<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - Correct application of ACLs to outside interface when using &amp;quot;no sysopt connection permit-vpn&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/4000547#M23565</link>
    <description>&lt;P&gt;Thanks for your input Gerald.&amp;nbsp; Really keen to hear other people's views as well.&lt;/P&gt;</description>
    <pubDate>Wed, 18 Dec 2019 11:17:49 GMT</pubDate>
    <dc:creator>Michael Greaves</dc:creator>
    <dc:date>2019-12-18T11:17:49Z</dc:date>
    <item>
      <title>Cisco ASA - Correct application of ACLs to outside interface when using "no sysopt connection permit-vpn"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3996412#M23560</link>
      <description>&lt;P&gt;My question is how we allow VPN traffic via the outside interface but block internet traffic that happens to have the same source address as the remote VPN network ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you disable the bypassing of interface access lists on an ASA using the "no sysopt connection permit-vpn" command how should the ACLs be applied on the outside interface to only allow VPN traffic and not traffic from the internet. Example:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Local Network Company A:&amp;nbsp; 12.10.1.0/24&lt;/P&gt;&lt;P&gt;Remote Network Company B:&amp;nbsp; 13.10.1.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We apply an ACL on the outside interface allowing network 13.10.1.0/24 to access 12.10.1.0/24 over the VPN. But what would stop a network 13.10.1.0/24 on the internet also accessing 12.10.1.0/24. Assume that Company B is using 13.10.1.0/24 as its internal address range but a genuine external network also exists with the same IP network. How do we differentiate between the VPN network and the external internet based network ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 12:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3996412#M23560</guid>
      <dc:creator>Michael Greaves</dc:creator>
      <dc:date>2019-12-10T12:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Correct application of ACLs to outside interface when using "no sysopt connection permit-vpn"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3996712#M23561</link>
      <description>&lt;P&gt;What I have seen in production environments is leaving the SYSOPT in place and restricting traffic using VPN Filter lists.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 18:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3996712#M23561</guid>
      <dc:creator>gerald.scott</dc:creator>
      <dc:date>2019-12-10T18:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Correct application of ACLs to outside interface when using "no sysopt connection permit-vpn"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3997846#M23562</link>
      <description>&lt;P&gt;Sure yes, I'm also aware of that method but what if we don't want to use this option, so we have complete control of the VPN access. How will this affect the incoming internet traffic ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody considered this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 10:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3997846#M23562</guid>
      <dc:creator>Michael Greaves</dc:creator>
      <dc:date>2019-12-12T10:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Correct application of ACLs to outside interface when using "no sysopt connection permit-vpn"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3999880#M23563</link>
      <description>&lt;P&gt;Anybody any thoughts are this please ? Any feedback greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2019 11:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/3999880#M23563</guid>
      <dc:creator>Michael Greaves</dc:creator>
      <dc:date>2019-12-17T11:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Correct application of ACLs to outside interface when using "no sysopt connection permit-vpn"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/4000356#M23564</link>
      <description>&lt;P&gt;Based on your scenario, there are two organizations using non RFC 1918 address space, that they don't own, as their internal address space.&amp;nbsp; In my experience, this is extremely unlikely to happen, and as such I don't have an answer to your question.&amp;nbsp; Good luck in your search.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2019 01:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/4000356#M23564</guid>
      <dc:creator>gerald.scott</dc:creator>
      <dc:date>2019-12-18T01:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Correct application of ACLs to outside interface when using "no sysopt connection permit-vpn"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/4000547#M23565</link>
      <description>&lt;P&gt;Thanks for your input Gerald.&amp;nbsp; Really keen to hear other people's views as well.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2019 11:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-correct-application-of-acls-to-outside-interface-when/m-p/4000547#M23565</guid>
      <dc:creator>Michael Greaves</dc:creator>
      <dc:date>2019-12-18T11:17:49Z</dc:date>
    </item>
  </channel>
</rss>

