cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3471
Views
0
Helpful
39
Replies

Using access rules to block certain VPN traffic help

whiteford
Level 1
Level 1

Hi, not sure how this works, but I have a site-to-site VPN coming into my ASA. The remote office router is a DSL 877 router. And the SA for the IPsec is 172.19.15.0 to any at the HQ where the ASA is.

It has to be any as the internet goes through the tunnel to be monitored by websense/surfcontrol web filter. Anyway I need to use the ASA to block traffic for this VPN (172.19.15.0) network so it can't go to all servers on the HQ's network. Normally I could just configure the SA for the tunnel to include only the subnets/servers that are needed but having the internet pass over means I have to use "any", am I right?

I have tried adding some deny rules to stop the traffic but the rules don't work, so I was wondering if the deny rules should be applied to the to the inside interface or outside interface?

39 Replies 39

To answer your first question "what is this GRe VPN" this is Traffic encapsulated inside a GRE IP tunnel from one point to another point inside your network. The GRE tunnel traffic is then encrypted into a VPN tunnel by the edge Firewall/VPN devices. Primarly they are used to encapsulate multicast traffic (dynamic routing protocol) over a VPN - as VPN/IPSEC cannot encrypt/decrypt multicast traffic.

There is no simple solution to a simple network - as no 2 networks are the same, or have the same functional requirements.

The answer to your second question "What is this URL filtering option with Websense" It fileters on the URL - based on rules you define on who/what/when is allowed to access specific URLs/Content based on your companies IT/Security policy.

That's cool.

HTH.

The URL sounds useful, all I need to do is filter these VPN's web activity. I guess this could solve the issue.

If I didn't have to filter any web activity then I would of had this all sorted ages ago.

Well the 87x can perform URL filetering, all you need to do is configure it, the router passes on the requested URL to the websense server, and as I said based on rules - either instructs the router to allow the URL or deny!

You need to have the relevant IOS - "Software Advanced IP Services Feature Set" I belive...

Problem solved!

That look so good, I'm going to upgrade to Websense. From that documents I think I can tellthe remote 877 to look up the websense sever for web filtering evern if the seerver is at the other end of the VPN (like my scenario) - am I croorect Andrew?

Yes - the 877 only needs to know how to "route" to the websense server, from the local routing table. And of course - the server needs to know how to get back to the 877 - once you have that, URL filtering should be working....as long as you have your filter rules in websense configured correctly of course!! ;o)

HTH.

Sounds like the "model" solution Cisco are trying to use as it's built into the IOS too.

Looks like I could have a problem with the Cisco VPN Client though, I betthis doesn have the option.

Actually there could be a fix, as the ASA is checking for URL's, since the traffic must be decrypted, and still pass-thu the ASA, you could use the below, as this has a high probability of working in your example:-

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00805734ae.shtml

HTH.

Very Interesting.

When I use the Cisco VPN Client all my traffic is forced over to the ASA, then inside for the LAN or straight back out if the Internet, so if you are right and I have the URL option for websense enabled then if should be picked up?

Yep