Acl's on the asa won't work...
I said it won't work with the isakmp policy because there are too many ip addresses people could source from!!! However, if all of one type were only connecting from one source ip, it could work.
Yes, the Fortigate has many things the asa doesn't.
From: Mahmoud Genidy [mailto:ccie.mahmoud_at_gmail.com]
Sent: Tuesday, June 12, 2012 08:47 PM
To: Joseph L. Brunner
Cc: Cisco certification <ccielab_at_groupstudy.com>
Subject: Re: ASA dial in VPN policies
Thanks Joseph
Knowing it is an option configurable with Fortigate I thought there may be an equivlent in ASA.
I couldn't undersand your point when you said it is not possible then you said it can be done using "isakmp profile match identity address"?
I thought about some alternative solution: To create a second external outside interface on the ASA and apply ACL on the internet router connected to this interface to restrict the VPN access. Another option would be to apply the ACL on the outside interface its self however I doubt it will work!
On Tue, Jun 12, 2012 at 4:12 PM, Joseph L. Brunner <joe_at_affirmedsystems.com<mailto:joe_at_affirmedsystems.com>> wrote:
Not possible... practically speaking.. people move around a lot, etc.
If you knew their ip was going to always be X - say you had some consultants that only use the vpn from a major site, etc. then it could be done with isakmp profiles matching "isakmp profile match identity address" and the like - but remember, we are architects and designers more than we are "errand boys" at our level...
Just because some business person has a vision of Acid Burn and Crash Override sitting at their Toshiba Tecra's and some neon characters going by in the background doesn't mean IT works that way...
What works for most must for all :0)
That's how I support it!
-----Original Message-----
From: nobody_at_groupstudy.com<mailto:nobody_at_groupstudy.com> [mailto:nobody_at_groupstudy.com<mailto:nobody_at_groupstudy.com>] On Behalf Of Mahmoud Genidy
Sent: Tuesday, June 12, 2012 1:51 AM
To: Cisco certification
Subject: Re: ASA dial in VPN policies
Let me rephrase the question:
How to restrict remote access VPN users based on their source (Reall) IP address in ASA firewall?
On Tue, Jun 12, 2012 at 3:17 PM, Joseph L. Brunner
<joe_at_affirmedsystems.com<mailto:joe_at_affirmedsystems.com>>wrote:
> This is done in the real world by giving out two vpn groups... not by
> tweaking little things behind the scenes for the one group...
>
> There are other things you probably need to do with your time/life
> than this...
>
> Two groups...
>
> -----Original Message-----
> From: nobody_at_groupstudy.com<mailto:nobody_at_groupstudy.com> [mailto:nobody_at_groupstudy.com<mailto:nobody_at_groupstudy.com>] On Behalf
> Of Mahmoud Genidy
> Sent: Monday, June 11, 2012 9:31 PM
> To: Cisco certification
> Subject: ASA dial in VPN policies
>
> Hi Team,
>
> Is it possible to have the ASA configured for two different dial in
> VPN access policies as follows:
>
> - - First group of remote dial in VPN users are active directory
> authenticated and restricted with private certificate
>
> - - Second group of remote dial in VPN users are active directory
> authenticated and restricted based on their source real IP address
>
>
>
> What may be the options for implementation, and would this require the
> two groups of users to dial into two different external ASA IP address?
>
>
>
> The story behind this is that the customer has implemented a Private
> Certificate as part of remote dial in VPN access authentication. They
> have some of their remote users not happy with this option as it
> restricts remote access to specific PC or Laptop where the certificate is installed.
> However they need flexibility of connecting from any PC within their
> remote small office/home where they connect through a gateway with a
> fixed Real-IP address. So for this group of users they need to
> implement another policy where they can have access restriction based
> on their source real IP address. Other users who already happy with
> the private certificate will stay the same.
>
>
>
> Cheers
>
> Mahmoud
> CCIE#23690
>
>
> Blogs and organic groups at http://www.ccie.net
>
> ______________________________________________________________________
> _ Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Wed Jun 13 2012 - 01:02:05 ART
This archive was generated by hypermail 2.2.0 : Sun Jul 01 2012 - 10:39:52 ART