<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FTD VPN access / Geolocation block for Control Plane in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5274029#M1120229</link>
    <description>&lt;P&gt;Cheers Marvin, we've been looking into flex config already but it seems a bit cumbersome as you have to find and add IPs compared to how easy its on other platforms. But as you have pointed out, its the only option until we are on 7.7.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Mar 2025 21:37:07 GMT</pubDate>
    <dc:creator>sameertsm</dc:creator>
    <dc:date>2025-03-21T21:37:07Z</dc:date>
    <item>
      <title>Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4858687#M1101783</link>
      <description>&lt;P&gt;We have Cisco FTD 2110s that are managed with FMC and we are trying to figure out how to block access to our remote access VPN by IP. We already have a geolocation block for Access Control in FMC. But, are we still not able to do geo-ip-based restrictions for the control plane traffic?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 13:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4858687#M1101783</guid>
      <dc:creator>Umer Khan</dc:creator>
      <dc:date>2023-06-20T13:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4858754#M1101785</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1534358"&gt;@Umer Khan&lt;/a&gt; unfortunately geo-block to the FTD is not possible at present. You can either use a traditional control-plane ACL (&lt;A href="https://integratingit.wordpress.com/2021/06/26/ftd-control-plane-acl/" target="_self"&gt;guide&lt;/A&gt;), configure a device in front of the FTD to block based on Geolocation or DUO 2FA provides that ability.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 13:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4858754#M1101785</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-06-20T13:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4858756#M1101786</link>
      <description>&lt;P&gt;FTD (any management type) does not currently have a feature to restrict remote access VPN by Geolocation. The current recommendation from Cisco is to combine your VPN with an MFA solution like Cisco Duo where you can restrict by Geolocation. (Microsoft Authenticator can also do as do most MFA solutions.)&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 13:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4858756#M1101786</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-06-20T13:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4987450#M1107417</link>
      <description>&lt;P&gt;I will request this feature for the next beta release.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 00:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4987450#M1107417</guid>
      <dc:creator>bcoverstone</dc:creator>
      <dc:date>2023-12-31T00:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4988420#M1107484</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/57005"&gt;@bcoverstone&lt;/a&gt; FYI there is already an enhancement request filed for this feature: &lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvs65322" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvs65322&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 15:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/4988420#M1107484</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-01-02T15:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5015115#M1108920</link>
      <description>&lt;P&gt;Submitted 4 years ago.... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 18:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5015115#M1108920</guid>
      <dc:creator>Damon Smith</dc:creator>
      <dc:date>2024-02-08T18:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5015132#M1108921</link>
      <description>&lt;P&gt;Enhancement requests are sometimes never filled. It's customers who buy the equipment being vocal that bumps the priority to something that ends up being in the shipping product.&lt;/P&gt;
&lt;P&gt;That said, Cisco was saying just this week at Cisco Live EMEA that they hope to ship this feature in FMC/ FTD 7.7, due out in late 2024. There will be no 7.5, so 7.6 will be the next major release, around June/July this year.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 19:27:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5015132#M1108921</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-02-08T19:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5015596#M1108959</link>
      <description>&lt;P&gt;This would be a step forward, but not a panacea for global companies. Their firewalls will still be susceptible to trivial DoS attacks as shown in this post: &lt;A href="https://community.cisco.com/t5/vpn/preventing-dos-attacks-to-webvpn-service-is-that-possible/m-p/5008162" target="_blank"&gt;https://community.cisco.com/t5/vpn/preventing-dos-attacks-to-webvpn-service-is-that-possible/m-p/5008162&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It's interesting that Cisco PSIRT doesn't care at all. Probably waiting for another major outbreak...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 15:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5015596#M1108959</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-09T15:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5095936#M1112272</link>
      <description>&lt;P&gt;That's exciting news! Do you have any additional info on this? I can't find any video sessions or announcements on this, so I'm watching the Cisco Live events on youtube to see if they make a mention of it there. I'd love to hear more about this, as I'm sure most Firepower admins are as well.&lt;/P&gt;&lt;P&gt;Thanks Marvin!&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 13:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5095936#M1112272</guid>
      <dc:creator>dpeldo22</dc:creator>
      <dc:date>2024-05-09T13:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5096314#M1112278</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1449429"&gt;@dpeldo22&lt;/a&gt; it was mentioned verbally at CL EMEA in February 2024. Cisco rarely published roadmaps publicly, so we just have to wait and see if it indeed appears in version 7.7. For now, 7.6 is still in early beta testing so it will be several months until the 7.7 beta even kicks off and - at best - late 2024 until it ships.&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 14:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5096314#M1112278</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-09T14:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5211329#M1116750</link>
