<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I don't believe that's in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027278#M134469</link>
    <description>&lt;P&gt;I don't believe that's possible.&lt;/P&gt;
&lt;P&gt;When a client connects, the connection request is translated from the FQDN the client provides into an IP address by the client's local resolver (host file or DNS server(s)).&lt;/P&gt;
&lt;P&gt;So even when the client goes to your URL, the request will actuallly come in as an IP address of the clietn-facing interface that the FQDN resolves to.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jun 2017 10:25:27 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-06-28T10:25:27Z</dc:date>
    <item>
      <title>ASA Any Connect VPN Login web page restriction with IP and has to access vai Domain Name alone</title>
      <link>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027277#M134468</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;We have any connect VPN and Firewall VPN IP is registered to a domain with SSL Certificate. So remote client can access any connect url with domain and IP as well to connect VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In this scenario, we need to restrict the Any connect URL through Public IP. We need any connect URL has to be accessed through domain URL alone and not with the IP address. Your valuable inputs are highly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Suresh.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027277#M134468</guid>
      <dc:creator>Sureshkumar B</dc:creator>
      <dc:date>2019-03-12T09:38:10Z</dc:date>
    </item>
    <item>
      <title>I don't believe that's</title>
      <link>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027278#M134469</link>
      <description>&lt;P&gt;I don't believe that's possible.&lt;/P&gt;
&lt;P&gt;When a client connects, the connection request is translated from the FQDN the client provides into an IP address by the client's local resolver (host file or DNS server(s)).&lt;/P&gt;
&lt;P&gt;So even when the client goes to your URL, the request will actuallly come in as an IP address of the clietn-facing interface that the FQDN resolves to.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2017 10:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027278#M134469</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-28T10:25:27Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027279#M134471</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;Thanks for your response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes i do agree at the end, IP to IP communication only happens. But my concern is, if client machine enter &lt;A href="https://x.x.x.x" target="_blank"&gt;https://x.x.x.x&lt;/A&gt; ip in browser instead of domain name, certificate warning will come and if client machine accept the certicate warning it will display the VPN portal.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We don't want client machine to access VPN portal if certificate issues comes/certificate warning arises.&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;Suresh.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jul 2017 12:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027279#M134471</guid>
      <dc:creator>Sureshkumar B</dc:creator>
      <dc:date>2017-07-01T12:34:37Z</dc:date>
    </item>
    <item>
      <title>Ah OK - yes you can prevent</title>
      <link>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027280#M134472</link>
      <description>&lt;P&gt;Ah OK - yes you can prevent it at the client side. I was answering from the ASA perspective.&lt;/P&gt;
&lt;P&gt;If you set the profile to use "Strict Certificate Trust", it will accomplish what you are asking.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect44/administration/guide/b_AnyConnect_Administrator_Guide_4-4/anyconnect-profile-editor.html#ID-1430-0000006c&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jul 2017 14:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027280#M134472</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-01T14:53:04Z</dc:date>
    </item>
    <item>
      <title>thanks for your reponse, i am</title>
      <link>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027281#M134475</link>
