<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict VPN to certain computers in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868374#M6071</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Are you providing the device to end user to use your corporate laptop ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- I'm not sure if I understand. They will be using a corporate laptop to connect. We want to either prevent connecting from non-preconfigured laptops, or monitor what computers connect remotely.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;you do not want any other device to use any connect ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Correct - Only the computers we specify that have been preconfigured. We want to prevent other machines from connecting to the VPN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I know there are some DACL rules you can set, but I'm not incredibly familiar&amp;nbsp;with this setting.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Jun 2019 19:06:39 GMT</pubDate>
    <dc:creator>info0000102</dc:creator>
    <dc:date>2019-06-05T19:06:39Z</dc:date>
    <item>
      <title>Restrict VPN to certain computers</title>
      <link>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868357#M6069</link>
      <description>&lt;P&gt;Hello!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a situation where, for interoffice compliance, we want to regulate what machines can and can't connect to the AnyConnect VPN service.&amp;nbsp; We're advising our employees that they are to only use work computers to connect to the VPN, as some have used personal devices in the past.&amp;nbsp; However, we are looking to control this (or at least monitor this) if possible.&amp;nbsp; As of right now, there is no authentication server, and we're using ASA 5508x devices.&amp;nbsp; Is it a possibility to control the connections, and if not, can we at least monitor what machine is connecting to the network to address it internally if needed? Thanks for any assistance you can give.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868357#M6069</guid>
      <dc:creator>info0000102</dc:creator>
      <dc:date>2020-02-21T17:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict VPN to certain computers</title>
      <link>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868362#M6070</link>
      <description>&lt;P&gt;Are you providing the device to end user to use your corporate laptop ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you do not want any other device to use any connect ?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 18:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868362#M6070</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-06-05T18:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict VPN to certain computers</title>
      <link>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868374#M6071</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Are you providing the device to end user to use your corporate laptop ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- I'm not sure if I understand. They will be using a corporate laptop to connect. We want to either prevent connecting from non-preconfigured laptops, or monitor what computers connect remotely.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;you do not want any other device to use any connect ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Correct - Only the computers we specify that have been preconfigured. We want to prevent other machines from connecting to the VPN.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I know there are some DACL rules you can set, but I'm not incredibly familiar&amp;nbsp;with this setting.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 19:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868374#M6071</guid>
      <dc:creator>info0000102</dc:creator>
      <dc:date>2019-06-05T19:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict VPN to certain computers</title>
      <link>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868396#M6072</link>
      <description>&lt;P&gt;here is the example certificate based authtentication :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client-v4x/212483-configure-asa-as-the-ssl-gateway-for-any.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client-v4x/212483-configure-asa-as-the-ssl-gateway-for-any.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 19:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868396#M6072</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-06-05T19:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict VPN to certain computers</title>
      <link>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868590#M6073</link>
      <description>&lt;P&gt;you can try using the windows host file to direct non authorized internal workstations when they try to connect to the anyconnect ip&amp;nbsp; to go to 127.0.0.0.&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you want to monitor who is connected it from the asa side, i would create an eem script and have it monitor/look for the syslog # of the anyconnect service when connected then tag in to call-home that way it send (emails) you who just got connected via any connect vpn.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 03:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restrict-vpn-to-certain-computers/m-p/3868590#M6073</guid>
      <dc:creator>herm</dc:creator>
      <dc:date>2019-06-06T03:37:44Z</dc:date>
    </item>
  </channel>
</rss>

