cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
525
Views
2
Helpful
8
Replies

Control-Plane ACL FP1140

oetti
Level 1
Level 1

Hi,

is there any supported way to add more than 50 entries to the Control-Plane-ACL on a FP1140 Device? It's quite anoying to add every entry one by one in the FMC and it's limited to 50 entries.

Thanks

 

8 Replies 8

balaji.bandi
Hall of Fame
Hall of Fame

May be API options need to explore, what is the code running, 7.X have more features.

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

FMC is 7.2.4, FP1140 is running 6.6.7

What are you trying to achieve with the control plane ACL?

I want to block IP-Ranges trying to brute force our VPN Access. It's working as expected for the 50 entries but there are still hundreds of ranges left, which should be blocked on our site. In the meantime i've tried "shun" to block the IPs, which also works, but only for single IPs, not for subnets. This all is really disappointing, having an enterprise product and not be able to create a simple blocklist, copy and paste this to cli and block them all.

@oetti if the control plane ACL is limited to 50 ACE, then consider configuring threat detection which automatically shuns the host that exceeds the configured thresholds, to prevent further attempts.

https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222383-configure-threat-detection-for-remote-ac.html

Note, this is not supported on all versions at present.

Sounds good, i'll try to get this up and running next. IMO the 50 entries restrictions comes from the FMC, not the ACL itselfs. Not sure, just guessing.

How about configuring the RAVPN with certificates authentication or MFA? using certificates will avoid the username and password prompt, and using MFA will ensure that only authorized users will be connected.

Marvin Rhoads
Hall of Fame
Hall of Fame

FYI version 7.7 will be released in early 2025 and will include the ability to block access using Geolocation in a service policy. Manually excluding IPs one-by-one in an ACL will be a never-ending task since the perpetrators are not using their own machines but rather whatever botnet hosts they have rented for the day.

Review Cisco Networking for a $25 gift card