Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Securing VPN Clients without using sysopt connection permit-ipsec ?

Status
Not open for further replies.

nicolel007

Technical User
Feb 4, 2005
3
0
0
GB
Hello,

I would like to control exaclty what remote vpn clients have access to on the internal network. With this in mind, I disabled the 'sysopt connection permit-ipsec' command.

I have defined my VPN group and IP pool etc, but I'm not sure how to control remote users, taking into account they will also becomming from random ISP assigned ip addresses.

Can someone shed some light on this ?

thanks,
 
Create an access list to permit TCP port 500 and protocols 50 and 51 in from the addresses or subnets.
 
Hi,

When you say 'from the addresses or subnets', these will be random ISP assigned addresses as users could be dialing in from anywhere !
 
Then use the sysopt statement; it's the easiest way to allow the world to make ipsec connections to your Pix.

As I looked at your post again, I see that you want to restrict what they can access. As I recall, you can use an ACL using the address pool as the source addresses. We don't, but I recall looking into that a couple of years ago.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top