<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thaks for your reply, Pawan! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004026#M150167</link>
    <description>&lt;P&gt;Thaks for your reply, Pawan!&lt;/P&gt;
&lt;P&gt;The problem is I've applied this rule to both outside and inside and there is no result. =(((&lt;/P&gt;</description>
    <pubDate>Wed, 07 Sep 2016 10:33:37 GMT</pubDate>
    <dc:creator>Ilya Semenov</dc:creator>
    <dc:date>2016-09-07T10:33:37Z</dc:date>
    <item>
      <title>Deny access to VPN users to some internal resources on ASA</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004024#M150165</link>
      <description>&lt;P&gt;Hello, everybody!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have ASA 5506 and VPN L2TP Server on it. Everything works &amp;nbsp;fine.&lt;/P&gt;
&lt;P&gt;My internal network is 10.0.0.0/24, VPN IPs scope is 10.0.0.160-10.0.0.230.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have to limit all the access for VPN clients for internal resources, except RDP to two servers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've created two rules for VPN Clients in outside section:&lt;/P&gt;
&lt;P&gt;1st - allow VPN clients scope access to servers on port tcp/3389&lt;/P&gt;
&lt;P&gt;2nd - deny VPN clients scope access to any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The problem is regardless of my rules mentioned above, VPN clients have all the access to internal resouces.&lt;/P&gt;
&lt;P&gt;I have tried to split internal range 10.0.0.0/24 in two scopes: 10.0.0.1-10.0.0.159 and 10.0.0.231.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The problem still exists. Please, take a look at screenshot provided.&lt;/P&gt;
&lt;P&gt;Do you have any ideas how to solve the problem?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks in advance,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ilya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004024#M150165</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2019-03-12T08:14:39Z</dc:date>
    </item>
    <item>
      <title>If you have applied this ACL</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004025#M150166</link>
      <description>&lt;P&gt;If you have applied this ACL on outside interface then it wil not work as traffic from outside comes to firewall in vpn encrypt form and then it get decrypt and goes to internal network better apply this rule on internal interface of firewall like inside interface in out direction.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 10:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004025#M150166</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-09-07T10:22:07Z</dc:date>
    </item>
    <item>
      <title>Thaks for your reply, Pawan!</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004026#M150167</link>
      <description>&lt;P&gt;Thaks for your reply, Pawan!&lt;/P&gt;
&lt;P&gt;The problem is I've applied this rule to both outside and inside and there is no result. =(((&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 10:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004026#M150167</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2016-09-07T10:33:37Z</dc:date>
    </item>
    <item>
      <title>on inside interface direction</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004027#M150170</link>
      <description>&lt;P&gt;on inside interface direction must be out. (i.e. outbound). Dol ike to share&amp;nbsp;inside interafce outbound acl&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 10:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004027#M150170</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-09-07T10:39:22Z</dc:date>
    </item>
    <item>
      <title>Hello, please, uncheck the</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004028#M150175</link>
      <description>&lt;P&gt;Hello, please, uncheck the option in Connection profile "Bypass interface access list..." (see the attach). But be careful with the option. This may influence other VPN if you have them, for example Site-to-Site IPsec.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 10:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004028#M150175</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-09-07T10:43:32Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004029#M150177</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;please, uncheck the option in Connection profile "Bypass interface access list..." (see the attach). But be careful with the option. This may influence other VPN if you have them, for example Site-to-Site IPsec.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 10:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004029#M150177</guid>
      <dc:creator>Boris Uskov</dc:creator>
      <dc:date>2016-09-07T10:47:24Z</dc:date>
    </item>
    <item>
      <title>I'am sorry, what do you mean?</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004030#M150178</link>
      <description>&lt;P&gt;I'am sorry, what do you mean? "Outbound direction"...?&lt;/P&gt;
&lt;P&gt;Please, explain it...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks to you!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 11:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004030#M150178</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2016-09-07T11:20:03Z</dc:date>
    </item>
    <item>
      <title>Every interface has two</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004031#M150179</link>
      <description>&lt;P&gt;Every interface has two direction in and out. Do you have any acl on inside interface out direction?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can find that show run access-group&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 11:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004031#M150179</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-09-07T11:22:41Z</dc:date>
    </item>
    <item>
      <title>I've done as you told me. I</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004032#M150180</link>
      <description>&lt;P&gt;I've done as you told me. I'll check it in two hours and report my results.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 12:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004032#M150180</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2016-09-07T12:16:40Z</dc:date>
    </item>
    <item>
      <title>By l2tp server do you mean</title>
      <link>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004033#M150181</link>
      <description>&lt;P&gt;By l2tp server do you mean this is an individual user using an l2tp client to create a vpn connection to the firewall or is it a site to site tunnel between two devices using l2tp?&lt;/P&gt;
&lt;P&gt;If it is an individual user, then within the properties of the group policy assigned to the network client access profile you will apply an acl filter.&lt;/P&gt;
&lt;P&gt;The named acl will be allow vpn address scope to servers on 3389&lt;/P&gt;
&lt;P&gt;deny vpn address scope 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16&lt;/P&gt;
&lt;P&gt;permit vpn address scope &amp;nbsp;any any.&lt;/P&gt;
&lt;P&gt;If it is a site to site tunnel the acl is applied differently.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 18:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-access-to-vpn-users-to-some-internal-resources-on-asa/m-p/3004033#M150181</guid>
      <dc:creator>mrrlg</dc:creator>
      <dc:date>2016-09-07T18:23:00Z</dc:date>
    </item>
  </channel>
</rss>

