Joe, 
That command requires outside acl's for VPN traffic.  Default interesting VPN traffic passes unfiltered. 
Sent from handheld 
On Mar 8, 2012, at 6:40 PM, "Joe Astorino" <joeastorino1982_at_gmail.com> wrote:
> I think "no sysopt connection permit-vpn" might prevent the IKE from
> terminating on the outside wothout an ACL but not sure. Even if, it
> becomes a nightmare to manage VPN that way
> 
> On 3/8/12, Ryan West <rwest_at_zyedge.com> wrote:
>> Jay,
>> 
>> It doesn't control who can attempt a tunnel, but as you mentioned the
>> sources are static that are allowed to connect.  If the peer with that
>> address/PSK/Certificate/prosposals/interesting traffic does not match, there
>> will be no connection.  That does meet the OP's original request in the
>> first sentence.  The AM requirement is where I was confused, if the peers
>> are static or known from certain addresses, why would you need to leave open
>> a dynamic or less secure method of connecting, unless the added speed of AM
>> is really that much of a concern.  Certificates are also an option.
>> 
>> -ryan
>> ________________________________________
>> From: Jay McMickle [jay.mcmickle_at_yahoo.com]
>> Sent: Thursday, March 08, 2012 5:54 PM
>> To: Ryan West
>> Cc: JB Poplawski; Christopher Copley; Cisco certification
>> Subject: Re: ASA and IPSEC VPN filtering
>> 
>> Ryan- can you explain how MM protects who can attempt a tunnel to your ASA?
>> Of course the peers are static, but how does MM mitigate the attempt? School
>> me, please!
>> 
>> Regards,
>> Jay McMickle- CCNP,CCSP,CCDP
>> Sent from iJay
>> 
>> On Mar 8, 2012, at 4:47 PM, Ryan West <rwest_at_zyedge.com> wrote:
>> 
>>> Or force your peers to main mode.  Are those extra 4 exchanges really too
>>> much?
>>> 
>>> Sent from handheld
>>> 
>>> On Mar 8, 2012, at 5:43 PM, "JB Poplawski" <jb.poplawski_at_gmail.com> wrote:
>>> 
>>>> But how do you protect the ASA that's protecting your ASA?  :>)
>>>> 
>>>> On Thu, Mar 8, 2012 at 4:33 PM, Jay McMickle <jay.mcmickle_at_yahoo.com>
>>>> wrote:
>>>> 
>>>>> We put another device in front of our ASA's for this type of control.
>>>>> The
>>>>> ACL's you apply to the ASA's don't actually inspect for IPSEC tunnels, I
>>>>> don't believe.  It's the outside interface you are trying to protect,
>>>>> and
>>>>> not traffic through the device, which makes sense why the ACL's aren't
>>>>> working. Kind of like SSH and ASDM access on the outside interface.
>>>>> 
>>>>> Hope that helps.
>>>>> 
>>>>> Regards,
>>>>> Jay McMickle- CCNP,CCSP,CCDP
>>>>> Sent from iJay
>>>>> 
>>>>> On Mar 8, 2012, at 9:49 AM, Christopher Copley <copley.chris_at_gmail.com>
>>>>> wrote:
>>>>> 
>>>>>> I have an ASA and I only want specific IP's to be able to access my ASA
>>>>> to
>>>>>> form an IPSEC peer.  I created a rule for the outside interface to only
>>>>>> allow  specific peers to be accepted via isakmp, and ESP, but the rule
>>>>>> never gets any hits.  Is the ASA like the routers and the ACL's do not
>>>>>> apply to the ASA interfaces itself?   Is it possible to filter out what
>>>>>> IP's I want the ASA to respond to via ESP and isakmp via an ACL? Long
>>>>> story
>>>>>> short I am being asked to do this b/c of aggressive mode for my VPN's.
>>>>>> 
>>>>>> Thoughts?
>>>>>> 
>>>>>> 
>>>>>> --
>>>>>> Christopher D. Copley
>>>>>> copley.chris_at_gmail.com
>>>>>> 
>>>>>> 
>>>>>> Blogs and organic groups at http://www.ccie.net
>>>>>> 
>>>>>> _______________________________________________________________________
>>>>>> Subscription information may be found at:
>>>>>> http://www.groupstudy.com/list/CCIELab.html
>>>>> 
>>>>> 
>>>>> Blogs and organic groups at http://www.ccie.net
>>>>> 
>>>>> _______________________________________________________________________
>>>>> Subscription information may be found at:
>>>>> http://www.groupstudy.com/list/CCIELab.html
>>>> 
>>>> 
>>>> Blogs and organic groups at http://www.ccie.net
>>>> 
>>>> _______________________________________________________________________
>>>> Subscription information may be found at:
>>>> http://www.groupstudy.com/list/CCIELab.html
>> 
>> 
>> Blogs and organic groups at http://www.ccie.net
>> 
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
> 
> -- 
> Sent from my mobile device
> 
> Regards,
> 
> Joe Astorino
> CCIE #24347
> http://astorinonetworks.com
> 
> "He not busy being born is busy dying" - Dylan
Blogs and organic groups at http://www.ccie.net
Received on Fri Mar 09 2012 - 01:29:39 ART
This archive was generated by hypermail 2.2.0 : Sun Apr 01 2012 - 07:56:52 ART