<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricting Inbound Access on ASA5540 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301680#M859292</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Explain to your customer how simple it is to spoof a source IP address and weigh that against the complexity and performance effects of a monstrous ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Jun 2009 14:56:28 GMT</pubDate>
    <dc:creator>kcaskey</dc:creator>
    <dc:date>2009-06-26T14:56:28Z</dc:date>
    <item>
      <title>Restricting Inbound Access on ASA5540</title>
      <link>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301676#M859263</link>
      <description>&lt;P&gt;I have a customer that wants to restrict inbound access from the internet to their webservers to only North American traffic. They have indicated that they have a list of 40,000 IPs that they want to explicitly allow. They would like this restricted access to be provided by the ASA. The IPs are not contiguous. I can't see how this could possibly be done via access-lists that would not kill the box. Any suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301676#M859263</guid>
      <dc:creator>l.blair</dc:creator>
      <dc:date>2019-03-11T15:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Inbound Access on ASA5540</title>
      <link>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301677#M859270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Blocking by country is the one of the most inefficient ways to restrict access to your configuration.  The device will still have to compare all new incoming connections to this access-list which will likely affect the performance of the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;40,000 IPs/network ranges seems excessive for US IPs...perhaps you could allow only ARIN IP ranges?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://www.arin.net/knowledge/ip_blocks.html" target="_blank"&gt;https://www.arin.net/knowledge/ip_blocks.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jun 2009 23:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301677#M859270</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2009-06-18T23:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Inbound Access on ASA5540</title>
      <link>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301678#M859279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It depends on the ASA platform. Every ACE will require memory space. There is also the lookup time required for the ACL checks that again, will depend on the platform for their speed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jun 2009 02:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301678#M859279</guid>
      <dc:creator>plumbis</dc:creator>
      <dc:date>2009-06-26T02:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Inbound Access on ASA5540</title>
      <link>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301679#M859288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Deny based on ip address does not seems to be a good solution as it will eat all the resources on the ASA, you should find some other way of blocking the traffic.&lt;/P&gt;&lt;P&gt;My sugestion would be use an external authentication server and restrict the noumber of connections to the weebserver on asa to 40,000 and provide a username and password to the users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jun 2009 04:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301679#M859288</guid>
      <dc:creator>svaish</dc:creator>
      <dc:date>2009-06-26T04:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Inbound Access on ASA5540</title>
      <link>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301680#M859292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Explain to your customer how simple it is to spoof a source IP address and weigh that against the complexity and performance effects of a monstrous ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jun 2009 14:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricting-inbound-access-on-asa5540/m-p/1301680#M859292</guid>
      <dc:creator>kcaskey</dc:creator>
      <dc:date>2009-06-26T14:56:28Z</dc:date>
    </item>
  </channel>
</rss>

