<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Community Ask Me Anything - Secure Remote Working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050032#M1068025</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;Split DNS&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;- &amp;nbsp;The DNS queries which match the domain names, are configured on the Cisco Adaptive Security Appliance (ASA). They move through the tunnel (to the DNS servers that are defined on the ASA, for example) while others do not."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When you say " DNS servers that are defined on the ASA"&amp;nbsp; means the DNS server's configured on the ASA firewall or in the tunnel or group policy&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The DNS queries which match the domain names, you mean the domain name is configured on the firewall or in the group policy ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What if we have&amp;nbsp; split domain like test.local and test.com ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;test.com (it's a forward zone in the same test.local dns server (eg:192.168.1.100)&lt;BR /&gt;test.com also resolves to&amp;nbsp; private ip addresses&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is my current configuration&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 192.168.1.100&lt;BR /&gt;domain-name test.local&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 22 Mar 2020 10:30:06 GMT</pubDate>
    <dc:creator>elite2010</dc:creator>
    <dc:date>2020-03-22T10:30:06Z</dc:date>
    <item>
      <title>Community Ask Me Anything - Secure Remote Workers</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4049647#M1068012</link>
      <description>&lt;P&gt;You can ask your question on your own language:&lt;/P&gt;
&lt;TABLE class="lia-align-center" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A id="dropdownMenu1" class="dropdown-toggle" target="_blank" type="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="true"&gt;&lt;/A&gt;&lt;A title="Community Ask Me Anything: Cómo trabajar seguro de forma remota" href="https://community.cisco.com/t5/discusiones-seguridad/community-ask-me-anything-c%C3%B3mo-trabajar-seguro-de-forma-remota/td-p/4050777?utm_medium=refreal%20&amp;amp;utm_source=banner&amp;amp;utm_campaign=spAMASecureRemoteMar2020" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;Español&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A title="Comunidade Ask Me Anything- Segurança para Trabalhadores Remotos" href="https://community.cisco.com/t5/discuss%C3%B5es-seguran%C3%A7a/comunidade-ask-me-anything-seguran%C3%A7a-para-trabalhadores-remotos/m-p/4050577" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;Português&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A title="Demandez-moi N'importe Quoi - Sécurité : Travailleurs à distance sécurisés" href="https://community.cisco.com/t5/discussions-de-s%C3%A9curit%C3%A9/demandez-moi-n-importe-quoi-s%C3%A9curit%C3%A9-travailleurs-%C3%A0-distance/m-p/4050864" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="selector-title"&gt;Français&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A title="Спроси всё о безопасности для удалённых работников" href="https://bit.ly/security-ame-disc" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;Русский&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A id="dropdownMenu1" class="dropdown-toggle" target="_blank" type="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="true"&gt;&lt;/A&gt;&lt;A title="Ask Me Anything イベント: Secure Remote Workers" href="https://community.cisco.com/t5/%E4%BB%AE%E6%83%B3%E3%83%97%E3%83%A9%E3%82%A4%E3%83%99%E3%83%BC%E3%83%88-%E3%83%8D%E3%83%83%E3%83%88%E3%83%AF%E3%83%BC%E3%82%AF-vpn/ask-me-anything-%E3%82%A4%E3%83%99%E3%83%B3%E3%83%88-secure-remote-workers/td-p/4051346" target="_blank" rel="noopener"&gt;&lt;SPAN class="selector-title"&gt;日本語&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.666666666666668%"&gt;&lt;A lang="zh" title="【专家问答】思科保障远程办公安全 [复制链接]" href="http://bbs.csc-china.com.cn/forum.php?mod=viewthread&amp;amp;tid=990690" target="_self" rel="nofollow noreferrer noopener noreferrer"&gt;简体中文&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Here’s your chance to discuss&lt;/STRONG&gt;&lt;/EM&gt; Cisco Secure Remote Working technologies such as AnyConnect, ASA, FTD, Duo, and Umbrella. In this session, the experts will answer questions about emergency licenses, design, configuration, and troubleshooting. Our experts span more than 12 time zones. Also, we’ll be translating the session into multiple languages to provide you with the best experience possible.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;This forum event works well as an introduction for those who are not familiar with these security solutions and/or have recently started using them&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;STRONG&gt;To participate in this event, please use the&lt;/STRONG&gt; &lt;IMG src="https://community.cisco.com/legacyfs/online/media/reply-button.png" border="0" alt="Join the Discussion : Cisco Ask the Expert" width="75" height="27" /&gt;button below&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;to ask your questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#00CCFF"&gt;Ask questions from Friday, March 20 to Friday, April 3, 2020&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV&gt;&lt;STRONG&gt;F&lt;/STRONG&gt;&lt;STRONG&gt;eatured experts&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Divya" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/69571i0316FBFFDCB5F9AC/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="divyanai.jpg" alt="divyanai.jpg" /&gt;&lt;/span&gt;&lt;STRONG&gt;Divya Nair&lt;/STRONG&gt; is a Technical Marketing Engineer with the Security Business Group in Raleigh, North Carolina. She has more than 10 years of experience in Cisco network security technologies, including firewalls, IPS, VPN, and AAA; and is currently focusing on VPN and firewall management platforms. Divya holds a Bachelor's degree in Computer Science and Engineering.