<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Remote Access VPN Restriction in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4407132#M1080986</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/745926"&gt;@steve121&lt;/a&gt; we cannot currently use geolocation to restrict AnyConnect access.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs65322/?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs65322/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 23 May 2021 04:08:19 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-05-23T04:08:19Z</dc:date>
    <item>
      <title>FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3765784#M132626</link>
      <description>&lt;P&gt;Hello, everyone. We have implemented Anyconnect RA VPN on FTD device. However now i want to restrict from which source global IP Addresses i can connect to. I now in ASA it can be done by control-plane ACL but in FTD i do not see any place to configure it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 11:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3765784#M132626</guid>
      <dc:creator>orkhan.rustamli.96</dc:creator>
      <dc:date>2019-03-12T11:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3766204#M132628</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Try to create a deny rule in pre-filter policy with the source IP you would like to restrict.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Tue, 18 Dec 2018 20:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3766204#M132628</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-12-18T20:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3766492#M132630</link>
      <description>&lt;P&gt;No, It didnot work as i expected. Because ACP and Prefilter Policies are for passthrough traffic. I needed ACL for control plane that i implemented using flexconfig. I denied only my phones global IP into FTD`s vpn webpage and permitted any any. But this way noone could open that webpage&lt;/P&gt;</description>
      <pubDate>Wed, 19 Dec 2018 09:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3766492#M132630</guid>
      <dc:creator>orkhan.rustamli.96</dc:creator>
      <dc:date>2018-12-19T09:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3767203#M132631</link>
      <description>&lt;P&gt;As far as I know, control plane type ACL is not currently offered as a feature on FTD.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 09:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3767203#M132631</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-12-20T09:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3767703#M132632</link>
      <description>&lt;P&gt;I see. I have also seen that access-group command is not supported by Flex so that means i would not be able to apply access-list to-the-box. It is disappointing. I think i have to change my NGFW to another vendor.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 05:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3767703#M132632</guid>
      <dc:creator>orkhan.rustamli.96</dc:creator>
      <dc:date>2018-12-21T05:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3767747#M132633</link>
      <description>&lt;P&gt;Even on ASAs, that's a very uncommonly used feature. I have worked on hundreds of customer ASAs and never seen it used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What's your use case (business requirement) making it critical for you?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 08:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3767747#M132633</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-12-21T08:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3781819#M132635</link>
      <description>&lt;P&gt;The director of security department requires it from me so that only IP addresses from my country can connect to out RA VPN. Actually i have opened TAC case. We have worked together with an engineer, deployed control-plane ACL by Flex but with no result. This issue is already a bug case and waiting response from devolopers whether it is bug or control-plane acl is not yet supported on FTD&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 07:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3781819#M132635</guid>
      <dc:creator>orkhan.rustamli.96</dc:creator>
      <dc:date>2019-01-17T07:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782001#M132637</link>
      <description>&lt;P&gt;Hi Orkhan,&lt;BR /&gt;Please share the details once you get update from TAC. As i am also in a very similar situation now that one of my customer required the exact thing. They wan to allow only RA-VPN to be accessed from some specific country IP's.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 12:10:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782001#M132637</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-01-17T12:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782724#M132639</link>
      <description>&lt;P&gt;Hello Abheesh,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can check the case status via this link:&amp;nbsp;&lt;A title="CSCvn78593" href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn78593/?rfs=iqvred" target="_blank"&gt;CSCvn78593&lt;/A&gt;. As TAC advised me not to wait a quick action for this problem. Whether this is bug or not supported in FTD, it may take really long time to be added. My advise to you put another ASA for only RA VPN behind FTD devices and cut traffic with basic ACL or Prefilter.&amp;nbsp; Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 07:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782724#M132639</guid>
