Re: [OSL | CCIE_Security] NAC - eou bypass

2012-05-02 Thread Kingsley Charles
The redirect acl should permit as following: ip access-list extended redirect-acl Permit tcp any host 1.1.1.1 eq 80 With regards Kings On Wed, May 2, 2012 at 2:42 AM, Imre Oszkar oszk...@gmail.com wrote: Hi Kings, Based on your e-mail this is what I understood. Is this correct? 1.

Re: [OSL | CCIE_Security] AnyConnect per group ACLs

2012-05-02 Thread Kingsley Charles
Is 10.X.X.0/24 outside network? The format for vpn filter is always access-list name permit outside IP outside port inside IP inside port irrespective of whatever is the direction of traffic (inbound/outbound). Is this what you said? With regards Kings On Wed, May 2, 2012 at 7:21 AM, Fawad

Re: [OSL | CCIE_Security] AnyConnect per group ACLs

2012-05-02 Thread Fawad Khan
Not the outside network specifically, by remote I mean ip address from the VPN pool (which is from perspective outside of the network but another perspective it's now part of the network after connecting to VPN. On Wednesday, May 2, 2012, Kingsley Charles wrote: Is 10.X.X.0/24 outside

Re: [OSL | CCIE_Security] AnyConnect per group ACLs

2012-05-02 Thread Kingsley Charles
ASA VPN filter is tricky, but one think to remember is that is directional. permit tcp any host 10.20.30.40 eq 23 Now this ACL will permit outside user to connect to 10.20.30.40@23(inbound/post decrypt) and at the same time allow 10.20.30.40@23(outbound/pre-encrypt) to any one outside. Have

Re: [OSL | CCIE_Security] AnyConnect per group ACLs

2012-05-02 Thread Fawad Khan
There are two ways to handle that situation which You mentioned. 1. An outbound acl on the inside/DMz interface. So that inside hosts cannot initiate the traffic because of the unnecessary hole created by acl. 2. This one is not very restrictive but still better than something I.e instead of

Re: [OSL | CCIE_Security] AnyConnect per group ACLs

2012-05-02 Thread Kingsley Charles
Are you talking about GETVPN? With regards Kings On Wed, May 2, 2012 at 6:18 PM, Fawad Khan fawa...@gmail.com wrote: There are two ways to handle that situation which You mentioned. 1. An outbound acl on the inside/DMz interface. So that inside hosts cannot initiate the traffic because of

[OSL | CCIE_Security] FPM to restrict vty access

2012-05-02 Thread Kingsley Charles
Hi all The task asks to allow ssh only from 4.8.6.0/24 and the restriction is that we should not use access-lists. So FPM is the only answer. In the following config, class-map get's matched and 4.8.6.0/24 is allowed in. The issue is that I need a wildcard class-map to block other ssh

[OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions

2012-05-02 Thread Matt Manire
Guys, I am trying to work through the practice VPN lab “4.8 Easy VPN with External Group Authorization and XAUTH.” In regards to performing external authentication, where can I find a list/documentation for the RADIUS attributes to add to the [009\001] cisco-av-pair box under Group

Re: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions

2012-05-02 Thread Mike Rojas
Matt, You can find the most regular ones here: http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800949ba.shtml Make sure you have cisco-av-pair enabled with these attributes: ipsec:key-exchange=ike

Re: [OSL | CCIE_Security] FPM to restrict vty access

2012-05-02 Thread Eugene Pefti
According to Cisco FPM can not be applied to a control-plane. http://www.cisco.com/en/US/docs/ios/12_4t/12_4t4/ht_fpm.html Restrictions for Flexible Packet Matching snip *Mapping of FPM policies to control-plane is not supported. From: ccie_security-boun...@onlinestudylist.com

Re: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions

2012-05-02 Thread Eugene Pefti
Take a look at this document, Matt. http://www.cisco.com/en/US/partner/tech/tk583/tk372/technologies_configuration_example09186a00800949ba.shtml I have never found any place in Cisco documentation where they would provide a full list of Cisco VSA for IPSec. Eugene From:

Re: [OSL | CCIE_Security] FPM to restrict vty access

2012-05-02 Thread Eugene Pefti
Just an observation and comment on Cisco documentation with regard to FPM configuration. Would it be acceptable NOT to match on ETHER type under the stack type class-map if we filter only IP and TCP traffic ? I saw the majority of examples in Cisco documentation starting with match field ip

Re: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions

2012-05-02 Thread Matt Manire
Thanks Mike. Do you know of any documentation that lists out all of the optional attributes? Thanks, *Matt Manire* *CCSP, CCNP, CCDP, MCSE* *2003 MCSE 2000* *Information Systems Security Manager* mman...@firstrate.com *t*: 817.525.1863 *f*: 817.525.1903 *m*: 817.271.9165 *First Rate* |

Re: [OSL | CCIE_Security] FPM to restrict vty access

2012-05-02 Thread Kingsley Charles
It's r choice, unless the task is specific. With regards Kings On Thu, May 3, 2012 at 1:33 AM, Eugene Pefti eug...@koiossystems.comwrote: Just an observation and comment on Cisco documentation with regard to FPM configuration. Would it be acceptable NOT to match on ETHER type under the

Re: [OSL | CCIE_Security] FPM to restrict vty access

2012-05-02 Thread Kingsley Charles
That should be CPPr not CoPP. It can be applied to CoPP. If you disable cef, you can see that only CPPr features get's disabled. With regards Kings On Thu, May 3, 2012 at 1:10 AM, Eugene Pefti eug...@koiossystems.comwrote: According to Cisco FPM can not be applied to a control-plane. **

Re: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions

2012-05-02 Thread Eugene Pefti
Interesting, It never occurred to me that I access that page as a partner as my browser cached my Cisco CCO credentials. It raises a legitimate question how can CCIE candidates get access to Cisco documentation without a partner status? Eugene From: Matt Manire [mailto:mman...@firstrate.com]

Re: [OSL | CCIE_Security] FPM to restrict vty access

2012-05-02 Thread Eugene Pefti
I'm confused, Kings, For me CPPr and CoPP is still control-plane. Why would I need to disable CEF if FPM is implemented purely in CEF ? Eugene From: Kingsley Charles [mailto:kingsley.char...@gmail.com] Sent: 02 May 2012 13:16 To: Eugene Pefti Cc: ccie_security@onlinestudylist.com Subject: Re:

Re: [OSL | CCIE_Security] FPM to restrict vty access

2012-05-02 Thread Fawad Khan
I think copp or coppr would do the job and not fpm. On Wednesday, May 2, 2012, Kingsley Charles wrote: Hi all The task asks to allow ssh only from 4.8.6.0/24 and the restriction is that we should not use access-lists. So FPM is the only answer. In the following config, class-map get's

Re: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions

2012-05-02 Thread Mike Rojas
Eugene and all of the ones that have doubts about it: This is the non partner document (which is the same I posted before to Matt) http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800949ba.shtml If you follow the path on the Left, you will get there from

Re: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions

2012-05-02 Thread Fawad Khan
Is this what you guys are looking for ? R4#show aaa attributes protocol radius AAA ATTRIBUTE LIST: Type=1 Name=disc-cause-ext Format=Enum Protocol:RADIUS Unknown Type=195 Name=Ascend-Disconnect-Cau Format=Enum Cisco VSA Type=1