Those are the correct ports, but anyone behind a nat device will fail. You'll want to open UDP/4500 and TCP/10000 for future users and troubleshooting.  I would look at possible sysopt commands to force ACL review, but if u enable at dynamic map the firewall starts listening for IKE connections from anywhere.  Another option is individual tunnel-groups for each static IP. 
Probably the best option is to educate your manager. 
Sent from handheld 
On Dec 13, 2010, at 3:49 AM, karim jamali <karim.jamali_at_gmail.com> wrote:
> Dear Mahmoud,
> 
> IPSec is a suite of protocols and not a single port. I believe deny ISAKMP
> (UDP Port 500) you can as well deny ESP (IP Protocol 50) or AH (IP Protocol
> 51) depending on which one you use. If you deny ISAKMP alone I guess it
> should do the job.
> 
> Best Regards,
> On Mon, Dec 13, 2010 at 11:35 AM, Mahmoud Nossair <mahmoud.nossair_at_gmail.com
>> wrote:
> 
>> The ISAKMP  port that will allowed on the firewall is UDP 500, am I
>> right??? But what is the IPsec port.
>> 
>> 
>> 
>> * *
>> 
>> *Best Regards, *
>> 
>> * *
>> 
>> ==============================
>> 
>> *Mahmoud Nossair***
>> 
>> 
>> 
>> 
>> 
>> *From:* Shaughn Smith [mailto:maniac.smg_at_gmail.com]
>> *Sent:* Monday, December 13, 2010 11:23 AM
>> *To:* Mahmoud Nossair
>> *Cc:* karim jamali; Cisco certification
>> 
>> *Subject:* Re: ASA Easy VPN access problem
>> 
>> 
>> 
>> A DDOS attack will happen in any event, whether you have an ACL or not. The
>> 'DOS" attack will target your outside IP address on the ASA and the ASA
> will
>> still have to process those packets ie drop them according to the ACL.
>> 
>> 
>> 
>> 
>> 
>> CCIE # 23962 (SP)
>> 
>> On Mon, Dec 13, 2010 at 10:14 AM, Mahmoud Nossair <
>> mahmoud.nossair_at_gmail.com> wrote:
>> 
>> This is my manager policy that nobody can access our site unless he have a
>> registered/static IP address , I think he afraid of DOS attack.
>> 
>> 
>> Best Regards,
>> 
>> ==============================
>> Mahmoud Nossair
>> 
>> 
>> 
>> -----Original Message-----
>> From: Shaughn Smith [mailto:maniac.smg_at_gmail.com]
>> 
>> Sent: Monday, December 13, 2010 11:09 AM
>> To: karim jamali
>> Cc: Mahmoud Nossair; Cisco certification
>> Subject: Re: ASA Easy VPN access problem
>> 
>> I am just trying to understand why you want to do that ?
>> 
>> Surely some of the remote users are going to have dynamic ip address's from
>> time to time.
>> 
>> CCIE # 23962 (SP)
>> 
>> Sent from my iPhone 4
>> 
>> On 13 Dec 2010, at 10:00 AM, karim jamali <karim.jamali_at_gmail.com> wrote:
>> 
>>> Dear Mahmoud,
>>> 
>>> Hope you are doing fine. I am sure there is a better way of implementing
>> it
>>> but a simple approach would be to put an ACL on the outside interface in
>> the
>>> incoming direction that will only allow ISAKMP/IPSec from certain peers
>>> (public ip addresses) and all other ISAKMP/IPSec traffic will be dropped.
>>> Remember to allow any incoming traffic in the ACL if needed otherwise you
>>> will fall to the "implicit deny".
>>> 
>>> I am not sure if this is the best method, but I believe this should work.
>>> 
>>> Best Regards,
>>> 
>>> On Mon, Dec 13, 2010 at 10:54 AM, Mahmoud Nossair
>> <mahmoud.nossair_at_gmail.com
>>>> wrote:
>>> 
>>>> Thanks for replying me..
>>>> 
>>>> 
>>>> 
>>>> My point is how can I allow only a certain IPs or Subnet (Public IPs) to
>> be
>>>> accepted as a remote VPN users?
>>>> 
>>>> 
>>>> 
>>>> For Example Suppose you have an Public ip "1.1.1.1"  and I have IP
>> address
>>>> "2.2.2.2", both you and I initiating  a Remote VPN access, but the ASA
>>>> firewall will grant you access while dropping me.
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> Best Regards,
>>>> 
>>>> 
>>>> 
>>>> ==============================
>>>> 
>>>> Mahmoud Nossair
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> From: Shaughn Smith [mailto:maniac.smg_at_gmail.com]
>>>> Sent: Monday, December 13, 2010 9:52 AM
>>>> To: Mahmoud Nossair
>>>> Cc: ccielab_at_groupstudy.com
>>>> Subject: Re: ASA Easy VPN access problem
>>>> 
>>>> 
>>>> 
>>>> I dont see the point. Only users who succesfully authenticate can gain
>>>> access via the VPN. What Auth method are you using, radius, tacacs+,
>> Local
>>>> etc
>>>> 
>>>> 
>>>> 
>>>> 
>>>> CCIE # 23962 (SP)
>>>> 
>>>> On Mon, Dec 13, 2010 at 8:26 AM, Mahmoud Nossair <
>>>> mahmoud.nossair_at_gmail.com>
>>>> wrote:
>>>> 
>>>> Dear Experts
>>>> 
>>>> 
>>>> 
>>>> I had configured an Easy VPN access to the Cisco ASA 5520, but the
>> problem
>>>> is anybody from the OUTSIDE can initiate a remote VPN access.
>>>> 
>>>> So how can restrict the access to only a HOST or IP subnet from the
>> OUTSIDE
>>>> interface? (i.e nobody can initiate a remote VPN access unless
>> explicitly
>>>> permitted through an access list or any method elese).
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> Best Regards,
>>>> 
>>>> 
>>>> 
>>>> ==============================
>>>> 
>>>> Mahmoud Nossair
>>>> 
>>>> CCIE network Engineer.
>>>> 
>>>> 
>>>> Blogs and organic groups at http://www.ccie.net <http://www.ccie.net/>
>>>> 
>>>> _______________________________________________________________________
>>>> Subscription information may be found at:
>>>> http://www.groupstudy.com/list/CCIELab.html
>>>> 
>>>> 
>>>> Blogs and organic groups at http://www.ccie.net
>>>> 
>>>> _______________________________________________________________________
>>>> Subscription information may be found at:
>>>> http://www.groupstudy.com/list/CCIELab.html
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>> 
>>> 
>>> --
>>> KJ
>>> 
>>> 
>>> Blogs and organic groups at http://www.ccie.net
>>> 
>>> _______________________________________________________________________
>>> Subscription information may be found at:
>>> http://www.groupstudy.com/list/CCIELab.html
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>> 
>> 
>> 
> 
> 
> 
> --
> KJ
> 
> 
> Blogs and organic groups at http://www.ccie.net
> 
> _______________________________________________________________________
> Subscription information may be found at: 
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Mon Dec 13 2010 - 14:38:26 ART
This archive was generated by hypermail 2.2.0 : Sat Jan 01 2011 - 09:37:49 ART