<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493308#M613254</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your configuration&amp;nbsp; without public ip's and passwords.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Aug 2010 21:58:20 GMT</pubDate>
    <dc:creator>manish arora</dc:creator>
    <dc:date>2010-08-27T21:58:20Z</dc:date>
    <item>
      <title>Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493302#M613248</link>
      <description>&lt;P&gt;I have an ASA5520.&amp;nbsp; I have a host I need to block access to for users who come in on a VPN.&amp;nbsp; When they come in they get an IP from the ASA on a unique subnet.&amp;nbsp; Thought it would be easy and I could just block the traffic with an ACL statement on the INSIDE interface, but the traffic still got through.&amp;nbsp; 0 hits on the ACL.&amp;nbsp; I did a syslog and saw the traffic going through the OUTSIDE interface, so I decided to added an ACL statement there and the traffic still got through.&amp;nbsp; Hmmmm&amp;nbsp;&amp;nbsp; Am I missing something?&amp;nbsp; Does the ASA treat traffic on VPN different? &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493302#M613248</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2019-03-11T18:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493303#M613249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The command that may be causing you this grief is 'sysopt connection permit-vpn'.&amp;nbsp; This command, based on the command reference below, allows all VPN traffic to bypass access-lists:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1412217"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1412217&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To confirm if this command is enabled on your device, run the command 'show run all sysopt'.&amp;nbsp; To disable this command, requiring all VPN traffic to be checked against the access-lists, issue the command 'no sysopt connection permit-vpn'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give this a shot!&amp;nbsp; If it helps, be sure to mark this thread as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 18:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493303#M613249</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-08-27T18:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493304#M613250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for replying to my post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were right.&amp;nbsp; Out put is below.&amp;nbsp; I assume if I remove the "sysopt connection permit-vpn" I will need to have ACL's configured to allow traffic to my VPN clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5520(config)# sh run all sysopt&lt;/P&gt;&lt;P&gt;no sysopt connection timewait&lt;BR /&gt;sysopt connection tcpmss 1380&lt;BR /&gt;sysopt connection tcpmss minimum 0&lt;BR /&gt;sysopt connection permit-vpn&lt;BR /&gt;sysopt connection reclassify-vpn&lt;/P&gt;&lt;P&gt;Thanks again....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harrison&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 20:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493304#M613250</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-08-27T20:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493305#M613251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Harrison,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually, you shouldn't need access-lists to get to your clients unless you have explicitly chosen to configure an access-list on the inside interface (on an ASA, high-to-low traffic is permitted by default) - this 'sysopt' command shouldn't effect traffic to the clients in either case. However, as the clients enter your network, they will be susceptible to the interface access-lists that you have defined, for instance, 'access-group inside_out out interface inside'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you read the command reference, it gives a pretty good summary as to the comand expectations.&amp;nbsp; Also, as provided within this command reference, you may benefit from &lt;SPAN class="content"&gt;group policy and per-user authorization access lists as, even in the presence of 'sysopt connection permit-vpn', these still apply to the traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 20:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493305#M613251</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-08-27T20:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493306#M613252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Harrison,&lt;/P&gt;&lt;P&gt;Just for your infomation , removing sysopt connection permit-vpn will also make your L2L vpn traffic screen against the outside interface access list. If you want to just stop access to the host for remote vpn client&amp;nbsp; and have split tunnelling configured , you just deny&amp;nbsp; access to the host from the split tunnel acl.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 20:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493306#M613252</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-08-27T20:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493307#M613253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for replying. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried denying the traffic there to and it still makes it through.&amp;nbsp;&amp;nbsp; On the ACL I moved it to the top.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harrison&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 21:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493307#M613253</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-08-27T21:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493308#M613254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your configuration&amp;nbsp; without public ip's and passwords.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 21:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493308#M613254</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-08-27T21:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493309#M613255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Manish:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply to my posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I fixed the problem.&amp;nbsp; In my split tunnel statements I had allowed access to the specific host higher in the ACL.&amp;nbsp;&amp;nbsp; I removed it and the host was blocked.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you help....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harrison&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 15:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493309#M613255</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-08-30T15:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic</title>
      <link>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493310#M613256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Harrison,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can, please be sure to mark this thread as 'answered' for the benefits of others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for using the Support Forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 15:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-traffic/m-p/1493310#M613256</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-08-30T15:20:03Z</dc:date>
    </item>
  </channel>
</rss>

