<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE limit vpn access by client source ip in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990249#M455359</link>
    <description>As a reference you can utilize the detailed radius live logs to determine the type of string you would need to apply in your condition. For example, you can find the calling-station-id in the detailed log under the authentication section on the left side. This will either be an IP or if using mab you will see the client mac in a hyphen-hex format of AA-AA-AA-AA-AA-AA. Not to debate with you, but there are definitely better ways of limiting vpn access via other condition types. I think the issue with using the calling station id is that remote users are probably obtaining an ip address dynamically on whatever wireless connection they have meaning that it will always change and could become an admin nightmare. Unless you know that the IP is never changing. However, keep in mind I know nothing about your setup such as whether or not it is clientless, or client vpn etc. etc. Good luck &amp;amp; HTH!</description>
    <pubDate>Wed, 27 Nov 2019 17:04:30 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2019-11-27T17:04:30Z</dc:date>
    <item>
      <title>ISE limit vpn access by client source ip</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990199#M455357</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;Is it possible to use client ip address to limit vpn access&lt;BR /&gt;i.e write authorization policy which would use Cisco-AVPair = "ip:source-ip=ip.add.re.ss"&lt;BR /&gt;or Calling-Station-ID to match against defined subnet&lt;BR /&gt;As per documentation both are of type string and i am not sure how to write these rules&lt;BR /&gt;or is it even possible&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-network-access-attributes/ta-p/3616253" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-network-access-attributes/ta-p/3616253&lt;/A&gt;&lt;BR /&gt;cisco-av-pair 1 The Cisco RADIUS implementation supports one vendor-specific option using the format recommendedin the specification. Cisco’s vendor-ID is 9, and the supported option has vendor-type 1, which is named“cisco-avpair.” The value is a string&lt;BR /&gt;Calling-Station-ID 31 string 1.0 Authentication&lt;BR /&gt;This Attribute allows the NAS to send in the Access-Request packet the phone number that the call came from, using Automatic Number Identification (ANI) or similar technology. It is only used in Access-Request packets.&lt;/P&gt;&lt;P&gt;For sure we can debate on whether this would be an optimal solution, but I'd still like to get an answer.&lt;BR /&gt;Thnx&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 16:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990199#M455357</guid>
      <dc:creator>judiljak</dc:creator>
      <dc:date>2019-11-27T16:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE limit vpn access by client source ip</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990241#M455358</link>
      <description>&lt;P&gt;I assume your VPN client is AnyConnect? It should send over the source IP as you described as an av-pair attribute.&lt;/P&gt;&lt;P&gt;I just tested this use-case in my lab and it was successful. The policy looks like this:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN-by-source-IP.png" style="width: 861px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/62326i6F58F67AFD661E87/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN-by-source-IP.png" alt="VPN-by-source-IP.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Attributes sent are:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="av-pair.png" style="width: 659px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/62327i8E98717625204D94/image-size/large?v=v2&amp;amp;px=999" role="button" title="av-pair.png" alt="av-pair.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 16:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990241#M455358</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2019-11-27T16:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE limit vpn access by client source ip</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990249#M455359</link>
      <description>As a reference you can utilize the detailed radius live logs to determine the type of string you would need to apply in your condition. For example, you can find the calling-station-id in the detailed log under the authentication section on the left side. This will either be an IP or if using mab you will see the client mac in a hyphen-hex format of AA-AA-AA-AA-AA-AA. Not to debate with you, but there are definitely better ways of limiting vpn access via other condition types. I think the issue with using the calling station id is that remote users are probably obtaining an ip address dynamically on whatever wireless connection they have meaning that it will always change and could become an admin nightmare. Unless you know that the IP is never changing. However, keep in mind I know nothing about your setup such as whether or not it is clientless, or client vpn etc. etc. Good luck &amp;amp; HTH!</description>
      <pubDate>Wed, 27 Nov 2019 17:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990249#M455359</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-11-27T17:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE limit vpn access by client source ip</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990353#M455360</link>
      <description>&lt;P&gt;Thnx, but&lt;BR /&gt;Maybe I wasn't that clear or overlooked your answer somehow&lt;BR /&gt;Anyway, ASA (vpn gatewa) is indeed sending those attributes that is not in question.&lt;BR /&gt;What's puzzling me is how can I match src ip to a known subnet say /21&lt;BR /&gt;Obviously it is impossible to write rules with all those ip addresses and use&lt;BR /&gt;EQ string operator&lt;BR /&gt;Probably one would neet to cast it to address type and somehow match if it belongs to&lt;BR /&gt;a subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 20:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990353#M455360</guid>
      <dc:creator>judiljak</dc:creator>
      <dc:date>2019-11-27T20:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE limit vpn access by client source ip</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990376#M455361</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;You can specify the subnet you want to match in an Endstation Network Condition under Policy &amp;gt; Policy Elements &amp;gt; Conditions &amp;gt; Network Conditions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've used this method in the past as a Policy condition - not sure if Endstation Network Conditions can be used as an Authorization condition.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hth&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 21:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990376#M455361</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2019-11-27T21:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE limit vpn access by client source ip</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990387#M455362</link>
      <description>&lt;P&gt;You could probably match using a RegEx in the condition. What is the subnet you are trying to match on?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 21:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-limit-vpn-access-by-client-source-ip/m-p/3990387#M455362</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2019-11-27T21:26:33Z</dc:date>
    </item>
  </channel>
</rss>

