<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5122549#M1113234</link>
    <description>&lt;P&gt;NOW since you try something try below&amp;nbsp;&lt;BR /&gt;1- change the WebVPN to be 8443 not 443&amp;nbsp;&lt;BR /&gt;2- run ACL control-plane&amp;nbsp;&lt;BR /&gt;access-list extended WebVPN permit tcp host &amp;lt; &amp;gt; any eq 8443 &amp;lt;&amp;lt;- host public IP you want to allow&amp;nbsp;&lt;BR /&gt;access-list extended WebVPN deny tcp any any eq 8443&lt;BR /&gt;access-list extended WebVPN deny tcp any any eq 443 &amp;lt;&amp;lt;- this can also block the ASDM or any HTTPS mgmt to FW&lt;BR /&gt;&lt;BR /&gt;that it the Control-plane ACL dont have implicit deny in end so you dont need permit ip any any&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;MHM&lt;/P&gt;</description>
    <pubDate>Sat, 01 Jun 2024 11:33:49 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-06-01T11:33:49Z</dc:date>
    <item>
      <title>Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121155#M1113148</link>
      <description>&lt;P&gt;I am implementing Anyconnect SSL client VPN and I only want 2 users to be able to access the network on this connection.&amp;nbsp; How can I restrict that access?&amp;nbsp; I have found different thoughts on this but nothing that seems to work.&amp;nbsp; Please help.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Ken&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 17:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121155#M1113148</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-05-30T17:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121162#M1113149</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1273163"&gt;@kcousino123&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;A couple of options, you can configure "&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;&lt;SPAN class="searchMark primary"&gt;vpn-simultaneous-logins&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;VAR&gt;&lt;/VAR&gt;&lt;/SPAN&gt; 2" under the group policy to restrict the number of connections.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa914/configuration/vpn/asa-914-vpn-config/vpn-groups.html?bookSearch=true" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa914/configuration/vpn/asa-914-vpn-config/vpn-groups.html?bookSearch=true&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;PRE id="ID-2439-00000b38__ID-2439-00000b42" class="pre codeblock"&gt;&lt;CODE&gt;hostname(config)# &lt;KBD class="userinput"&gt;&lt;STRONG class="ph userinput"&gt;group-policy &amp;lt;group policy name&amp;gt; attributes&lt;/STRONG&gt;&lt;/KBD&gt;
hostname(config-group-policy)# &lt;KBD class="userinput"&gt;&lt;STRONG class="ph userinput"&gt;vpn-simultaneous-logins 2&lt;/STRONG&gt;&lt;/KBD&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;If the ASA is unlicensed you get 2 free RAVPN licenses, so you may not need to do anything.&lt;/P&gt;
&lt;P&gt;Another option is to configure a VPN pool with only 2 IP addresses, that will achieve the samething as the other options.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 17:33:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121162#M1113149</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-05-30T17:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121165#M1113150</link>
      <description>&lt;P&gt;What you try and not work?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 17:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121165#M1113150</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-30T17:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121203#M1113152</link>
      <description>&lt;P&gt;I am trying to stop attempts to connect by all except 2 or 3 users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 17:57:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121203#M1113152</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-05-30T17:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121207#M1113154</link>
      <description>&lt;P&gt;I am using a nonstandard port and I tried blocking traffic with an acl and thought I applied it to the control plane.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 17:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121207#M1113154</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-05-30T17:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121210#M1113155</link>
      <description>&lt;P&gt;All except two user that have correct password?&lt;/P&gt;
&lt;P&gt;How other connect with wrong password?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 18:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121210#M1113155</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-30T18:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121220#M1113157</link>
      <description>&lt;P&gt;I am wanting to stop people from even getting through to have the option to try to log in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 18:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121220#M1113157</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-05-30T18:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121554#M1113172</link>
      <description>&lt;P&gt;Stopping successful logins is easy. Stopping ATTEMPTS is much more difficult. Yes, you can build (and continually update) control-plane ACLs but that will make your full-time job keeping up with them.&lt;/P&gt;
&lt;P&gt;Two other methods are:&lt;/P&gt;
&lt;P&gt;1. Use an unpublished URL for the desired connection profile. For the default profile, point it to a dummy of blackhole AAA server. You will still get attempts but they won't bombard your legitimate authentication source.&lt;/P&gt;
&lt;P&gt;2. If you have a PKI, issue certificates to the permitted users and make certificate-based authentication the only allowed method. This will prevent random scans from ever even trying to authenticate since they will be offering random usernames and passwords.&lt;/P&gt;
&lt;P&gt;No matter what method you use, inbound traffic will still be seen (and blocked) by the firewall. That is the nature of being connected to the modern Internet.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 02:36:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5121554#M1113172</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-31T02:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5122227#M1113201</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;For the control-plane ACL, if I block everything except the 2 or 3 IPs that I want to allow, isn't that less work?&lt;BR /&gt;&lt;BR /&gt;For #1, I don't know how you point it to a dummy of blackhole AAA server.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;For #2, makes sense, but since I have never done that I now have some research to do.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 18:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5122227#M1113201</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-05-31T18:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5122546#M1113232</link>
      <description>&lt;P&gt;If your remote clients are always on the same addresses, then yes you could block all but them.&lt;/P&gt;
&lt;P&gt;For the other suggestions, please see these documents:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-client/221880-implement-hardening-measures-for-secure.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-client/221880-implement-hardening-measures-for-secure.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 11:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5122546#M1113232</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-06-01T11:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5122549#M1113234</link>
      <description>&lt;P&gt;NOW since you try something try below&amp;nbsp;&lt;BR /&gt;1- change the WebVPN to be 8443 not 443&amp;nbsp;&lt;BR /&gt;2- run ACL control-plane&amp;nbsp;&lt;BR /&gt;access-list extended WebVPN permit tcp host &amp;lt; &amp;gt; any eq 8443 &amp;lt;&amp;lt;- host public IP you want to allow&amp;nbsp;&lt;BR /&gt;access-list extended WebVPN deny tcp any any eq 8443&lt;BR /&gt;access-list extended WebVPN deny tcp any any eq 443 &amp;lt;&amp;lt;- this can also block the ASDM or any HTTPS mgmt to FW&lt;BR /&gt;&lt;BR /&gt;that it the Control-plane ACL dont have implicit deny in end so you dont need permit ip any any&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 11:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5122549#M1113234</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-01T11:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5125063#M1113336</link>
      <description>&lt;P&gt;Do you still need to use an Access-group for this?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 18:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5125063#M1113336</guid>
      <dc:creator>kcousino123</dc:creator>
      <dc:date>2024-06-04T18:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506, Trying to limit access to network using Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5125071#M1113338</link>
      <description>&lt;P&gt;Yes you need access group with keyword control plane&lt;/P&gt;
&lt;P&gt;Note:- no need to apply&amp;nbsp; &amp;nbsp;below line except case you still see some host try access asa via this port&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tcp any any eq 443 &amp;lt;&amp;lt;- this can also block the ASDM or any HTTPS mgmt to FW&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;MHM&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 19:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-trying-to-limit-access-to-network-using/m-p/5125071#M1113338</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-04T19:12:52Z</dc:date>
    </item>
  </channel>
</rss>