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Jonny" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/69570i82E1E9B7C03D7786/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="jonnoble.jpg" alt="jonnoble.jpg" /&gt;&lt;/span&gt;Jonny Noble&lt;/STRONG&gt; leads the Technical Marketing team for Cloud Security at Cisco, with expertise in Cisco Umbrella and surrounding technologies. For more than 20 years, Jonny has obtained experience in customer-facing disciplines for global hi-tech organizations. He also has rich experience in presenting breakout sessions and proctoring labs at Cisco Live events along with representing Cisco at numerous customer and partner events, trade shows, and exhibitions. Jonny holds degrees in Electronics, Sociology, a Business MBA, and is CISSP certified.&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Aditya" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/69572i6B9E2921149A0C09/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="adganjoo.jpg" alt="adganjoo.jpg" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;STRONG&gt;Aditya Ganjoo&lt;/STRONG&gt; is a Technical Marketing Engineer in Bangalore, India. He has been working with Cisco for the past seven years in Security domains such as Firewall, VPN and AAA. Aditya has delivered trainings on ASA and VPN technologies. He holds a Bachelor's degree in Information Technology. Additionally, he is a CCIE in Security (CCIE#58938). He has been a consistent contributor on Cisco Support Community and has delivered multiple sessions at Cisco Live.&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;SPAN&gt;Due to the anticipated volume for this high in-demand event, Divya, Aditya, Jonny might not be able to answer each question. Thus, remember that you can continue the conversation directly in the &lt;A href="https://community.cisco.com/t5/security/ct-p/4561-security" target="_self"&gt;Security&lt;/A&gt; community. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;By posting a question on this event you're giving permission to be translated in all languages we have in the community.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;
&lt;DIV&gt;Find further events on &lt;A href="https://community.cisco.com/t5/custom/page/page-id/Events?categoryId=technology-support" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/custom/page/page-id/Events?categoryId=technology-support&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;FONT color="#FFCC00"&gt;&lt;SPAN&gt;&lt;STRONG&gt;**Helpful votes Encourage Participation! **&lt;BR /&gt;Please be sure to rate the Answers to Questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 17:06:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4049647#M1068012</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2020-03-24T17:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4049992#M1068020</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Any guidelines for troubleshooting DNS queries ,resolving local dns always giving pain when connected using anyconnet vpn&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 06:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4049992#M1068020</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2020-03-22T06:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4049998#M1068021</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you facing issues with local DNS resolution through the VPN tunnel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If yes, you can check the group-policy attributes for the specific value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are looking for best practices, you can configure the following three options for DNS with Anyconnect:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Split DNS&lt;/STRONG&gt;&amp;nbsp;- &amp;nbsp;The DNS queries which match the domain names, are configured on the Cisco Adaptive Security Appliance (ASA). They move through the tunnel (to the DNS servers that are defined on the ASA, for example) while others do not.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Tunnel-all-DNS&lt;/STRONG&gt;&amp;nbsp;-&amp;nbsp;Only DNS traffic to the DNS servers which are defined by the ASA is allowed. This setting is configured in the group policy.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Standard DNS&lt;/STRONG&gt;&amp;nbsp;- All of the DNS queries move through the DNS servers which are defined by the ASA. In the case of a negative response, the DNS queries might also go to the DNS servers which are configured on the physical adapter.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;You can also check the following link for more clarity on DNS behavior with Anyconnect:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/116016-technote-AnyConnect-00.html#anc1" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/116016-technote-AnyConnect-00.html#anc1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aditya&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 07:42:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4049998#M1068021</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2020-03-22T07:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050032#M1068025</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;Split DNS&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;- &amp;nbsp;The DNS queries which match the domain names, are configured on the Cisco Adaptive Security Appliance (ASA). They move through the tunnel (to the DNS servers that are defined on the ASA, for example) while others do not."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When you say " DNS servers that are defined on the ASA"&amp;nbsp; means the DNS server's configured on the ASA firewall or in the tunnel or group policy&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The DNS queries which match the domain names, you mean the domain name is configured on the firewall or in the group policy ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What if we have&amp;nbsp; split domain like test.local and test.com ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;test.com (it's a forward zone in the same test.local dns server (eg:192.168.1.100)&lt;BR /&gt;test.com also resolves to&amp;nbsp; private ip addresses&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is my current configuration&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 192.168.1.100&lt;BR /&gt;domain-name test.local&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 10:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050032#M1068025</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2020-03-22T10:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050091#M1068037</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the values would be under the group-policy. You can add multiple values/domains under the group-policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s16.html#pgfId-1597902" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s16.html#pgfId-1597902&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 15:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050091#M1068037</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2020-03-22T15:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050163#M1068043</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Do we have any options in cisco anyconnect using FTD firewall for blocking non-windows joined machines and allow only domain computers to connect to anyconnect ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Basavaraj&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 19:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050163#M1068043</guid>
      <dc:creator>BasavarajNingappa6558</dc:creator>
      <dc:date>2020-03-22T19:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050167#M1068045</link>
      <description>&lt;P&gt;Hi Basavaraj,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use machine certificate authentication for AnyConnect users to ensure that only domain machines can join. Config guide - &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/firepower_threat_defense_remote_access_vpns.html#id_login_via_clientcert" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/firepower_threat_defense_remote_access_vpns.html#id_login_via_clientcert&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 19:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050167#M1068045</guid>
      <dc:creator>Divya Nair</dc:creator>
      <dc:date>2020-03-22T19:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050276#M1068060</link>
      <description>Hi Divya,&lt;BR /&gt;&lt;BR /&gt;Thanks for the response&lt;BR /&gt;&lt;BR /&gt;Basically what I'm looking for are domain computers I'm already enforcing DLP and all they cant copy anything of the computers and all, for example, if my employees connect to a corporate network using their personal computers and how can I prevent them not to copy anything except working on the required applications and all, basically I don't them to copy any data from the network when they connect to the network.&lt;BR /&gt;&lt;BR /&gt;how can I achieve this ? can I create one tunnel-group for domain-joined machines and another tunnel-group for non-domain joined machines and enforce the policy?&lt;BR /&gt;Thanks&lt;BR /&gt;Basavaraj</description>
      <pubDate>Mon, 23 Mar 2020 05:28:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050276#M1068060</guid>
      <dc:creator>BasavarajNingappa6558</dc:creator>
      <dc:date>2020-03-23T05:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050282#M1068061</link>
      <description>Hi Basavaraj,&lt;BR /&gt;&lt;BR /&gt;Yes, you would need to create different connection profiles and enforce the policies.&lt;BR /&gt;&lt;BR /&gt;This can be done by different ways like by providing users group-URLs, through Radius attributes or by group-lock feature on ASA.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Aditya</description>
      <pubDate>Mon, 23 Mar 2020 05:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050282#M1068061</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2020-03-23T05:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050295#M1068063</link>
      <description>Hi Aditya,&lt;BR /&gt;&lt;BR /&gt;Can you please provide an example configuration guide for me to follow and do it&lt;BR /&gt;Thanks&lt;BR /&gt;Basavaraj</description>
      <pubDate>Mon, 23 Mar 2020 06:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050295#M1068063</guid>
      <dc:creator>BasavarajNingappa6558</dc:creator>
      <dc:date>2020-03-23T06:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050298#M1068064</link>
      <description>&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/steps-to-configure-group-lock-for-vpn-users-on-microsoft-radius/ta-p/3151643" target="_blank"&gt;https://community.cisco.com/t5/security-documents/steps-to-configure-group-lock-for-vpn-users-on-microsoft-radius/ta-p/3151643&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/asa-ssl-vpn-tunnel-group-group-url-and-group-alias-selection/ta-p/3111990" target="_blank"&gt;https://community.cisco.com/t5/security-documents/asa-ssl-vpn-tunnel-group-group-url-and-group-alias-selection/ta-p/3111990&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 06:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050298#M1068064</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2020-03-23T06:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050308#M1068065</link>
      <description>Hi Aditya,&lt;BR /&gt;&lt;BR /&gt;Those links are configuring different group tunnel-group and group alias, but I'm looking for is enforcing DLP kind of policies on each group policy so that they won't be able to copy any data over Anyconnect tunnel.&lt;BR /&gt;&lt;BR /&gt;Basically they should not copy any data over the Anyconnect VPN tunnel how can I enforce this kind of policy on the Anyconnect VPN</description>
      <pubDate>Mon, 23 Mar 2020 07:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050308#M1068065</guid>
      <dc:creator>BasavarajNingappa6558</dc:creator>
