<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Controlling Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/controlling-access/m-p/655504#M1054399</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Transfer how? Secure copy, ftp, CIFS? There are multiple ways to transfer files and if the developers really want them, they will find a way to get them. Block the ports on the firewall or create a policy on the Concentrator to block ports will be your best bet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Feb 2007 15:00:43 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2007-02-09T15:00:43Z</dc:date>
    <item>
      <title>Controlling Access</title>
      <link>https://community.cisco.com/t5/network-security/controlling-access/m-p/655503#M1054395</link>
      <description>&lt;P&gt;Not sure if this is the right forum for this questions.  I have a vpn concentrator 3005 with it's private interface connected to a dmz interface on my pix.  The public interface to a hub hanging off my router facing the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a vlan set-up on our core switch (4507) that contains servers that are used for our application developers.  Our applications developers are able to access their servers by connecting and authenticating to our concentrator.  The are given an ip and then access to their particular servers are controlled via the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to prevent the developers from being able to transfer any data from the development server to their computer they are using to make the vpn connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the best why to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any assistance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-access/m-p/655503#M1054395</guid>
      <dc:creator>jwebber</dc:creator>
      <dc:date>2020-02-21T09:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling Access</title>
      <link>https://community.cisco.com/t5/network-security/controlling-access/m-p/655504#M1054399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Transfer how? Secure copy, ftp, CIFS? There are multiple ways to transfer files and if the developers really want them, they will find a way to get them. Block the ports on the firewall or create a policy on the Concentrator to block ports will be your best bet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2007 15:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/controlling-access/m-p/655504#M1054399</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-02-09T15:00:43Z</dc:date>
    </item>
  </channel>
</rss>

