Solved

Block Access to Internet via mac?

Posted on 2008-10-31
6
3,472 Views
Last Modified: 2009-12-23
I have an Cisco ASA 5510 firewall and I'd like to setup a rule to block Internet access to several specific machines on the network.  How can I do this using their MAC address?

Thanks in advance.
0
Comment
Question by:ARSCO
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 15

Expert Comment

by:bkepford
ID: 22853227
Just a question, Is the machines that you want to block on the same network segment as the ASA? If not it won't work. (Not sure you can do it on an ASA) but you can do it from a Cisco switch. You may be able to block it at the router that is attached to the same segment.
 
0
 

Author Comment

by:ARSCO
ID: 22853481
Actually no.  They are on a separate VLAN.  I know I can do a mac-address-table static MAC Vlan # drop on a switch.  However I don't have a cisco switch before the ASA I can do this on.
0
 
LVL 15

Accepted Solution

by:
bkepford earned 500 total points
ID: 22853525
Once you leave the VLAN the MAC address of the offending machine is no longer apart of the packet. Is their anything on the vlan that the ASA is on that the machines you want to block would need?
Secondly just out of curiosity why don't you do a reservation on your DHCP server and then just block by IP?
0
 

Author Comment

by:ARSCO
ID: 22853698
Guess Reservation is the way I'm gonna have to do it.  I haven't worked with access-lists before.  Can you point to some place I can better understand them, or let me know what commands I will need to setup?

Thanks
0
 
LVL 15

Assisted Solution

by:bkepford
bkepford earned 500 total points
ID: 22867336
First off you always apply the ACL inbound on the interface closest to the traffic this would be a simple acl applied to the inbound direction of your inside interface.
 Here is a link:
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/traffic.html
 
access-list INSIDE extended deny ip 10.1.1.1 255.255.255.0 any
access-list INSIDE extended permit ip any any
access-group INSIDE in interface inside
0

Featured Post

Salesforce Has Never Been Easier

Improve and reinforce salesforce training & adoption using WalkMe's digital adoption platform. Start saving on costly employee training by creating fast intuitive Walk-Thrus for Salesforce. Claim your Free Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question