      <description>&lt;P&gt;thanks for your reponse, i am new to Cisco ASA. Can you please explain it in more detail.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jul 2017 15:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027281#M134475</guid>
      <dc:creator>Sureshkumar B</dc:creator>
      <dc:date>2017-07-01T15:09:07Z</dc:date>
    </item>
    <item>
      <title>Remote Access SSL VPN on the</title>
      <link>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027282#M134477</link>
      <description>&lt;P&gt;Remote Access SSL VPN on the ASA, which uses the AnyConnect client, has something called the client profile.&lt;/P&gt;
&lt;P&gt;When you use it (it's optional for the admin to define one), the profile governs multiple settings about how the client connects. Every time the client connects, the ASA checks to ensure the local copy of the profile is current (it uses a hash of the file to compare the one on the ASA with the one on the client). Thus all the settings are ensured to be correct.&lt;/P&gt;
&lt;P&gt;The local policy is the other piece governing AnyConnect client behavior. It is not deployed from the ASA but is stored locally on the client. We typically deploy it using something like SCCM. Unfortunately, it is subject to end user modification unless you lock down the remote workstations to prevent it from happening.&lt;/P&gt;
&lt;P&gt;The local policy is where the&amp;nbsp;&lt;SPAN&gt;"Strict Certificate Trust" setting is located. You can create and send out a local policy using the Anyconnect profile editor software available on the AnyConnect downloads page.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Both the profile and the local policy are small xml files that are pretty much human readable. They can also be manually edited. for instance, the following output and associated GUI settings are representations of the same thing:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;&amp;lt;?xml version="1.0" encoding="UTF-8"?&amp;gt;&lt;BR /&gt;&amp;lt;AnyConnectLocalPolicy xmlns="http://schemas.xmlsoap.org/encoding/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://schemas.xmlsoap.org/encoding/ AnyConnectLocalPolicy.xsd" acversion="3.0.0592"&amp;gt;&lt;BR /&gt; &amp;lt;FipsMode&amp;gt;true&amp;lt;/FipsMode&amp;gt;&lt;BR /&gt; &amp;lt;BypassDownloader&amp;gt;true&amp;lt;/BypassDownloader&amp;gt;&lt;BR /&gt; &amp;lt;RestrictWebLaunch&amp;gt;true&amp;lt;/RestrictWebLaunch&amp;gt;&lt;BR /&gt; &amp;lt;StrictCertificateTrust&amp;gt;true&amp;lt;/StrictCertificateTrust&amp;gt;&lt;BR /&gt; &amp;lt;EnableCRLCheck&amp;gt;false&amp;lt;/EnableCRLCheck&amp;gt;&lt;BR /&gt; &amp;lt;RestrictPreferenceCaching&amp;gt;false&amp;lt;/RestrictPreferenceCaching&amp;gt;&lt;BR /&gt; &amp;lt;ExcludePemFileCertStore&amp;gt;false&amp;lt;/ExcludePemFileCertStore&amp;gt;&lt;BR /&gt; &amp;lt;ExcludeMacNativeCertStore&amp;gt;false&amp;lt;/ExcludeMacNativeCertStore&amp;gt;&lt;BR /&gt; &amp;lt;ExcludeFirefoxNSSCertStore&amp;gt;false&amp;lt;/ExcludeFirefoxNSSCertStore&amp;gt;&lt;BR /&gt; &amp;lt;UpdatePolicy&amp;gt;&lt;BR /&gt; &amp;lt;AllowSoftwareUpdatesFromAnyServer&amp;gt;true&amp;lt;/AllowSoftwareUpdatesFromAnyServer&amp;gt;&lt;BR /&gt; &amp;lt;AllowVPNProfileUpdatesFromAnyServer&amp;gt;true&amp;lt;/AllowVPNProfileUpdatesFromAnyServer&amp;gt;&lt;BR /&gt; &amp;lt;AllowServiceProfileUpdatesFromAnyServer&amp;gt;true&amp;lt;/AllowServiceProfileUpdatesFromAnyServer&amp;gt;&lt;BR /&gt; &amp;lt;AllowISEProfileUpdatesFromAnyServer&amp;gt;true&amp;lt;/AllowISEProfileUpdatesFromAnyServer&amp;gt;&lt;BR /&gt; &amp;lt;AllowComplianceModuleUpdatesFromAnyServer&amp;gt;true&amp;lt;/AllowComplianceModuleUpdatesFromAnyServer&amp;gt;&lt;BR /&gt; &amp;lt;/UpdatePolicy&amp;gt;&lt;BR /&gt;&amp;lt;/AnyConnectLocalPolicy&amp;gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/vpn_local_policy.png" class="migrated-markup-image" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can edit the policy and deploy it as described here:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect44/administration/guide/b_AnyConnect_Administrator_Guide_4-4/anyconnect-profile-editor.html#ID-1430-0000032f&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jul 2017 15:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-any-connect-vpn-login-web-page-restriction-with-ip-and-has/m-p/3027282#M134477</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-01T15:32:16Z</dc:date>
    </item>
  </channel>
</rss>

