05-21-2007 05:14 AM - edited 03-11-2019 03:17 AM
Hi. I'm after some advice. Is there any way to restrict the remote end of a site-to-site VPN connection to certain devices on our network? We use a Pix 515E (v7 s/w). I know how to do it for remote users connecting via Cisco client s/w but not for existing site VPNs. Thanks.
05-21-2007 05:23 AM
How are you doing it for remote access vpn's? You've got several options and they are the same as the ones for your remote access vpns.
For the lan to lan tunnels you could remove sysopt conn permit-ipsec and use interface acls to filter the traffic (will affect all ipsec traffic). You could also be very specific with your interesting traffic and nat exemption acl's to define traffic only to those devices which you wanted remote access.
05-21-2007 07:39 AM
Hi and thanks for the reply. Existing restrictions on incoming client VPN connections are achieved by creating a new VPN group, restricting that group to one IP address when they connect then limiting what that IP address can access
(e.g.
vpngroup external_support address-pool pool2
vpngroup external_support dns-server
vpngroup external_support wins-server
vpngroup external_support default-domain
vpngroup external_support idle-time 1800
vpngroup external_support password
ip local pool pool2 10.x.x.1-10.x.x.1 mask 255.255.255.255
nat (inside) 0 access-list nonat
access-list nonat permit ip host
access-list nonat permit ip host
Currently we have a number of people and companies who connect via client and site VPNs so I'm after a solution which will not affect existing connectivity. Can a similar solution to the one I already use be implemented for site vpns. Thanks.
05-21-2007 07:57 AM
Sure, you can do something like this with interesting traffic...
access-list outside_cryptomap_20 extended permit ip host
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer x.x.x.1
access-list outside_cryptomap_40 extended permit ip host
crypto map outside_map 40 match address outside_cryptomap_40
crypto map outside_map 40 set peer x.x.x.2
Another option is to implement a vpn-filter and apply it to specific tunnel group policies. This document is for remote access vpn's but it works for lan to lan group policies as well.
05-21-2007 08:03 AM
Thanks for the reply. I'll try it out over the next few weeks and let you know if I get stuck
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide