</dc:creator>
      <dc:date>2024-12-17T23:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5238305#M1118310</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1823973"&gt;@zgovernale&lt;/a&gt; it depends on which exact version of 9.18 you are running, 9.18(4)40 (or higher) is an interim version, which would include this functionality, the initial version of 9.18(4) would not.&lt;/P&gt;
&lt;P&gt;9.18(4) interim version download - &lt;A href="https://software.cisco.com/download/home/286119613/type/280775065/release/9.18.4%20Interim" target="_blank"&gt;https://software.cisco.com/download/home/286119613/type/280775065/release/9.18.4%20Interim&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 08:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5238305#M1118310</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-18T08:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: Whitelist on CPLANE</title>
      <link>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5238448#M1118326</link>
      <description>&lt;P&gt;I send you PM check it&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/whitelist-on-cplane/m-p/5238448#M1118326</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-18T14:22:31Z</dc:date>
    </item>
  </channel>
</rss>

