Solved

ACL to filter ipsec traffic

Posted on 2014-04-26
3
1,263 Views
Last Modified: 2014-06-27
We have a branch office connected to our main site with an IPSEC tunnel.

Inside said office is a printer that someone at the main site won't stop printing too by accident.

How can we setup an ACL to block all traffic to the specific IP of the printer and so we can SYSLOG who is doing it?
0
Comment
Question by:PerimeterIT
3 Comments
 
LVL 6

Expert Comment

by:Hassan Besher
ID: 40024723
you can block IP you want when you define the intersting traffic that pass between the two routers e.g:

if that your normal ACL to go from Site B (10.10.10.0/24) to your HQ site (20.20.20.0/24)

R1(config)# ip access-list extended VPN-TRAFFIC
R1(config-ext-nacl)# permit ip 10.10.10.0 0.0.0.255 20.20.20.0 0.0.0.255

so let's say that your Printer IP in  HQ Site is 20.20.20.5 and you want to deny it from ip 10.10.10.5 you simply modify it to be:

R1(config)# ip access-list extended VPN-TRAFFIC
R1(config-ext-nacl)# deny ip host 10.10.10.5 host 20.20.20.5 log
R1(config-ext-nacl)# permit ip 10.10.10.0 0.0.0.255 20.20.20.0 0.0.0.255
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 250 total points
ID: 40025022
^^ These appear to be IOS Router commands?

On you ASA Locate the ACL that's mentioned in the cryptomap like so

Petes-ASA(config)# show run crypto map
crypto map outside_map 19 match address VPN-INTERESTING-TRAFFIC
crypto map outside_map 19 set pfs
crypto map outside_map 19 set peer 123.123.123.123
crypto map outside_map 19 set transform-set ESP-3DES-SHA

Then look to see what that's doing

Petes-ASA(config)# show run access-list VPN-INTERESTING-TRAFFIC
MainSite(config)# show run access-list VPN-INTERESTING-TRAFFIC
access-list VPN-INTERESTING-TRAFFIC extended permit ip object OBJ-MainSite object OBJ-RemoteSite

Pop your IP AT THE TOP i.e. if your printer is 192.168.1.100

Petes-ASA(config)# access-list VPN-INTERESTING-TRAFFIC line 1 deny ip host 192.168.1.100 192.168.2.0 255.255.255.0
0
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 250 total points
ID: 40025847
If I may add to the comment of my esteemed fellow expert Pete:

If, in your ASA, there is the following in place: no sysopt connection permit-vpn you need to use ACL's to allow traffic through the VPN.
In that case I think it would be neater to use those ACL's to block the traffic. As a matter of fact you can use an ACL on the inside interface of the ASA to block this anyway.
I even think it then has less impact because it's dropped earlier and not processed any further (Pete?)
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

This is about downgrading PIX Version 8.0(4) & ASDM 6.1(5) to PIX 7.2(4) and ASDM 5.2(4) but with only 64MB RAM and 16MB flash. Background: You have a Cisco Pix 515E which was running on PIX 7.2(4) and its supporting ASDM 5.2(4) without any i…
Have you experienced traffic destined through a Cisco ASA firewall disappears and you do not know if the traffic stops in the firewall or somewhere else? The solution is the capture feature. This feature was released in 6.2(1) and works in all firew…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now