I've got a PIX running 7.2(4) with its outside interface on the Internet. The only thing this PIX is doing is acting as the endpoint for an IPSEC LAN-to-LAN tunnel with an Internet-connected ASA on another network.
I'd like to filter inbound Internet traffic to this PIX so that only the designated ASA can attempt to establish an IPSEC connection -- in other words, I want to prevent any other device on the Internet from even being able to attempt to establish an IPSEC connection to the PIX. As far as I know (and have seen), this can't be done with an access-list on the outside interface, since that access-list doesn't apply to traffic to the PIX itself.
Thanks for the quick (and helpful) response. Unfortunately it looks like the control-plane option isn't available in 7.2(4). This PIX will probably be upgraded to an ASA in the next few months, but until then we're stuck -- I might be able to get the ISP to filter that traffic, but I wouldn't want to rely on that anyway.
So if anyone has an answer that will work on 7.2(4) (or can authoritatively verify that it's impossible there), that would be much appreciated. In the interim I've at least blocked ICMP to this PIX from all hosts other than the allowed peer.
(EDITED: To note that 7.2(4) actually doesn't support the control-plane option.)
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...