Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Block Access to Internet via mac?

Posted on 2008-10-31
6
Medium Priority
?
3,482 Views
Last Modified: 2009-12-23
I have an Cisco ASA 5510 firewall and I'd like to setup a rule to block Internet access to several specific machines on the network.  How can I do this using their MAC address?

Thanks in advance.
0
Comment
Question by:ARSCO
  • 3
  • 2
6 Comments
 
LVL 15

Expert Comment

by:bkepford
ID: 22853227
Just a question, Is the machines that you want to block on the same network segment as the ASA? If not it won't work. (Not sure you can do it on an ASA) but you can do it from a Cisco switch. You may be able to block it at the router that is attached to the same segment.
 
0
 

Author Comment

by:ARSCO
ID: 22853481
Actually no.  They are on a separate VLAN.  I know I can do a mac-address-table static MAC Vlan # drop on a switch.  However I don't have a cisco switch before the ASA I can do this on.
0
 
LVL 15

Accepted Solution

by:
bkepford earned 2000 total points
ID: 22853525
Once you leave the VLAN the MAC address of the offending machine is no longer apart of the packet. Is their anything on the vlan that the ASA is on that the machines you want to block would need?
Secondly just out of curiosity why don't you do a reservation on your DHCP server and then just block by IP?
0
 

Author Comment

by:ARSCO
ID: 22853698
Guess Reservation is the way I'm gonna have to do it.  I haven't worked with access-lists before.  Can you point to some place I can better understand them, or let me know what commands I will need to setup?

Thanks
0
 
LVL 15

Assisted Solution

by:bkepford
bkepford earned 2000 total points
ID: 22867336
First off you always apply the ACL inbound on the interface closest to the traffic this would be a simple acl applied to the inbound direction of your inside interface.
 Here is a link:
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/traffic.html
 
access-list INSIDE extended deny ip 10.1.1.1 255.255.255.0 any
access-list INSIDE extended permit ip any any
access-group INSIDE in interface inside
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question