05-21-2021 12:37 PM
I am running a couple of Cisco FTD 2110 managed with FMC and am looking for the best way to block access to our remote access VPN by IP. From doing some reading it looks like the best (and only?) way to do this is via a control plane ACL deployed via Flex Config. I saw another post that showed how this could be accomplished via geo but I am unsure on that syntax. I'm hoping someone could provide what syntax is used or point me towards some documentation for this?
Thank you!
09-01-2023 03:11 PM
How does the control plane acl affect a web server hosted on site vs a vpn connection? For this lets say that both connections happen on the same FTD. If I can place an control plane ACL to block IP 1.2.3.4 Would that just block the 1.2.3.4 IP for the VPN connection? OR would I also get blocked if I am coming from IP 1.2.3.4 trying to access a website inside the same network?
09-01-2023 03:22 PM
control plane ACLs will affect traffic that is destined to the ASA/FTD itself. regular ACLs will affect traffic passing through the ASA/FTD.
01-13-2023 09:29 AM
Sorry to bring something up from the dead, but I was curious why the multiple steps (which I plan to use) in the Marvin version (Thank you, Marvin!!) vs the steps in this link - https://integratingit.wordpress.com/2021/06/26/ftd-control-plane-acl/
More control of the different parts?
Thank you!!
Darren
01-14-2023 01:56 AM
The two are basically the same, just that the one @Marvin Rhoads has shown creates it using GUI and reusable objects, while the one in the link you posted creates this using ASA commands directly into the FlexConfig, but will not be available for re-use in any other configuration.
02-21-2023 05:02 PM
Another thread necro:
Why are there 2 flex-config objects? It looks like the first one creates a variable, but it isn't referenced in the 2nd flexconfig object. I'm wondering if this is a typo, or do you not need the first object.
02-22-2023 06:00 AM
It's a typo. I should have shown the creation of contolplaneacl object in the first step.
02-22-2023 06:17 AM
Thanks!
What sort of object is controlplaneacl? What information does it contain?
02-22-2023 06:43 AM
It's an extended ACL. Looks the same as the object ACL-Control_Plane-Test that I showed, but with a name that was more acceptable for parsing by Flexconfig.
Basically you block the IPs/objects you want to prevent from RA VPN access and allow everything else.
09-18-2024 10:27 AM
Thank you for showing us how to do this with FlexConfig! Really appreciate it!
I do have a question though.
When you're calling the Variable in Step 3 (3. Create a second Flexconfig) you also instruct to insert that same ACL again, creating a new variable.
Does that not overwrite the variable created in step 2?
Or do we have to choose a different name for the variable in step 3 and then still use the variable created in step 2 when we're writing the access-group command?
Thank you for your help.
03-10-2023 09:00 AM
Is this still the only way to accomplish this? Can we not do geo-ip based restrictions for control plane traffic even now?
03-10-2023 09:12 AM - edited 03-10-2023 09:18 AM
Not yet - but it is in the roadmap for an upcoming release.
06-10-2023 05:13 PM
Do you know if this will this work with an ASA SFR?
06-11-2023 08:00 PM - edited 06-11-2023 08:00 PM
@ChadH63728 control plane ACL would work. It has nothing to do with whether or not there is a Firepower (SFR) service module though. The SFR module's processing happens after packets have already been handled by the ingress interface and any interface ACL(s).
06-11-2023 09:10 PM
ACL with the flexconfig from the SFR?
06-12-2023 07:06 AM
@ChadH63728 No. The control-plane ACL is created an applied on the parent ASA, not in the Firepower service module.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide