Solved

Block Access to Internet via mac?

Posted on 2008-10-31
6
3,463 Views
Last Modified: 2009-12-23
I have an Cisco ASA 5510 firewall and I'd like to setup a rule to block Internet access to several specific machines on the network.  How can I do this using their MAC address?

Thanks in advance.
0
Comment
Question by:ARSCO
  • 3
  • 2
6 Comments
 
LVL 15

Expert Comment

by:bkepford
ID: 22853227
Just a question, Is the machines that you want to block on the same network segment as the ASA? If not it won't work. (Not sure you can do it on an ASA) but you can do it from a Cisco switch. You may be able to block it at the router that is attached to the same segment.
 
0
 

Author Comment

by:ARSCO
ID: 22853481
Actually no.  They are on a separate VLAN.  I know I can do a mac-address-table static MAC Vlan # drop on a switch.  However I don't have a cisco switch before the ASA I can do this on.
0
 
LVL 15

Accepted Solution

by:
bkepford earned 500 total points
ID: 22853525
Once you leave the VLAN the MAC address of the offending machine is no longer apart of the packet. Is their anything on the vlan that the ASA is on that the machines you want to block would need?
Secondly just out of curiosity why don't you do a reservation on your DHCP server and then just block by IP?
0
 

Author Comment

by:ARSCO
ID: 22853698
Guess Reservation is the way I'm gonna have to do it.  I haven't worked with access-lists before.  Can you point to some place I can better understand them, or let me know what commands I will need to setup?

Thanks
0
 
LVL 15

Assisted Solution

by:bkepford
bkepford earned 500 total points
ID: 22867336
First off you always apply the ACL inbound on the interface closest to the traffic this would be a simple acl applied to the inbound direction of your inside interface.
 Here is a link:
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/traffic.html
 
access-list INSIDE extended deny ip 10.1.1.1 255.255.255.0 any
access-list INSIDE extended permit ip any any
access-group INSIDE in interface inside
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SD - WAN 2 55
NAS with google authentication 6 100
Palo Alto Networks: View Tunnel packet counts? 2 27
Cable suggestions 5 68
So, you're experiencing issues on your network and you've decided that you need to perform some tests to determine whether your cabling is good.  You're likely thinking that you may need to spend money which you probably don't have on hiring/purchas…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question