04-23-2012 09:28 AM - edited 03-11-2019 03:57 PM
Hi, I'm using an ASA5505 (8.4(1)) and would like to block port 80 on a specific host in the LAN so machines in other remote LANs connected via VPN can't access this port on the host. Devices in the local LAN should have access to this port on the host. Here are the commands I'm using:
access-list block_port extended deny tcp any host 10.20.10.20 eq 80
access-list block_port extended permit ip any any
access-group block_port out interface inside
These commands are not working as I would expect them to. When I browse to http://10.20.10.20 from a remote machine over the VPN tunnel I am able to access the host web server. So what am I doing wrong?
Thanks
Joel Gonzalez
Solved! Go to Solution.
04-23-2012 05:42 PM
Hi,
I havent tested a situation exactly as yours but I'd assume the reason why the configuration is failing is because to my understanding the ASA passes all VPN traffic past the interface ACLs.
I've always imagined this would only mean that it passes the outside interface access-list and not the access-lists attached to the outgoing interface of the actual connection (in your case the "inside" interface). But if the connections are indeed going through still, I guess the situation must be that the ASA passes all VPN traffic past ASA interface access-lists.
You got atleast a couple of options
Please let me know which solution you think would suite you best or ask more questions.
- Jouni
04-23-2012 05:42 PM
Hi,
I havent tested a situation exactly as yours but I'd assume the reason why the configuration is failing is because to my understanding the ASA passes all VPN traffic past the interface ACLs.
I've always imagined this would only mean that it passes the outside interface access-list and not the access-lists attached to the outgoing interface of the actual connection (in your case the "inside" interface). But if the connections are indeed going through still, I guess the situation must be that the ASA passes all VPN traffic past ASA interface access-lists.
You got atleast a couple of options
Please let me know which solution you think would suite you best or ask more questions.
- Jouni
04-24-2012 07:34 AM
Hi Jouni,
I went the route of creating a VPN filter access-list. I used this walk through: http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9a87.shtml
Precisely what I was trying to do. Thanks for pointing me in the correct direction.
Cheers
Joel
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide