<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WEBVPN Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123196#M5399</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prem this is 5+ from me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Aug 2008 02:47:21 GMT</pubDate>
    <dc:creator>Marwan ALshawi</dc:creator>
    <dc:date>2008-08-25T02:47:21Z</dc:date>
    <item>
      <title>WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123189#M5380</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have setup SSLVPN on a Cisco 3800 to host VPN for IP Communicator (VOIP). IOS = IOS AdvanceSecurity 12.4-15(T) and Cisco Secure ACS v3.0&lt;/P&gt;&lt;P&gt;We have trialed an authentication method by using our existing TACACS+ server to host the AAA for the SSLVPN but the problem is the same user account can login to our routers using the same TACACS+. &lt;/P&gt;&lt;P&gt;Is there a way to permit SSLVPN auth for VOIP use and deny access to our routers using the same AAA server?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123189#M5380</guid>
      <dc:creator>Peter Valdes</dc:creator>
      <dc:date>2020-02-21T18:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123190#M5385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if u are giveing users a pool of IPs through the ssl vpn u can u se an ACL on the outside interface that allow only access to the voip network and deny anything els!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Aug 2008 10:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123190#M5385</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-21T10:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123191#M5388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Thanks for the reply.&lt;/P&gt;&lt;P&gt;The part has been secured. The problem is when they are not using the VPN. Normal ADSL connection and if they know the public IP Address of one router, they can VTY/SSH to it using their TACACS+ account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VTY has ACL already to only allow our internal network in. SSH is for outside use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should have included this on the first message to be more clearer.&lt;/P&gt;&lt;P&gt;Is there a setup on the TACACS+ to deny VTY/SSH use of the accounts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Aug 2008 22:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123191#M5388</guid>
      <dc:creator>Peter Valdes</dc:creator>
      <dc:date>2008-08-21T22:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123192#M5391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;in this case you need to use AUth proxy if ur router include IOS firewall feature&lt;/P&gt;&lt;P&gt;this way u can spisify whay ports are allowed and use source and distination IPs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Aug 2008 03:27:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123192#M5391</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-22T03:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123193#M5394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As your Tacacs+ is ACS, then you can make use of NAR (Network Access Restriction).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users will be prompted for username/password if device is configured for the same, but they wont be able to telnet/ssh into the Network Device. But should be able to do VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please go through what attributes are evaluated for a NAR to be applied,&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_white_paper09186a00801a8fd0.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_white_paper09186a00801a8fd0.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if it helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Aug 2008 11:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123193#M5394</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2008-08-22T11:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123194#M5397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. I will try this and let you know on the result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Aug 2008 13:02:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123194#M5397</guid>
      <dc:creator>Peter Valdes</dc:creator>
      <dc:date>2008-08-22T13:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123195#M5398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for all your help. NAR works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 02:44:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123195#M5398</guid>
      <dc:creator>Peter Valdes</dc:creator>
      <dc:date>2008-08-25T02:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: WEBVPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123196#M5399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prem this is 5+ from me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 02:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-authentication/m-p/1123196#M5399</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-25T02:47:21Z</dc:date>
    </item>
  </channel>
</rss>

