06-22-2023 07:03 AM
Is it possible to send ASA control-plane traffic to the SFR module so that we can create a GEO block rule for VPN connections?
Solved! Go to Solution.
06-22-2023 07:09 AM
@ChadH63728 unfortunately no, the Geoprotection is for "through" traffic and cannot control control-plane traffic. You would need to use a traditional control-plane ACL.
06-22-2023 07:09 AM
@ChadH63728 unfortunately no, the Geoprotection is for "through" traffic and cannot control control-plane traffic. You would need to use a traditional control-plane ACL.
06-22-2023 08:13 AM
Thanks for confirming. In this case, if I create an ACL with ~50,000 network objects relating to Country subnets, will this cause latency or other issues?
06-22-2023 08:23 AM
50,000 net ? wow it huge number, you need to use VPN pool not each anyconnect IP in control ACL.
06-22-2023 08:49 AM - edited 06-22-2023 08:51 AM
@ChadH63728 not sure what exact model you have, so not sure on the performance with the old ASA 5500-X hardware.
The current Cisco recommendation is to control inbound RAVPN connection requests by using Geolocation restrictions within 2FA solution (such as Cisco Duo). Alternatively you could purchase an FTD and place in front of the RAVPN ASA, then you can use Geoprotection filtering on the FTD as this is "through" traffic, routed from outside/to inside where Geoprotection is supported. Neither are a particularly ideal solution though.
06-23-2023 08:58 AM
I created a post about this some time ago:
https://bluenetsec.com/ftd-geolocation/
Sadly, the FTD still doesn't seem to support blocking the geo traffic to itself.
06-23-2023 09:03 AM
Interesting info on how the GEO block database works on the back side. I'm using an ASA with SFR module which I think makes things even more complicated, but crazy that the FTD can't even GEOBlock traffic to itself.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide