cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
104
Views
0
Helpful
2
Replies

Restricting SSL-VPN to ASA based on IP

JeffreyyM
Level 1
Level 1

Hello,

We have a Cisco ASA 5516 running 9.16(1). With the vulnerability that came out last week (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB#vp), we want to restrict Anyconnect access to the firewall based on IP-adres. There are multiple reasons why we don't upgrade the firmware to the lastest version.

I did some research and found out that it is possible to add an ACL on the control-plane. This should affect access to the ASA itself. I am not sure how to configure the ACL itself, should it be something like this:

hosts that need to be allowed are: x.x.x.x and y.y.y.y

access-list OUTSIDE_MGMT_IN extended permit tcp host x.x.x.x interface outside eq 443
access-list OUTSIDE_MGMT_IN extended permit tcp host y.y.y.y interface outside eq 443
access-list OUTSIDE_MGMT_IN extended deny tcp any interface outside eq 443
access-list OUTSIDE_MGMT_IN extended permit ip any any

And doesn't this affect the management access rules that are configured in ASDM showed down below:

JeffreyyM_0-1760350447363.png

 

1 Accepted Solution

Accepted Solutions

balaji.bandi
Hall of Fame
Hall of Fame
2 Replies 2

balaji.bandi
Hall of Fame
Hall of Fame

yes you can allow required IP to connect to Remote VPN

Below example and guide :

https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221457-configure-control-plane-access-control-p.html

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Thank you @balaji.bandi , I tested it on a spare ASA we had lying around, and it worked perfectly.