      <dc:creator>orkhan.rustamli.96</dc:creator>
      <dc:date>2019-01-18T07:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782842#M132641</link>
      <description>Hi Orkhan,&lt;BR /&gt;Thank you for sharing the details.</description>
      <pubDate>Fri, 18 Jan 2019 10:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782842#M132641</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2019-01-18T10:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782873#M132644</link>
      <description>&lt;P&gt;If you put your RA-dedicated ASA inside on the FTD device then you can use Geoblocking in your ACP rule.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 11:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3782873#M132644</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-01-18T11:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3858363#M132645</link>
      <description>&lt;P&gt;It seems to be fixed now... since 6.2.3.12 and later. And for the 6.3 since 6.3.0.3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was also waiting for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 14:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/3858363#M132645</guid>
      <dc:creator>jovalo</dc:creator>
      <dc:date>2019-05-17T14:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4094461#M1070568</link>
      <description>&lt;P&gt;Is it fixed in version 6.6. ?&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 16:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4094461#M1070568</guid>
      <dc:creator>Spyros Kasapis</dc:creator>
      <dc:date>2020-05-29T16:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4094568#M1070582</link>
      <description>&lt;P&gt;Yes if it was already fixed in later releases of 6.2 and 6.3 then I suppose it will also work with 6.6 with flexconfig.&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 18:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4094568#M1070582</guid>
      <dc:creator>jovalo</dc:creator>
      <dc:date>2020-05-29T18:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107173#M1071297</link>
      <description>&lt;P&gt;Even though control-plane ACLs are technically supported with Flexconfig, it is not currently supported (as of 6.6) to do geoblocking of RA VPN that way.&lt;/P&gt;
&lt;P&gt;A TAC engineer confirmed this with me just today. There is an (currently unpublished) enhancement bugID for this: CSCvs65322 ENH | Geo-location based AnyConnect Client connections&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 09:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107173#M1071297</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-22T09:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107197#M1071299</link>
      <description />
      <pubDate>Mon, 22 Jun 2020 09:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107197#M1071299</guid>
      <dc:creator>Transcom Network Support</dc:creator>
      <dc:date>2020-06-22T09:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107198#M1071300</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Nowdays FTD major missing in terms of Remote Access and tunneling are the following (in my opinion)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- Lack of Geographical restrictions for remote access tunnel group (should be for each tunnel group, makes no sense to do it for the whole firewall interface) and anonymizers&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- Lack of SAML authentication support for Remote Access&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- Lack of VTI tunnel interfaces -&amp;gt; this is really a major drawbacks for hybrid cloud connectivity&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 09:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107198#M1071300</guid>
      <dc:creator>giovanni.augusto</dc:creator>
      <dc:date>2020-06-22T09:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107207#M1071302</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/200726"&gt;@giovanni.augusto&lt;/a&gt;&amp;nbsp;#2 and #3 should be coming in Firepower 6.7 this fall.&lt;/P&gt;
&lt;P&gt;For #1 I agree - be sure to contact your Cisco account manager and mention ENH bugID &lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs65322" target="_blank" rel="noopener"&gt;CSCvs65322&lt;/A&gt; !&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 10:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4107207#M1071302</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-06-22T10:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4184327#M1075818</link>
      <description>&lt;P&gt;any update in version 6.7 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Nov 2020 11:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4184327#M1075818</guid>
      <dc:creator>Spyros Kasapis</dc:creator>
      <dc:date>2020-11-16T11:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Remote Access VPN Restriction</title>
      <link>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4406306#M1080922</link>
      <description>&lt;P&gt;Any links on what you actually put in the flexconfig?&lt;/P&gt;&lt;P&gt;My scenario is remote access is getting brute force attacked and failing on the auth but we want to block that traffic by geo so it doesn't get that far.&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 21:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-remote-access-vpn-restriction/m-p/4406306#M1080922</guid>
      <dc:creator>steve121</dc:creator>
      <dc:date>2021-05-20T21:48:01Z</dc:date>
    </item>
  </channel>
</rss>

