How to deny TCP traffic by IP Address on ASA 5510

I'm trying to hunt down a device on my network with an IP address of 192.168.1.75, not showing up in DHCP leases. The method I want to use in finding out what it is / who it belongs to is to deny all traffic to it at the firewall level, in hopes someone will speak up.  Is there a command that can do this?
LVL 3
djhathAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

urgollCommented:
If you have managed switched, it might be easier to figure out its MAC address (using ping for example) once you have identified its subnet. Then query your switch to see where it hears that specific MAC address from. Once you have the port, it shouldn't be too difficult to get to the device.

That said, the way to block traffic is to create an access list and apply it to an interface. Suppose you have a firewall with two interfaces: inside and outside; support the offending device is on the inside. You could something like the snippet; it prevents the offending address from going outside (Internet, presumably), while allowing all other addresses. the acl_out prevents any incoming connections to it. There's no 'permit ip any any' on the acl_out access-list, as it would effectively open the firewall to all traffic.

IMPORTANT NOTE: do NOT copy paste the stuff below, what your access-lists should be depend on your topology, security policies and services you need to allow through.  The approach above (using managed switches) is much more preferable and doesn't depend on someone speaking up.

Good luck,
Christophe


access-list acl_in extended deny ip host 192.168.1.75 any
access-list acl_in extended permit  ip any any
access-group acl_in in interface inside
 
access-list acl_out deny ip host 192.168.1.75 any
...
access-group acl_out in interface outside

Open in new window

0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
djhathAuthor Commented:
Thank you for your detailed explanation.

I identified the MAC address of the offending IP by ARP cache.  Moreover, I attempted to identify the MAC address by listing the address table on my Enterasys switching stack and there are no matching ones.  It could be a wireless device, I suppose.  

I believe I'm going to attempt the ACL on the firewall.
0
lrmooreCommented:
Solarwinds Engineers toolset has a neat tool called switchport mapper. Download the free 30 day trial and run the application. It will compare the mac-address table with the arp cache of gateway router, use wins, netbios, dns lookups, use manufacturer table to tell you the brand of NIC. All of this together in a nice table for each port on the switch. It might help you.
http://www.solarwinds.com
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.