07-31-2009 05:17 PM - edited 03-11-2019 09:01 AM
Hi All,
Please help me with how to limit traffic sourced from the ASA eg. I only want cop run tftp to work to one subnet where tftp servers lives.
Thanks, MH
08-02-2009 01:25 AM
Hi,
To my knowlege there is no feature that does this on the ASA...most of the time, traffic destined towards the ASA would be limited/restricted:
http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mgaccess.html#wp1042034
Why would you want to restrict traffic sourced from the ASA? (since it is initiated by the admin most of the time) If we understand the background of your requirement, we might be able to provide an alternative solution.
hth
08-02-2009 03:02 PM
Hi Ivarn,
I understand your logic.
I thought it might be possible to restrict like on IOS an "access-class out" can be put on a vty to limit where it can go to.
Regards, MH
08-02-2009 07:11 PM
Since the ASA is a security device it is not allowed to telnet/ssh to other systems. It can ftp/http for image downloads and send syslog, but that's about it (that I can think of off the top of my head).
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: