<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Anyconnect - Internet AD User based policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375017#M960665</link>
    <description>&lt;P&gt;Have you tried applying these rules using tunnel policies?&lt;/P&gt;</description>
    <pubDate>Sun, 29 Apr 2018 09:20:27 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2018-04-29T09:20:27Z</dc:date>
    <item>
      <title>FTD Anyconnect - Internet AD User based policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3374985#M960594</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After deploying Anyconnect VPN and successfully allowing the Anyconect IP Pool to access the internal network resource, now I am facing challenges to deploy a internet policy for these Anyconnect VPN user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to restrict the Anyconnect users going out on the internet using a AD username based policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I create a outside to outside policy keeping the source as the Anyconnect VPN pool and destination as any with defined AD users and applications like outlook then this policy doesn't hit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems that the FTD is not able to check the AD users added to the policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The rest of the inside to outside policies based on AD username, are working perfectly fine !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let me know your views on this.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3374985#M960594</guid>
      <dc:creator>er.ankitsharma</dc:creator>
      <dc:date>2020-02-21T15:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Anyconnect - Internet AD User based policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375017#M960665</link>
      <description>&lt;P&gt;Have you tried applying these rules using tunnel policies?&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 09:20:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375017#M960665</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-29T09:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Anyconnect - Internet AD User based policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375191#M960666</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't tried applying these using tunnel policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can we use tunnel policies for Anyconnect VPN and also can we restrict traffic based on usernames using tunnel policies ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also I noticed connection events where the 'initiator user' column&amp;nbsp; says 'no authentication required' for the Anyconnect traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 03:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375191#M960666</guid>
      <dc:creator>er.ankitsharma</dc:creator>
      <dc:date>2018-04-30T03:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Anyconnect - Internet AD User based policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375237#M960667</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Can we use tunnel policies for Anyconnect VPN and also can we restrict traffic based on usernames using tunnel policies ?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As far as I know, it is not possible to restrict traffic based on usernames using tunnel policies.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 07:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375237#M960667</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-30T07:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Anyconnect - Internet AD User based policy</title>
      <link>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375264#M960668</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think we cannot use tunnel policy for this issue. And now I have resolved this issue using Identity policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 08:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-anyconnect-internet-ad-user-based-policy/m-p/3375264#M960668</guid>
      <dc:creator>er.ankitsharma</dc:creator>
      <dc:date>2018-04-30T08:28:23Z</dc:date>
    </item>
  </channel>
</rss>