      <description>&lt;P&gt;How it is sad and absurd. Cheaper solutions&amp;nbsp; like sophos , fortigate has it ...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 20:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5211329#M1116750</guid>
      <dc:creator>julius.vazgys</dc:creator>
      <dc:date>2024-10-18T20:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5236094#M1118173</link>
      <description>&lt;P&gt;I'd dare to say, this is the most anticipated update, years in the making. Cisco, please focus more on security and basics, than flashy features and AI.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5236094#M1118173</guid>
      <dc:creator>Jordan1212</dc:creator>
      <dc:date>2024-12-12T16:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243098#M1118560</link>
      <description>&lt;P&gt;This needs to be addressed.&amp;nbsp; We had 14.1 million failed logins to our VPN in the last 30 days.&amp;nbsp; Without being able to rate limit, we have attackers knocking on our door constantly.&amp;nbsp; Once they grab a user's ID they are locking them out of our AD network.&amp;nbsp; Our only fix is to rename user AD accounts.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243098#M1118560</guid>
      <dc:creator>davidburke841</dc:creator>
      <dc:date>2025-01-03T15:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243101#M1118563</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833513"&gt;@davidburke841&lt;/a&gt; you can now use Threat Detection. If the number of consecutive connection attempts meets the configured threshold within this period, the attacker's IPv4 address is shunned. &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222383-configure-threat-detection-for-remote-ac.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/222383-configure-threat-detection-for-remote-ac.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 15:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243101#M1118563</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-03T15:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243104#M1118565</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833513"&gt;@davidburke841&lt;/a&gt; have you implemented the hardening recommendations described here: &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html#toc-hId-2028751869" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html#toc-hId-2028751869&lt;/A&gt; ?&lt;/P&gt;
&lt;P&gt;Those are available now across multiple releases.&lt;/P&gt;
&lt;P&gt;7.7 will be adding the geolocation blocking feature for RA VPN. We currently expect it around February this year.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 16:08:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243104#M1118565</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-01-03T16:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243105#M1118566</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thanks Rob!&amp;nbsp; Looks like I need to do a .X upgrade to get this feature.&amp;nbsp; I noticed that 7.6 wasn't recommended yet so I assumed 7.7 was a ways out.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 16:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243105#M1118566</guid>
      <dc:creator>davidburke841</dc:creator>
      <dc:date>2025-01-03T16:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243106#M1118567</link>
      <description>&lt;P&gt;The best way we figured out how to remedy this was to create URL aliases for your Remote Access vpn profiles. We've worked out a pretty seamless process where we create a new alias, then change the url alias for our vpn profiles once a year by changing the Anyconnect Client Profile xml file that the clients download. We leave the old alias in place for a week or two, and then delete it. We're changing the URL just to make sure old employees or vendors aren't able to try to get in if they don't have the URL, so it works pretty good.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We had the same problem as you and it was taking a lot of manpower to stay ahead of password sprays, so this was the next best thing since we didn't want to put another firewall in line.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: Also, we changed the RA port from 443 to a new one. So our alias looks something like &lt;A href="https://remoteaccess.somedomain.com:5593/random30CharacterString" target="_blank" rel="noopener"&gt;https://remoteaccess.somedomain.com:5593/random30CharacterString&lt;/A&gt;&lt;BR /&gt;Once that url is in the xml file and users authenticate once, the client will point to the new url for all subsequent connections.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 16:50:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243106#M1118567</guid>
      <dc:creator>dpeldo22</dc:creator>
      <dc:date>2025-01-03T16:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243107#M1118568</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"Authentication failures via SAML are not supported yet."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I got all excited, only to have my hopes dashed....&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 16:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243107#M1118568</guid>
      <dc:creator>Damon Smith</dc:creator>
      <dc:date>2025-01-03T16:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243108#M1118569</link>
      <description>&lt;P&gt;Remember though, Shunning isn't necessarily a permanent block. Do a bit of reading on shunning first before you decide to do an upgrade from the recommended ftd version.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 16:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5243108#M1118569</guid>
      <dc:creator>dpeldo22</dc:creator>
      <dc:date>2025-01-03T16:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD VPN access / Geolocation block for Control Plane</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5244580#M1118615</link>
      <description>&lt;P&gt;We're not supposed to talk about fight club, but I might be able to confirm geo fencing for VPN access in 7.7 is cool. I might also be able to confirm that this version is hypothetically legit in a number of other areas.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 23:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-vpn-access-geolocation-block-for-control-plane/m-p/5244580#M1118615</guid>
      <dc:creator>bcoverstone</dc:creator>
      <dc:date>2025-01-07T23:53:36Z</dc:date>
    </item>
  </channel>
</rss>

