- Posts: 783
- Thank you received: 0
Security Policies ASA 5505
- skepticals
- Offline
- Elite Member
Less
More
15 years 9 months ago #29014
by skepticals
Replied by skepticals on topic Re: Security Policies ASA 5505
I know someone else here has experience with this. Hopefully they will say something...
15 years 9 months ago #29023
by Smurf
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
Replied by Smurf on topic Re: Security Policies ASA 5505
How are you configuring this ? Through the CLI or GUI ?
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
15 years 9 months ago #29030
by timparker
Replied by timparker on topic Re: Security Policies ASA 5505
Mainly through the GUI. I have went in from time to time and done stuff through the CLI. Just curious why?
15 years 9 months ago #29034
by Smurf
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
Replied by Smurf on topic Re: Security Policies ASA 5505
Was just wondering. I dont do Cisco anymore and i have never used the GUI and some of what you were describing sounded like you were using the GUI.
The basics for setting this up would be;
1. Setup the VPN access (which i beleive is working ok)
2. Setup a NoNAT policy for the DHCP Address that you have used for the VPN Clients
3. Allow access required. (Now, by default i beleive the ASA allows all VPN traffic to bypass any access-list filtering. You need to issue the following command to disable this behavour)
[code:1]no sysopt connection permit-vpn[/code:1]
unfortunately, i have never done this myself through but thats the steps i would take.
Cheers
Wayne
The basics for setting this up would be;
1. Setup the VPN access (which i beleive is working ok)
2. Setup a NoNAT policy for the DHCP Address that you have used for the VPN Clients
3. Allow access required. (Now, by default i beleive the ASA allows all VPN traffic to bypass any access-list filtering. You need to issue the following command to disable this behavour)
[code:1]no sysopt connection permit-vpn[/code:1]
unfortunately, i have never done this myself through but thats the steps i would take.
Cheers
Wayne
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
15 years 9 months ago #29041
by timparker
Replied by timparker on topic Re: Security Policies ASA 5505
thanks. I have it pretty much working now I think. Yesterday I moved our Web and mail server to the DMZ interface that I set up. Now I am looking at the NAT and Access that is needed for everyone.
trying to make sure I get it all right. Got to be careful with the unit now that I have actual traffic rolling through it.
)
trying to make sure I get it all right. Got to be careful with the unit now that I have actual traffic rolling through it.
)
15 years 9 months ago #29043
by Smurf
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
Replied by Smurf on topic Re: Security Policies ASA 5505
No worries, glad its all working. I will be getting hold of a Pix515 shortly so hopefully i will find some time to do testing in future
TTFN
Wayne
TTFN
Wayne
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
Time to create page: 0.144 seconds