Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Block Access to Internet via mac?

Posted on 2008-10-31
6
3,466 Views
Last Modified: 2009-12-23
I have an Cisco ASA 5510 firewall and I'd like to setup a rule to block Internet access to several specific machines on the network.  How can I do this using their MAC address?

Thanks in advance.
0
Comment
Question by:ARSCO
  • 3
  • 2
6 Comments
 
LVL 15

Expert Comment

by:bkepford
ID: 22853227
Just a question, Is the machines that you want to block on the same network segment as the ASA? If not it won't work. (Not sure you can do it on an ASA) but you can do it from a Cisco switch. You may be able to block it at the router that is attached to the same segment.
 
0
 

Author Comment

by:ARSCO
ID: 22853481
Actually no.  They are on a separate VLAN.  I know I can do a mac-address-table static MAC Vlan # drop on a switch.  However I don't have a cisco switch before the ASA I can do this on.
0
 
LVL 15

Accepted Solution

by:
bkepford earned 500 total points
ID: 22853525
Once you leave the VLAN the MAC address of the offending machine is no longer apart of the packet. Is their anything on the vlan that the ASA is on that the machines you want to block would need?
Secondly just out of curiosity why don't you do a reservation on your DHCP server and then just block by IP?
0
 

Author Comment

by:ARSCO
ID: 22853698
Guess Reservation is the way I'm gonna have to do it.  I haven't worked with access-lists before.  Can you point to some place I can better understand them, or let me know what commands I will need to setup?

Thanks
0
 
LVL 15

Assisted Solution

by:bkepford
bkepford earned 500 total points
ID: 22867336
First off you always apply the ACL inbound on the interface closest to the traffic this would be a simple acl applied to the inbound direction of your inside interface.
 Here is a link:
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/traffic.html
 
access-list INSIDE extended deny ip 10.1.1.1 255.255.255.0 any
access-list INSIDE extended permit ip any any
access-group INSIDE in interface inside
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
forward schedule of change 1 64
Website Issue 10 83
How to take over, control, & secure a network 9 92
Draytek (Site to Site VPN using IPSec) 6 39
Transparency shows that a company is the kind of business that it wants people to think it is.
#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question