Hi all
Just wondered what everyones opinion on not including sysopt connection permit-ipsec and setting up rules on the outside interface.
Is it not a security risk to have these rules on the outside interface? ie could someone spoof the address assigned for VPN to send packets to a services that should only be available to VPN users?
e.g.
access-list outside permit tcp 192.168.100.0 255.255.255.0 host 192.168.0.1 eq 80
no sysopt connection permit-ipsec
Would this allow an attacker to spoof a source address of 192.168.100.x and send packets to 192.168.0.1 port 80? Sure he won't get a reply but maybe he takes pot luck on exploiting a vulnerability to inject some code and depending on the hosts TCP implementation it would be possible?
I would be interested to know if this is possible?
Thanks