10-11-2009 12:47 PM - edited 03-11-2019 09:25 AM
I have L2L connection between ASA and Cisco router.
I would like to protect traffic and give full access from PIX LAN to some hosts on the cisco router sites but not inversely.
How to protect the LAN network on PIX site ?
I couldn't find anything on pix site like tcp established in ACL ?
On a cisco routers there I can easily configure some access-list in ipsec-isakmp profile ( set ip access-group in| out )
thanks in advance for any help
10-12-2009 03:41 AM
Check out the "vpn-filter" command, available in the group-policy.
10-13-2009 07:12 AM
ok I know about it but where may I controle tcp flags ?
10-13-2009 12:49 PM
You cannot control TCP flags - but why would you want to do that in the first place? Note that Pix/ASA is a stateful firewall, not a packet filter.
Re-reading your initial question, I think what you want to achieve can be done using "no sysopt connection permit-vpn" and then permitting/denying traffic in the ACL on the outside interface.
Note however that the outside ACL will apply to all inbound connections over *all* VPN tunnels.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: