EddieVenus
Technical User
Is there a way that I can put another access list on my VPN useage? What I am looking for is to have my crypto map acl fairly straight forward, just a one liner, permit ip local.network remote.network. Primarily because I have to keep some tunnels going to non cisco devices that do not like multiline ACLs.
But then I want to control access to all my devices protected by the PIX with another global ACL. The PIX does not do ACL's in both directions on an interface as far as I can tell, like a router does. Since that would solve my problem I think. So I am looking for way to enact multiple access lists. One that goes with the crypto map, then another that is global to all VPNs, or all incoming traffic for that matter.
Obviously putting an access-list on the outside interface would not (and does not) do this as the VPN sidesteps this ACL. What I need is an access-list on the inside interface, facing the PIX. Something that would stop all traffic trying to go out the inside interface to the LAN. I cannot find where to put that. If you know, please share that info with me, as it is driving me nuts.
I appreciate your thoughts on this.
Eddie Venus
p.s. It is a simple thing I am trying to do, just limit access to only known IPs. There is a 501 10 user device that gets hit with licensing problems whenever someone trys to ping the whole subnet. I can stop the replies with an ACL on the inside interface, but it does not stop the echo-requests from getting to the network in the first place.
But then I want to control access to all my devices protected by the PIX with another global ACL. The PIX does not do ACL's in both directions on an interface as far as I can tell, like a router does. Since that would solve my problem I think. So I am looking for way to enact multiple access lists. One that goes with the crypto map, then another that is global to all VPNs, or all incoming traffic for that matter.
Obviously putting an access-list on the outside interface would not (and does not) do this as the VPN sidesteps this ACL. What I need is an access-list on the inside interface, facing the PIX. Something that would stop all traffic trying to go out the inside interface to the LAN. I cannot find where to put that. If you know, please share that info with me, as it is driving me nuts.
I appreciate your thoughts on this.
Eddie Venus
p.s. It is a simple thing I am trying to do, just limit access to only known IPs. There is a 501 10 user device that gets hit with licensing problems whenever someone trys to ping the whole subnet. I can stop the replies with an ACL on the inside interface, but it does not stop the echo-requests from getting to the network in the first place.