Avatar of scottman29
scottman29
 asked on

Access-lists VPN

I have a vpn group all set up, and it allows full access from the vpn client to my internal network.  I now want to limit the access to internal resources for this VPN.

The VPN group is called PMVPN and there is a rule in access list 101:
access-list 101 permit tcp 172.19.2.0 255.255.255.0 interface inside log

I've created a second access list called vpn2 that sets the limits to where I want the clients to go on my internal network.

How do I create the access group for PMVPN to use the vpn2 access group, and do I need to get rid of the rule in list 101 or change it?

Thanks!
Scott
CiscoVPN

Avatar of undefined
Last Comment
clearacid

8/22/2022 - Mon
arnold

Are you authenticating users using local database or via radius?  
If via radius, you could use cisco-av pairs to limit access to resources based on group membership of the authenticating user.

If you are using local database, you would need to create an alternate access list in which you define what resources/ips individuals connected through this VPN are allowed.

Not sure whether you have to detach the group-access prior to altering the access list. But to be safe, it is better to remove the rule from being used, alter it and then reenable it.

While it might be convenient to use the same rule in different places, setting up individual access list for different items might be better in the long run.
scottman29

ASKER
I already created the alternate access list... it's vpn2...  now I just need to know how do I attach it to the range of ip addresses...
clearacid

ip local pool VPNPOOL 192.168.100.1-192.168.100.99 mask 255.255.255.0 <---- Configure VPN Pool

tunnel-group PMVPN general-attributes
 address-pool VPNPOOL
 dns-server value <ip address of our internal DNS server> (optional)
 wins-server value <ip address of your internal WINS server> (optional)

Your VPN DHCP IP POOL network should be different from your LAN.  This will avoid later unexpected problems - also provides a little more layer of control.
Experts Exchange is like having an extremely knowledgeable team sitting and waiting for your call. Couldn't do my job half as well as I do without it!
James Murphy
scottman29

ASKER
clearacid,

the group is already set up, I meant to say how do I attach an access list to it.  You can have multiple access lists for the pix, but can only attach one to the interface for the external port.  So can you attach an access list to a vpn group?

Thanks!
clearacid

If you assigned the VPN Pool a different ip range from the inside network - you can apply the ACL to your inside_access_in ACL.

Say - your VPN pool is 10.10.10.0/24 and only want to allow smb xfers via tcp 445.

You create an ACL like:

access-list inside_access_in exten permit tcp 10.10.10.0/24 eq 445

Everything else would be blocked.
scottman29

ASKER
Clear acid, this would be in addtion to the internal access list I already have right?  I'm adding it to that list?

⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
ASKER CERTIFIED SOLUTION
clearacid

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.