<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Anyconnect Firewall rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-firewall-rules/m-p/4764358#M1097283</link>
    <description>&lt;P&gt;Hallo,&lt;/P&gt;&lt;P&gt;we're setting FPR with ASA Image for VPN remote access. The users will get private IP addresses that are routed in the local LAN, so no NAT in between. As far as I understand now, these IPs are reachable from anywhere in the LAN. How would I set firewall rules at the FPR such that these IPs cannot be reached? Are these Group Policy rules or can I just set them at Firewall -&amp;gt; Access rules, i.e.:&lt;/P&gt;&lt;P&gt;any -&amp;gt; 192.168.10.0/24: any deny&lt;/P&gt;</description>
    <pubDate>Sat, 28 Jan 2023 01:36:13 GMT</pubDate>
    <dc:creator>elden25</dc:creator>
    <dc:date>2023-01-28T01:36:13Z</dc:date>
    <item>
      <title>Cisco Anyconnect Firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-firewall-rules/m-p/4764358#M1097283</link>
      <description>&lt;P&gt;Hallo,&lt;/P&gt;&lt;P&gt;we're setting FPR with ASA Image for VPN remote access. The users will get private IP addresses that are routed in the local LAN, so no NAT in between. As far as I understand now, these IPs are reachable from anywhere in the LAN. How would I set firewall rules at the FPR such that these IPs cannot be reached? Are these Group Policy rules or can I just set them at Firewall -&amp;gt; Access rules, i.e.:&lt;/P&gt;&lt;P&gt;any -&amp;gt; 192.168.10.0/24: any deny&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jan 2023 01:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-firewall-rules/m-p/4764358#M1097283</guid>
      <dc:creator>elden25</dc:creator>
      <dc:date>2023-01-28T01:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect Firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-firewall-rules/m-p/4764525#M1097287</link>
      <description>&lt;P&gt;Regardless of if this is remote access or IPsec VPN, you can disable the access control policy bypass in which case you would need to create access rules on the interface that the VPN is terminated on (usually the outside interface).&amp;nbsp; Doing this will allow you to limit what access the users at the remote site can access in your local LAN.&amp;nbsp; To do this you need to un-check / un-select the &lt;STRONG&gt;Bypass Access Control Policy for decrypted traffic (sysopt permit-vpn)&lt;/STRONG&gt; when setting up the VPN.&amp;nbsp; It can also be disabled after setup if needed.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jan 2023 22:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-firewall-rules/m-p/4764525#M1097287</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-01-28T22:58:47Z</dc:date>
    </item>
  </channel>
</rss>

