<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Have you tried blocking it at in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745211#M178923</link>
    <description>&lt;P&gt;Have you tried blocking it at the control plane.&amp;nbsp; I would give that a shot.&amp;nbsp; Or figure out the remote side IP and try to contact them...&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list cp-outside deny udp host xxxx.xxxx.6.191 any eq 4500&lt;/P&gt;&lt;P&gt;access-list cp-outside deny udp host xxxx.xxxx.6.191 any eq 500&lt;/P&gt;&lt;P&gt;access-list cp-outside deny&amp;nbsp;esp host xxxx.xxxx.6.191 any&lt;/P&gt;&lt;P&gt;access-list cp-outside permit ip any any&lt;/P&gt;&lt;P&gt;access-group cp-outside in interface outside control-plane&lt;/P&gt;</description>
    <pubDate>Thu, 10 Sep 2015 19:06:43 GMT</pubDate>
    <dc:creator>Josh Sprang</dc:creator>
    <dc:date>2015-09-10T19:06:43Z</dc:date>
    <item>
      <title>How do I block IP addresses from trying to establish VPN tunnel with my ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745210#M178922</link>
      <description>&lt;P&gt;I frequently receive logs from my ASA that indicate random IP addresses are trying to establish a VPN tunnel with it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-4-713903&lt;BR /&gt;ASA-3-713902&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Possible unexpected behavior of a peer occured (e.g., loss of connectivity).&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Group = DefaultRAGroup, IP = xxx.xxx.6.191, Error: Unable to remove PeerTblEntry&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Possible configuration error on either the headend or remote access client.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Group = DefaultRAGroup, IP = xxx.xxx.6.191, Removing peer from peer table failed, no match!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have created rules blocking ISAKMP (udp/port 500) and udp/port 4500 for IKE negotiations but I still receive these logs. In addition I have blocked several other protocols because I just don't want these IP addresses reaching my ASA at all such as esp (protocol 50), ALL ICMP traffic, IP, and http/https. I just added AH (protocol 51) as well because I noticed that it was missing. If adding AH DOESN'T resolve the issue then what else do I need to block in order to prevent these IP addresses from trying to establish a VPN tunnel?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745210#M178922</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2019-03-12T06:34:52Z</dc:date>
    </item>
    <item>
      <title>Have you tried blocking it at</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745211#M178923</link>
      <description>&lt;P&gt;Have you tried blocking it at the control plane.&amp;nbsp; I would give that a shot.&amp;nbsp; Or figure out the remote side IP and try to contact them...&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list cp-outside deny udp host xxxx.xxxx.6.191 any eq 4500&lt;/P&gt;&lt;P&gt;access-list cp-outside deny udp host xxxx.xxxx.6.191 any eq 500&lt;/P&gt;&lt;P&gt;access-list cp-outside deny&amp;nbsp;esp host xxxx.xxxx.6.191 any&lt;/P&gt;&lt;P&gt;access-list cp-outside permit ip any any&lt;/P&gt;&lt;P&gt;access-group cp-outside in interface outside control-plane&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2015 19:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745211#M178923</guid>
      <dc:creator>Josh Sprang</dc:creator>
      <dc:date>2015-09-10T19:06:43Z</dc:date>
    </item>
    <item>
      <title>I think you need to add the</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745212#M178924</link>
      <description>&lt;P&gt;I think you need to add the control-plane keyword at the end of your Access-group statement.&lt;/P&gt;&lt;P&gt;An access-group without the keyword control-plane will filter ASA traffic pass-trough , if you want to filter traffic that hits ASA interface, i mean destined to the WAN interface or whatever interface you have to add the keyword.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Here it is, the Cisco ASA configuration guide&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/access_rules.html#wp1086731&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;EM&gt;&lt;STRONG&gt;e&lt;STRONG&gt;.g&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;EM&gt;&lt;STRONG&gt;Outside interface ip address: y.y.y.y&lt;BR /&gt;External ip address allowed to establish connection against the ASA: x.x.x.x&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;EM&gt;&lt;STRONG&gt;access-list Outside_ACL permit udp host x.x.x.x eq 500 host y.y.y.y eq 500&lt;BR /&gt;access-group Outside_ACL in interface outside control-plane&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think this could be a guide how should it be configured. by the way be careful about the acl implicit deny, if you are connecting to the ASA using the outside interface, you need to permit your public ip address.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Andres&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2015 19:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745212#M178924</guid>
      <dc:creator>Andres Vega</dc:creator>
      <dc:date>2015-09-10T19:09:50Z</dc:date>
    </item>
    <item>
      <title>Thanks for the clarification.</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745213#M178925</link>
      <description>&lt;P&gt;Thanks for the clarification. I have blocked the tunnel traffic from the offending IP addresses on the control-plane and it looks like it has worked.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2015 13:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745213#M178925</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2015-09-14T13:37:35Z</dc:date>
    </item>
    <item>
      <title>Thank you. Blocking the</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745214#M178926</link>
      <description>&lt;P&gt;Thank you. Blocking the offending traffic on the control-plane has worked.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2015 13:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/2745214#M178926</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2015-09-14T13:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: How do I block IP addresses from trying to establish VPN tunnel wi</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/5108959#M1112768</link>
      <description>&lt;P&gt;See the following Cisco Support document that shows how to do this with examples. Important that you likely need to follow the directions to use `clear connection address ...` to force the ASA to re-evaluate IKE/isakmp connection attempts from the address denied in your control-plane access-list.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221457-configure-control-plane-access-control-p.html" target="_blank" rel="nofollow noopener noreferrer"&gt;Configure Control Plane Access Control Policies for Secure Firewall Threat Defense and ASA - Cisco&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 17 May 2024 19:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/5108959#M1112768</guid>
      <dc:creator>mistertom</dc:creator>
      <dc:date>2024-05-17T19:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: Thank you. Blocking the</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/5225066#M1117597</link>
      <description>&lt;P&gt;Did you applied the seperate access-list created for the control plane traffic to external interface?? Because on the external interface you should already have existing access-group for the inbound traffic right?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 17:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-ip-addresses-from-trying-to-establish-vpn-tunnel/m-p/5225066#M1117597</guid>
      <dc:creator>prasadmeka</dc:creator>
      <dc:date>2024-11-15T17:29:25Z</dc:date>
    </item>
  </channel>
</rss>

