05-20-2021 08:54 AM
Good Day,
I would like to lock my ASA-5506 down to allow WebVPN access only from the remote office. I am thinking I need to apply an access-list to the external interface?
webvpn
enable outside permit 8.8.8.8 255.255.255.252 <-- used google dns as an example
Solved! Go to Solution.
05-20-2021 10:56 AM - edited 05-20-2021 11:28 AM
Not quite, there is no "allow" keyword. Just replace 8.8.8.8 with the source IP address you want to permit, all other will be denied.
access-list CPLANE extended permit ip host 8.8.8.8 any
access-list CPLANE extended deny ip any any
access-group CPLANE in interface OUTSIDE control-plane
05-20-2021 08:57 AM - edited 05-20-2021 09:10 AM
Create a normal access-list and apply a control-plane ACL inbound on the outside interface. E.g.
access-group OUTSIDE_CP in interface OUTSIDE control-plane
Notice the keyword control-plane at the end, this will control traffic destined to the ASA itself.
HTH
05-20-2021 09:14 AM
05-20-2021 09:17 AM
Access list to define the RAVPN you want to permit, then deny the rest.
access-list CPLANE extended permit tcp object-group ALLOWED_RAVPN interface OUTSIDE eq https
access-list CPLANE extended permit udp object-group ALLOWED_RAVPN interface OUTSIDE eq isakmp
access-list CPLANE extended permit udp object-group ALLOWED_RAVPN interface OUTSIDE eq 4500
access-list CPLANE extended permit esp object-group ALLOWED_RAVPN interface OUTSIDE
access-list CPLANE extended deny ip any any
Assign the access-list to the outside interface
access-group CPLANE in interface OUTSIDE control-plane
05-20-2021 10:15 AM
I think I have it:
acces-list CPLANE extended permit...
access-list CPLANE extended allow ip 8.8.88 255.255.255.252
access-list CPANE extended deny ip any any
or am I off?
05-20-2021 10:56 AM - edited 05-20-2021 11:28 AM
Not quite, there is no "allow" keyword. Just replace 8.8.8.8 with the source IP address you want to permit, all other will be denied.
access-list CPLANE extended permit ip host 8.8.8.8 any
access-list CPLANE extended deny ip any any
access-group CPLANE in interface OUTSIDE control-plane
05-20-2021 11:09 AM
thanks Rob.
now to type it in without me making any typos
10-18-2021 04:31 PM
I see this is several months old, but I am having the same issue attempting to lock down the WebVPN, but need to lock it down to our office networks. I am testing with my bench unit, but can't get the restriction working. I have:
interface GigabitEthernet1/1
nameif outside
security-level 0
ip address 192.168.30.123 255.255.255.128
!
...
object network BBH-WAN-Fiber
subnet 192.168.30.0 255.255.255.128
object network BBH-WAN-Cable
subnet 172.54.24.0 255.255.255.0
...
access-list CPLANE extended permit ip object BBH-WAN-Fiber any
access-list CPLANE extended permit ip object BBH-WAN-Cable any
access-list CPLANE extended deny ip any any
...
access-group CPLANE in interface outside control-plane
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide