11-18-2013 08:02 AM - edited 02-21-2020 07:19 PM
Is it possible on Cisco ASA 55xx to restrict (to filter) certain public IP addresses which would be THE ONLY addresses able to establish Remote Access IPSec VPN using Cisco VPN client? Let's assume that Cisco VPN client establishes VPN connection from fix public IP address (always the same).
So, I am not talking about ACL actions on VPN traffic. I'm asking about establishing IPSec tunnel and preventing some public IPs of even trying that.
Thanks.
Solved! Go to Solution.
11-18-2013 10:30 AM
Hi Ivan,
You may use control-plane access-list to filter the VPN connections to the ASA by blocking UDP 500.
For example:
ciscoasa(config)# access-list FILTER-VPN deny udp host
ciscoasa(config)# access-list FILTER-VPN permit ip any any
ciscoasa(config)# access-group FILTER-VPN in interface outside control-plane
Regards.
----
Mashal Shboul
-------
Edit: Didn't see Marcins' reply
Message was edited by: Mashal Alshboul
11-18-2013 10:24 AM
bsns-asa5505-19(config)# access-group IN in interface outside ?
configure mode commands/options:
control-plane Specify if rule is for to-the-box traffic
For example from:
http://blog.ipexpert.com/2011/01/05/asa-control-plane-access-list/
I'm not saying it's a smart thing to do, but it's a possibilty...
11-18-2013 10:30 AM
Hi Ivan,
You may use control-plane access-list to filter the VPN connections to the ASA by blocking UDP 500.
For example:
ciscoasa(config)# access-list FILTER-VPN deny udp host
ciscoasa(config)# access-list FILTER-VPN permit ip any any
ciscoasa(config)# access-group FILTER-VPN in interface outside control-plane
Regards.
----
Mashal Shboul
-------
Edit: Didn't see Marcins' reply
Message was edited by: Mashal Alshboul
11-19-2013 04:55 AM
Hi,
thanks for the answer. That will do just fine.
If I put ssh 0 0 outside the mgmt traffic will still be able to hit outside interface even it is not permited in FILTER-VPN cp acl, right? I read that it takes precedence over cp acl.
Regards
11-19-2013 05:04 AM
Hi Ivan,
Yes, the "ssh 0 0 outside" overrides the control-plane ACL and allows the SSH connections to the ASA.
Actually this statement creates the following implicit ACL to permit the SSH traffic:
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x732d57e8, priority=121, domain=permit, deny=false
hits=1, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=22, dscp=0x0
input_ifc=outside, output_ifc=identity
Hope this helps
---
Mashal Shboul
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide