06-08-2021 05:05 AM
Hello Team,
We have ASA5525, without IPS enabled, it is used mainly for anyconnect VPN.. and we are suspecting hitting of malicious traffic on VPN from outside.
How we can block this on outside interface if i know the malicious traffic source IP.
Any idea or expert advise. I don't have IPS in my environment.
Best Regards
Anil Singh
Solved! Go to Solution.
06-08-2021 06:59 AM
06-08-2021 05:09 AM - edited 06-08-2021 05:11 AM
You can use a control-plane ACL on the ASA, this will permit/deny traffic from known source destined "to" the ASA itself.
Use a normal ACL permitting/denying traffic and then define the access-group but append "control-plane" at the end.
access-group CPLANE in interface OUTSIDE control-plane
HTH
06-08-2021 05:50 AM
I am little bit bothered about this ACL..
Hope it will not impact to normal traffic or VPN traffic.. and stopped the anyconnect hack attempts.
I am looking for the config that will drop all traffic to all services on the firewalls outside interface – including all VPN / anyconnect traffic – if its in a denied object-group it will get dropped to the outside and AnyConnect.
What is your opinion on the below two solution
Can we also shun the ip’s manually to block them accessing ASA, as per below link
what about botnet traffic
Kindly advise.
Best Regards
Anil Singh
06-08-2021 06:24 AM
The control-plane ACL would block/permit traffic "to" the ASA itself, so yes it will control VPN (anyconnect) traffic, was that not your intention?
Normal traffic, which is traffic "through" the ASA, such as outbound internet acess from inside hosts will not be affected by the control-plane ACL. A normal interface or global ACL would control traffic "through" the ASA, inbound or outbound.
06-08-2021 06:34 AM
Yes.. that was my intention.. thanks for clarifying that..
Just want to understand, how shun the IP manually or botnet traffic could be used here..
Best Regard
Anil Singh
06-08-2021 06:39 AM
It's used to stop attacks before they reach the internal network infrastructure....so traffic "through" the ASA, not "to" the ASA which is a VPN. So the control-plane ACL would meet your requirements.
Another option is put an ACL inbound on the upstream router blocking the malicous IP addresses and permit all other.
06-08-2021 06:55 AM
so if by mistake, legitimate IP will be added in CPLANE ACL, then it cannot be able to established VPN tunnet via Annyconnect.. correct..
so this way we can also confirm, that our CPLANE ACL are working perfectly..
06-08-2021 06:59 AM
Yes.
06-10-2021 01:51 AM
I appreciate your response, Thanks very much!!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide