I have an ASA5510 running 8.2.1 code for site-2-site VPN.
I want to establish VPN between this ASA5510 and a remote peer which is a Cisco 1841 which has an external IP address of 188.8.131.52
I would like to be to allow ONLY IP address 184.108.40.206 to establish VPN peer with the ASA 5510. Any other IP address will not be
on the ASA I allow this (a.b.c.d) is the outside address of the ASA 5510:
no sysopt connection permit-vpn
crypto isakmp identity address
crypto isakmp enable outside
access-list outside_acl permit udp host 220.127.116.11 host a.b.c.d eq 500 log
access-list outside_acl permit udp host 18.104.22.168 host a.b.c.d eq 4500 log
access-list outside_acl permit esp host 22.214.171.124 host a.b.c.d log
access-list outside_acl deny udp any any eq 500 log
access-list outside_acl deny udp any any eq 4500 log
access-list outside_acl deny esp any any log
access-list outside_acl permit ip any any log
access-group outside_acl in interface outside
With this ACL on the outside interface, it seems like hosts other than 126.96.36.199 can also initiate VPN with my ASA5510.
Is it possible to stop other hosts besides 188.8.131.52 from initiating site-2-site VPN with my ASA 5510? Thanks in advance.