<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Anyconnect user authorization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-anyconnect-user-authorization/m-p/2463531#M270115</link>
    <description>&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have ASA configured for VPN Anyconnect &amp;amp; large subnets are allowed for VPN users via split tunnelling. All VPN user are authenticating via AAA. Then we have created VPN users in ACS &amp;amp; restrict the users access to particular subnets via Downloadable ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problems:&lt;/P&gt;&lt;P&gt;~~~~~~~~&lt;/P&gt;&lt;P&gt;dACL on ACS works but not good enough as suppose we have restrict VPN user to particular subnet via dACL, once he will reach that subnet devices, then from that device(Switch/Router) he is able to access any device which is not allowed in dACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HOW WE CAN RESTRICT VPN USER THAT IF HE IS ALLOWED TO ACCESS ONLY SUBNET1 in dACL, HE SHOULD NOT BE ALLOWED/ ABLE TO GOTO SUBNET 2 SWITCH/ROUTER ETC. FROM ALLOWED SUBNET 1. PEOPLE KNOW THIS TRICK OF JUMPING FROM ALLOWED SUBNET DEVICES TO NOT ALLOWED SUBNET DEVICES AND THEY MISS USE IT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;OR if you have any other better way, then please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All devices are configured with TACACS. We are using ASA 8.4 and ACS 4.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:41:47 GMT</pubDate>
    <dc:creator>raza555</dc:creator>
    <dc:date>2019-03-12T03:41:47Z</dc:date>
    <item>
      <title>VPN Anyconnect user authorization</title>
      <link>https://community.cisco.com/t5/network-security/vpn-anyconnect-user-authorization/m-p/2463531#M270115</link>
      <description>&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have ASA configured for VPN Anyconnect &amp;amp; large subnets are allowed for VPN users via split tunnelling. All VPN user are authenticating via AAA. Then we have created VPN users in ACS &amp;amp; restrict the users access to particular subnets via Downloadable ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problems:&lt;/P&gt;&lt;P&gt;~~~~~~~~&lt;/P&gt;&lt;P&gt;dACL on ACS works but not good enough as suppose we have restrict VPN user to particular subnet via dACL, once he will reach that subnet devices, then from that device(Switch/Router) he is able to access any device which is not allowed in dACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HOW WE CAN RESTRICT VPN USER THAT IF HE IS ALLOWED TO ACCESS ONLY SUBNET1 in dACL, HE SHOULD NOT BE ALLOWED/ ABLE TO GOTO SUBNET 2 SWITCH/ROUTER ETC. FROM ALLOWED SUBNET 1. PEOPLE KNOW THIS TRICK OF JUMPING FROM ALLOWED SUBNET DEVICES TO NOT ALLOWED SUBNET DEVICES AND THEY MISS USE IT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;OR if you have any other better way, then please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All devices are configured with TACACS. We are using ASA 8.4 and ACS 4.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-anyconnect-user-authorization/m-p/2463531#M270115</guid>
      <dc:creator>raza555</dc:creator>
      <dc:date>2019-03-12T03:41:47Z</dc:date>
    </item>
    <item>
      <title>VPN Anyconnect user authorization</title>
      <link>https://community.cisco.com/t5/network-security/vpn-anyconnect-user-authorization/m-p/2463532#M270116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Riz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment where the device jumps to another box and starts using that box the security failure is actually not on the client o dACL but on the router that is used for SSH,Telnet client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to disable a cisco router or telnet client for being used as a terminal client do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;transport output none &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also perform authorization ;for that user and deny those SSH,Telnet sessions but this will might impact legitimate traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 05:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-anyconnect-user-authorization/m-p/2463532#M270116</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-02-07T05:07:54Z</dc:date>
    </item>
    <item>
      <title>VPN Anyconnect user authorization</title>
      <link>https://community.cisco.com/t5/network-security/vpn-anyconnect-user-authorization/m-p/2463533#M270117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another option you could implement are access lists on the VTY line, that permit access only from certain IP addresses that are used by administrators.&amp;nbsp; This IP range should be different from what is configured on the routers and switches so they will not be able to hop via a router to another subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 1 permit 172.16.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;/P&gt;&lt;P&gt;access-class 1 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 08:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-anyconnect-user-authorization/m-p/2463533#M270117</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-07T08:57:55Z</dc:date>
    </item>
  </channel>
</rss>

