cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2267
Views
5
Helpful
7
Replies

Block internet on one device

Eddie Sardinha
Level 1
Level 1

What is the proper ACL to block internet on one server using an ASA 5545 version 9.6(4) 20?

7 Replies 7

balaji.bandi
Hall of Fame
Hall of Fame

Not sure how your ASA configuration to suggest - based on the exiting config.

 

so please look below document using ASDM add ACL and test & advise.

 

https://www.petenetlive.com/KB/Article/0000743

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

rais
Level 7
Level 7

Alternately, you could delete a default route on the server itself and only use specific routes.

HTH.

What is the proper ACL to block internet on one server using an ASA 5545 version 9.6(4) 20?

 

EXAMPLE

!

interface gig1/5
nameif DMZ
sec 50
ip address 192.168.x.x 255.255.x.x
!
object-group network RFC1918 10.0.0.0 255.0.0.0 172.16.0.0 255.240.0.0 192.168.0.0 255.255.0.0
!
object network SERVER-DMZ
host 192.168.x.x ---THIS IS YOUR SERVER NEED STOP ACCESS TO INTERNET----

!

access-list DMZ_IN extended permit ip SERVER-DMZ object-group RFC1918
access-list DMZ_IN extended deny ip SERVER-DMZ any
!
access-group DMZ_IN in interface DMZ

 

 

 

please do not forget to rate.

I have a lot of other ACL's part of different interfaces, inside, outside, dmz and transit interfaces.   I want to be sure this doesnt block anything from other devices in my network.  Do I need to do anything so nothing else gets blocked ?

Which interfere on this ASA this server belong to? 
and what access list you have configured on this interface?

 

if you share the internet name of this sever and the first line of access list I can write the ACL for you.

 

example

!

 

access-list DMZ_IN inline 1 extended  permit ip SERVER-DMZ object-group RFC1918
access-list DMZ_IN inline 2 extended deny ip SERVER-DMZ any
access-list DMZ_IN inline 3 extended permit ip xxx.xxx. xxx.xxxx
....................................................
.....................................................
!
access-group DMZ_IN in interface DMZ

 

please do not forget to rate.

The server should be behind the inside interface but i can't share the names of the servers 

If you have too many ACL not able to post complete config, not confident enough where to add, best is use ASDM  add Line below or above where required - test if not working easy from GUI to disable or ammend.

 

Since ASA generate lot of ACL command level, some time it hard to figure out where to insert this lines and as you mentioned this may cause other issue, so please use GUI is easy for simplicity.

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card