<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Downloadable PIX ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/downloadable-pix-acl/m-p/79364#M661468</link>
    <description>&lt;P&gt;Dear All:&lt;/P&gt;&lt;P&gt;I had ACS 3.0 it's for VPN client 3.5 authentication and authorization , i can authentication&lt;/P&gt;&lt;P&gt;successful,But i couldn't authorization for VPN client,When i setting "downloadable PIX ACL",&lt;/P&gt;&lt;P&gt;as bellow is my definition&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.53.201 eq 23&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.53.201 eq 80&lt;/P&gt;&lt;P&gt;I would to know that config is correct or other way  that can restriction VPDN clinet &lt;/P&gt;&lt;P&gt;only access 23 and 80 port number on 192.168.53.201 server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[PIX-Config]&lt;/P&gt;&lt;P&gt;ip local pool ippool 10.10.10.1-10.10.11.254&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.0.0 255.255.0.0 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;P&gt;aaa-server authme protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server authme (inside) host 192.168.53.100 cisco1234 timeout 10&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map mymap client authentication authme&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp client configuration address-pool local ippool outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 33600&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 dns-server 192.168.50.100&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 wins-server 192.168.50.200&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 default-domain abcd.com&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls in advice&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:09:50 GMT</pubDate>
    <dc:creator>emily</dc:creator>
    <dc:date>2020-02-21T06:09:50Z</dc:date>
    <item>
      <title>Downloadable PIX ACL</title>
      <link>https://community.cisco.com/t5/network-security/downloadable-pix-acl/m-p/79364#M661468</link>
      <description>&lt;P&gt;Dear All:&lt;/P&gt;&lt;P&gt;I had ACS 3.0 it's for VPN client 3.5 authentication and authorization , i can authentication&lt;/P&gt;&lt;P&gt;successful,But i couldn't authorization for VPN client,When i setting "downloadable PIX ACL",&lt;/P&gt;&lt;P&gt;as bellow is my definition&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.53.201 eq 23&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.53.201 eq 80&lt;/P&gt;&lt;P&gt;I would to know that config is correct or other way  that can restriction VPDN clinet &lt;/P&gt;&lt;P&gt;only access 23 and 80 port number on 192.168.53.201 server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[PIX-Config]&lt;/P&gt;&lt;P&gt;ip local pool ippool 10.10.10.1-10.10.11.254&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.0.0 255.255.0.0 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;P&gt;aaa-server authme protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server authme (inside) host 192.168.53.100 cisco1234 timeout 10&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map mymap client authentication authme&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp client configuration address-pool local ippool outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 33600&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 dns-server 192.168.50.100&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 wins-server 192.168.50.200&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 default-domain abcd.com&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls in advice&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/downloadable-pix-acl/m-p/79364#M661468</guid>
      <dc:creator>emily</dc:creator>
      <dc:date>2020-02-21T06:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: Downloadable PIX ACL</title>
      <link>https://community.cisco.com/t5/network-security/downloadable-pix-acl/m-p/79365#M661481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's a current bug (CSCdx47975) where downloadable ACL's do not work for VPN users, only for users doing passthru authentication.  The workaround is to define the ACL on the PIX, then just pass down the ACL number (rather than the whole ACL) and that ACL will be assigned to that user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a sample config here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/110/pixcryaaa52.shtml" target="_blank"&gt;http://www.cisco.com/warp/public/110/pixcryaaa52.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   access-list 150 permit tcp any host 192.168.53.201 eq 23 &lt;/P&gt;&lt;P&gt;   access-list 150 permit tcp any host 192.168.53.201 eq 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the PIX, then on the ACS server just send down the ACL number 150 and that will be applied ot the VPN user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2002 00:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/downloadable-pix-acl/m-p/79365#M661481</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2002-07-17T00:09:09Z</dc:date>
    </item>
  </channel>
</rss>