      <dc:date>2020-03-23T07:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050411#M1068070</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply .&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried all split-dns ,standard ,tunnel all dns ... Still I cannot resolve (Dns server is reachable from the server ) . I am using anyconnect 4.8 and asa code 9.2&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 10:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050411#M1068070</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2020-03-23T10:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050415#M1068072</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you share the output of show run group-policy &amp;lt;policy-name&amp;gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aditya&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 11:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050415#M1068072</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2020-03-23T11:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050534#M1068081</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I understand, you are looking to enforce DLP for BYOD users. The best way to do this on the FTD would be to have the BYOD users connect to a separate connection profile/group-policy. I would give this connection a different address pool from the domain users. You can then use application filters on the FTD access policy to block file transfer protocols for the BYOD VPN pool. Keep in mind that FTD is not a true DLP application, but the application filter will help accomplish what you need to do - &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/rule_management_common_characteristics.html#id_16281" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/rule_management_common_characteristics.html#id_16281&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 14:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050534#M1068081</guid>
      <dc:creator>Divya Nair</dc:creator>
      <dc:date>2020-03-23T14:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050695#M1068093</link>
      <description>In addition to what Divya said you can also do On-demand Scripts using Anyconnect:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/customize-localize-anyconnect.html#ID-1408-00000396" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/customize-localize-anyconnect.html#ID-1408-00000396&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Aditya</description>
      <pubDate>Mon, 23 Mar 2020 18:02:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050695#M1068093</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2020-03-23T18:02:34Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050976#M1068108</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Here is my sh run group policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&lt;BR /&gt;group-policy it-test internal&lt;BR /&gt;group-policy it-test attributes&lt;BR /&gt;dns-server value 192.168.1.100&lt;BR /&gt;vpn-idle-timeout 20&lt;BR /&gt;vpn-tunnel-protocol ikev1 ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value it-test-acl&lt;BR /&gt;default-domain value test.local&lt;BR /&gt;address-pools value it-test-pool&lt;/P&gt;&lt;P&gt;2 )group-policy it-test2 internal&lt;BR /&gt;group-policy it-test2 attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 192.168.1.100&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value it-test2-acl&lt;BR /&gt;default-domain value test.local&lt;BR /&gt;split-dns value test.local test.com&lt;BR /&gt;split-tunnel-all-dns disable&lt;BR /&gt;address-pools value it-test2-Pool&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried the below also after removing "split-tunnel-all-dns disable"&amp;nbsp;&amp;nbsp;&amp;nbsp; but did not help .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3 )group-policy it-test2 internal&lt;BR /&gt;group-policy it-test2 attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 192.168.1.100&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value it-test2-acl&lt;BR /&gt;default-domain value test.local&lt;BR /&gt;split-dns value test.local test.com&lt;BR /&gt;&lt;STRIKE&gt;split-tunnel-all-dns disable&lt;/STRIKE&gt;&lt;BR /&gt;address-pools value it-test2-Pool&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 04:37:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050976#M1068108</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2020-03-24T04:37:08Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Working</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050999#M1068110</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Please disable/remove the tunnel-all split dns config and keep the split-dns values, also ensure that the DNS servers (IP) is a part of the split tunnel ACL.&lt;BR /&gt;&lt;BR /&gt;To confirm the DNS lookups (if they are going through Anyconnect) you can use Wireshark, start a capture on the machine and check on which adapter the DNS requests go out to.&lt;BR /&gt;&lt;BR /&gt;Please share the output of ipconfig /all from the test machine and the captures if possible.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Aditya</description>
      <pubDate>Tue, 24 Mar 2020 07:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4050999#M1068110</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2020-03-24T07:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Workers</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4051113#M1068113</link>
      <description>&lt;P&gt;Hello all, I have several questions:&lt;/P&gt;
&lt;P&gt;1. Am I correct in understanding that webvpn customization (i.e. the webvpn home page) and AnyConnect customization (messages, languages etc.) are not currently supported when using Firepower Threat Defense (FTD) device as the headend? (either FMC-managed or FDM/CDO-managed)&lt;/P&gt;
&lt;P&gt;2. Basic posture checking like we are able to do with ASA and DAP/Hostscan is not currently an option with FTD alone (i.e. we must refer to an external solution like ISE) - correct?&lt;/P&gt;
&lt;P&gt;3. For DAP/Hostscan with ASA, does it require AnyConnect Premium and is it supported on ASAv platform models?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 12:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4051113#M1068113</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-24T12:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Community Ask Me Anything - Secure Remote Workers</title>
      <link>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4051144#M1068115</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;That is correct. Clientless WebVPN and AnyConnect customization are not supported today on FTD.&lt;/LI&gt;&lt;LI&gt;You will need to use ISE Posture for client posture assessment today on FTD.&lt;/LI&gt;&lt;LI&gt;ASA with DAP requires the Apex license (previously the Premium license) and is supported on ASAv models.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 24 Mar 2020 12:44:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/community-ask-me-anything-secure-remote-workers/m-p/4051144#M1068115</guid>
      <dc:creator>Divya Nair</dc:creator>
      <dc:date>2020-03-24T12:44:37Z</dc:date>
    </item>
  </channel>
</rss>

