cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
13278
Views
17
Helpful
30
Replies

Cisco FTD VPN access / Geolocation block for Control Plane

Umer Khan
Level 1
Level 1

We have Cisco FTD 2110s that are managed with FMC and we are trying to figure out how to block access to our remote access VPN by IP. We already have a geolocation block for Access Control in FMC. But, are we still not able to do geo-ip-based restrictions for the control plane traffic?

30 Replies 30

@davidburke841 have you implemented the hardening recommendations described here: https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html#toc-hId-2028751869 ?

Those are available now across multiple releases.

7.7 will be adding the geolocation blocking feature for RA VPN. We currently expect it around February this year.

The best way we figured out how to remedy this was to create URL aliases for your Remote Access vpn profiles. We've worked out a pretty seamless process where we create a new alias, then change the url alias for our vpn profiles once a year by changing the Anyconnect Client Profile xml file that the clients download. We leave the old alias in place for a week or two, and then delete it. We're changing the URL just to make sure old employees or vendors aren't able to try to get in if they don't have the URL, so it works pretty good. 

We had the same problem as you and it was taking a lot of manpower to stay ahead of password sprays, so this was the next best thing since we didn't want to put another firewall in line. 

Edit: Also, we changed the RA port from 443 to a new one. So our alias looks something like https://remoteaccess.somedomain.com:5593/random30CharacterString
Once that url is in the xml file and users authenticate once, the client will point to the new url for all subsequent connections. 

davidburke841
Level 1
Level 1

@Rob Ingram Thanks Rob!  Looks like I need to do a .X upgrade to get this feature.  I noticed that 7.6 wasn't recommended yet so I assumed 7.7 was a ways out.  

Remember though, Shunning isn't necessarily a permanent block. Do a bit of reading on shunning first before you decide to do an upgrade from the recommended ftd version.

We're not supposed to talk about fight club, but I might be able to confirm geo fencing for VPN access in 7.7 is cool. I might also be able to confirm that this version is hypothetically legit in a number of other areas.

Hello,

Do you know a bit more in detail how Geo Fencing will work in 7.7?

If we have a single Public IP (single FQDN) with 3 x Group Policies (UserGroup), let say for Admin, Users, Partners.

Is it possible to apply Geo Fencing to a specific UserGroup?

Thank you!

The 7.7+ feature uses a "service access object". Those can include networks and geolocations. (They are the same geolocation selection types you can apply to an ACP rule today.) The service access object is then applied per connection profile (aka tunnel-group).  They are NOT applied per group policy.

So depending on how you have chosen to implement your group policies, you may or may nor be able to use differentiated service access objects. Some organizations associate group policies with unique tunnel groups. In that case - yes, you can have unique geolocation policies. Others use a single connection profile and dynamically assign group policy via RADIUS. That would use only one common geolocation policy.

Thank you @Marvin Rhoads, those details are much appreciated.
Your saying makes sense, I have no further question marks and I can plan a target VPN design accordingly.
Thanks again!

sameertsm
Level 1
Level 1

Hi Umer,

I was trying to use (ver 7.4.2) Geolocation object to block certain Countries, but so far its not working for us when used in an ACL (Outside to Any). Could you share how you managed to make it work please?

@sameertsm prior to version 7.7 you could only use IP addresses in a control plane ACL - NOT Geolocations.

Control Plane ACL configuration is covered in detail here: https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221457-configure-control-plane-access-control-p.html

Cheers Marvin, we've been looking into flex config already but it seems a bit cumbersome as you have to find and add IPs compared to how easy its on other platforms. But as you have pointed out, its the only option until we are on 7.7. 

Chess Norris
Level 4
Level 4

 

I upgraded my lab 1010 to 7.7 just to test this, but I thought it was a bit of hit & miss. It worked sometimes but other times not, even though I used the same source IP.

I also couldn’t find those blocked events in FMC under connection events. i Instead I needed to search the syslog for this.

geoblocking.jpg

Anyway, here's a guide that explain how to configure this. It was quite straight forward.

https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222810-configure-geolocation-based-policies-for.html 

/Chess

@Chess Norris you will not see it in Unified Events - that's currently by design. I did suggest during beta testing that Cisco add it there but it did not get integrated into the release software.

You can see it in the FMC GUI under Devices > Troubleshoot > Troubleshooting Logs.

cflax
Level 1
Level 1

@Marvin Rhoads Is 7.7 not supported for FTD 2110? They can only go upto v7.4.2

Review Cisco Networking for a $25 gift card