1-48
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Group Policies
Note
The ipv6-vpn-filter command was deprecated starting with ASA 9.0. The 'vpn-filter' CLI
should be used to configure unified filter with both IPv4 and IPv6 entries. This IPv6 filter
will only be used if there are no IPv6 entries in the access-list specified by 'vpn-filter'
Note
You can also configure this attribute in username mode, in which case the value configured
under username supersedes the group-policy value.
hostname(config-group-policy)#
vpn-filter
{
value
ACL name
|
none
}
hostname(config-group-policy)#
You configure ACLs to permit or deny various types of traffic for this group policy. You then enter
the
vpn-filter
command to apply those ACLs.
To remove the ACL, including a null value created by entering the
vpn
-
filter none
command, enter
the
no
form of this command. The
no
option allows inheritance of a value from another group policy.
A group policy can inherit this value from another group policy. To prevent inheriting a value, enter
the
none
keyword instead of specifying an ACL name. The
none
keyword indicates that there is no
access list and sets a null value, thereby disallowing an access list.
The following example shows how to set a filter that invokes an access list named acl_vpn for the
group policy named FirstGroup:
hostname(config)#
group-policy FirstGroup attributes
hostname(config-group-policy)#
vpn-filter acl_vpn
hostname(config-group-policy)#
A
vpn-filter
command is applied to post-decrypted traffic after it exits a tunnel and pre-encrypted traffic
before it enters a tunnel. An ACL that is used for a vpn-filter should NOT also be used for an interface
access-group. When a
vpn-filter
command is applied to a group policy that governs Remote Access VPN
client connections, the ACL should be configured with the client assigned IP addresses in the
src_ip
position of the ACL and the local network in the
dest_ip
position of the ACL.
When a
vpn-filter
command is applied to a group-policy that governs a LAN to LAN VPN connection,
the ACL should be configured with the remote network in the
src_ip
position of the ACL and the local
network in the
dest_ip
position of the ACL.
Caution should be used when constructing the ACLs for use with the vpn-filter feature. The ACLs are
constructed with the post-decrypted traffic in mind. However, ACLs are also applied to the traffic in the
opposite direction. For this pre-encrypted traffic that is destined for the tunnel, the ACLs are constructed
with the
src_ip
and
dest_ip
positions swapped.
In the following example, the vpn-filter is used with a Remote Access VPN client.
This example assumes that the client assigned IP address is 10.10.10.1/24 and the local network is
192.168.1.0/24.
The following ACE will allow the Remote Access VPN client to telnet to the local network:
hostname(config-group-policy)#
access-list vpnfilt-ra permit 10.10.10.1 255.255.255.255
192.168.1.0 255.255.255.0 eq 23
The following ACE will allow the local network to telnet to the Remote Access client:
hostname(config-group-policy)#
access-list vpnfilt-ra permit 10.10.10.1 255.255.255.255 eq
23 192.168.1.0 255.255.255.0
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......