<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restricted access for a site-to-site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756507#M980335</link>
    <description>&lt;P&gt;Hi. I'm after some advice. Is there any way to restrict the remote end of a site-to-site VPN connection to certain devices on our network? We use a Pix 515E (v7 s/w). I know how to do it for remote users connecting via Cisco client s/w but not for existing site VPNs. Thanks.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 10:17:32 GMT</pubDate>
    <dc:creator>Rex Biesty</dc:creator>
    <dc:date>2019-03-11T10:17:32Z</dc:date>
    <item>
      <title>Restricted access for a site-to-site VPN</title>
      <link>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756507#M980335</link>
      <description>&lt;P&gt;Hi. I'm after some advice. Is there any way to restrict the remote end of a site-to-site VPN connection to certain devices on our network? We use a Pix 515E (v7 s/w). I know how to do it for remote users connecting via Cisco client s/w but not for existing site VPNs. Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:17:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756507#M980335</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2019-03-11T10:17:32Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted access for a site-to-site VPN</title>
      <link>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756508#M980336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How are you doing it for remote access vpn's? You've got several options and they are the same as the ones for your remote access vpns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the lan to lan tunnels you could remove sysopt conn permit-ipsec and use interface acls to filter the traffic (will affect all ipsec traffic). You could also be very specific with your interesting traffic and nat exemption acl's to define traffic only to those devices which you wanted remote access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2007 12:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756508#M980336</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-21T12:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted access for a site-to-site VPN</title>
      <link>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756509#M980337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi and thanks for the reply. Existing restrictions on incoming client VPN connections are achieved by creating a new VPN group, restricting that group to one IP address when they connect then limiting what that IP address can access &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(e.g.&lt;/P&gt;&lt;P&gt;vpngroup external_support address-pool pool2 &lt;/P&gt;&lt;P&gt;vpngroup external_support dns-server &lt;DNS_1&gt; &lt;DNS_2&gt; &lt;/DNS_2&gt;&lt;/DNS_1&gt;&lt;/P&gt;&lt;P&gt;vpngroup external_support wins-server &lt;WINS_SERVER_IP&gt; &lt;/WINS_SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;vpngroup external_support default-domain &lt;YOUR_DOMAIN_NAME&gt; &lt;/YOUR_DOMAIN_NAME&gt;&lt;/P&gt;&lt;P&gt;vpngroup external_support idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup external_support password &lt;PASSWORD&gt; &lt;/PASSWORD&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool pool2 10.x.x.1-10.x.x.1 mask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip host &lt;INTERNAL_SRV1_IP&gt; host 10.x.x.1 &lt;/INTERNAL_SRV1_IP&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip host &lt;INTERNAL_SRV2_IP&gt; host 10.x.x.1)&lt;/INTERNAL_SRV2_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we have a number of people and companies who connect via client and site VPNs so I'm after a solution which will not affect existing connectivity. Can a similar solution to the one I already use be implemented for site vpns. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2007 14:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756509#M980337</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2007-05-21T14:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted access for a site-to-site VPN</title>
      <link>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756510#M980338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure, you can do something like this with interesting traffic...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 extended permit ip host &lt;INTERNAL_SRV1_IP&gt; &lt;REMOTE.NETWORK&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/REMOTE.NETWORK&gt;&lt;/INTERNAL_SRV1_IP&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_cryptomap_20&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer x.x.x.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_40 extended permit ip host &lt;INTERNAL_SRV2_IP&gt; &lt;REMOTE.NETWORK&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/REMOTE.NETWORK&gt;&lt;/INTERNAL_SRV2_IP&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 match address outside_cryptomap_40&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set peer x.x.x.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option is to implement a vpn-filter and apply it to specific tunnel group policies. This document is for remote access vpn's but it works for lan to lan group policies as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080641a52.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080641a52.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2007 14:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756510#M980338</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-21T14:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted access for a site-to-site VPN</title>
      <link>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756511#M980339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. I'll try it out over the next few weeks and let you know if I get stuck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2007 15:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-access-for-a-site-to-site-vpn/m-p/756511#M980339</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2007-05-21T15:03:39Z</dc:date>
    </item>
  </channel>
</rss>

