<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security for one specific user in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/security-for-one-specific-user/m-p/2091613#M392537</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5510 version 8.3 (2) that we accept VPN users via a radius server. Is there a way to lock down a specific user that connects to the ASA as a SSL client or IPSEC VPN user? If the specific user were to connect to the ASA, we would want the user to have minimal to not access to our system. Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:49:25 GMT</pubDate>
    <dc:creator>thomas.green</dc:creator>
    <dc:date>2019-03-12T00:49:25Z</dc:date>
    <item>
      <title>Security for one specific user</title>
      <link>https://community.cisco.com/t5/network-security/security-for-one-specific-user/m-p/2091613#M392537</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5510 version 8.3 (2) that we accept VPN users via a radius server. Is there a way to lock down a specific user that connects to the ASA as a SSL client or IPSEC VPN user? If the specific user were to connect to the ASA, we would want the user to have minimal to not access to our system. Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-for-one-specific-user/m-p/2091613#M392537</guid>
      <dc:creator>thomas.green</dc:creator>
      <dc:date>2019-03-12T00:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security for one specific user</title>
      <link>https://community.cisco.com/t5/network-security/security-for-one-specific-user/m-p/2091614#M392538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, there are many options.&lt;/P&gt;&lt;P&gt;Basically ASA accept radius attributes returned for user (during user authentication)&lt;/P&gt;&lt;P&gt;You can return attribute:&lt;/P&gt;&lt;P&gt;IPsec-Split-Tunnel-List with the name of ACL on ASA which will be applied for that user (decides which traffic goes thru the tunnel, which not)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use Radius IETF 25 Class attribute and set it to specific group policy name.&lt;/P&gt;&lt;P&gt;In that group policy on ASA you might want to have for example:&lt;/P&gt;&lt;P&gt;simultaneuous logins = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/uz.html#wp1664777" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/uz.html#wp1664777&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Michal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 07:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-for-one-specific-user/m-p/2091614#M392538</guid>
      <dc:creator>Michal Garcarz</dc:creator>
      <dc:date>2013-01-20T07:05:42Z</dc:date>
    </item>
  </channel>
</rss>

