<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: block access to my RA VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165870#M1115361</link>
    <description>&lt;P&gt;The problem here is that you need the IP to be able to connect to the VPN.&amp;nbsp; URL is just a more human friendly way of defining the IP, but it still resolves to the same IP.&lt;/P&gt;
&lt;P&gt;To add to what others have mentioned here, another method to make this more secure is to implement certificate authentication.&amp;nbsp; That way anyone connecting that does not have a valid certificate will be refused access.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Aug 2024 10:54:08 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2024-08-26T10:54:08Z</dc:date>
    <item>
      <title>block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165571#M1115333</link>
      <description>&lt;P&gt;i need to block access to my RA VPN using the IP i need this VPN to be accessed via the URL&lt;/P&gt;
&lt;P&gt;what i mean that i have an FTD 2110 with RA VPN&lt;BR /&gt;users can access the Web page of the VPN using both IP of the outside interface and the URL&lt;/P&gt;
&lt;P&gt;i need to force users to use the URL only&lt;/P&gt;</description>
      <pubDate>Sat, 24 Aug 2024 22:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165571#M1115333</guid>
      <dc:creator>Nadi</dc:creator>
      <dc:date>2024-08-24T22:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165608#M1115340</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1679732"&gt;@Nadi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can be achieved by setting up an access rule that denies traffic to the outside interface's IP on the ports used by the VPN (e.g., HTTPS for web access) but allows traffic directed to the same port when accessed via the specific URL. Additionally, implementing DNS filtering or modifying the DNS response for your users to only resolve the URL while not exposing the IP address directly can help enforce this policy.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 06:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165608#M1115340</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-08-25T06:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165611#M1115341</link>
      <description>&lt;P&gt;can you please share how to create this access list and how we deny traffic to IP and allow it for URL&lt;/P&gt;
&lt;P&gt;is this a control plane access list or normal access rule&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 06:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165611#M1115341</guid>
      <dc:creator>Nadi</dc:creator>
      <dc:date>2024-08-25T06:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165628#M1115345</link>
      <description>&lt;P&gt;Friend no way' dns resolve to IP and both case the RA VPN can use any URL or IP to connect.&lt;/P&gt;
&lt;P&gt;By the way why you want to do that ? Maybe we search in wrong place&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 08:51:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165628#M1115345</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-25T08:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165629#M1115346</link>
      <description>&lt;P&gt;A pen test happened to our company and recommended that&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 09:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165629#M1115346</guid>
      <dc:creator>Nadi</dc:creator>
      <dc:date>2024-08-25T09:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165646#M1115347</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;AFAIK the firepower does not support&amp;nbsp;Geolocation for RA VPN , you need to use ACL Control Plane. In case the remote users are all on the same country then allow your country public ip range and deny the rest. or depend on your environment if you have a firewall placed before the FPP you can use the Geolocation. or you can apply the ACL on the router publicly facing the internet.&lt;BR /&gt;&lt;BR /&gt;About the fqdn instead of ip, for what reason the pentester recommended that ? By using the fqdn also there is the risk of dns spoofing.&lt;/P&gt;&lt;P&gt;If you still want to achieve this, you need a loadbalacing/WAF to allow only specific URL.&lt;/P&gt;&lt;P&gt;Are you using MFA with the RA VPN ? is Radius used or LDAP?&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 12:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165646#M1115347</guid>
      <dc:creator>Amine ZAKARIA</dc:creator>
      <dc:date>2024-08-25T12:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165737#M1115356</link>
      <description>&lt;P&gt;not possible as the ip is the same both dns and ip..&lt;/P&gt;
&lt;P&gt;there is another way&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ccieexpert_0-1724630764159.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227034i327E39EEA7660C25/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ccieexpert_0-1724630764159.png" alt="ccieexpert_0-1724630764159.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ccieexpert_1-1724630778039.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227035iAF12C168160C34CF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ccieexpert_1-1724630778039.png" alt="ccieexpert_1-1724630778039.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# sh run tunnel-group&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup webvpn-attributes&lt;BR /&gt;authentication saml&lt;BR /&gt;tunnel-group tomvpn type remote-access&lt;BR /&gt;tunnel-group tomvpn webvpn-attributes&lt;/P&gt;
&lt;P&gt;there are ways to tweak this.. i created a new tunnel group tomvpn for the fqdn and the ip address matches with the defaultwebvpn tunnel group.. in the default webvpn tunnel group i set it to do SAML auth, which is not configured, so they get a error..&lt;/P&gt;
&lt;P&gt;there may be other ways to tweak it further...&lt;BR /&gt;group-url &lt;A href="https://tomvpn.mydomain.com" target="_blank" rel="noopener"&gt;https://tomvpn.mydomain.com&lt;/A&gt; enable&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;**Please rate this as helpful if this was useful**&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 00:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165737#M1115356</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-26T00:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165870#M1115361</link>
      <description>&lt;P&gt;The problem here is that you need the IP to be able to connect to the VPN.&amp;nbsp; URL is just a more human friendly way of defining the IP, but it still resolves to the same IP.&lt;/P&gt;
&lt;P&gt;To add to what others have mentioned here, another method to make this more secure is to implement certificate authentication.&amp;nbsp; That way anyone connecting that does not have a valid certificate will be refused access.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 10:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5165870#M1115361</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-26T10:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: block access to my RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5309975#M1121852</link>
      <description>&lt;P&gt;I have just faced an issue like this and after investigating here you are the solution&lt;/P&gt;
&lt;P&gt;first you need to enforce the users to access only URLs not IPs by removing the whole option called Block Connections for untrusted serves by modifying File called&amp;nbsp;AnyConnectLocalPolicy.xml located in&amp;nbsp;C:\ProgramData\Cisco\Cisco Secure Client&lt;/P&gt;
&lt;P&gt;you can just modify this row&amp;nbsp;&amp;lt;StrictCertificateTrust&amp;gt;False&amp;lt;/StrictCertificateTrust&amp;gt; to True and then pushed this file after modification to all corporate devices&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this will enforce the users to use only trusted URL links&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 08:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-access-to-my-ra-vpn/m-p/5309975#M1121852</guid>
      <dc:creator>ahmed-serag</dc:creator>
      <dc:date>2025-07-16T08:34:38Z</dc:date>
    </item>
  </channel>
</rss>

