<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WebVPN restrictions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856456#M963304</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think you can deny access to the webvpn access using standard interface ACL's.  But I don't know of any other way to restrict it either, unless there is a device in front of the ASA that can do some blocking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Sep 2007 16:16:40 GMT</pubDate>
    <dc:creator>srue</dc:creator>
    <dc:date>2007-09-14T16:16:40Z</dc:date>
    <item>
      <title>WebVPN restrictions</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856454#M963300</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have a concern about webvpn.&lt;/P&gt;&lt;P&gt;after you enable webvpn on the outside interface of ASA, so now anyone can login to the page and try to login , doesn't this have the potential of a brute force attack, can't we restrict who can even see the webvpn page ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856454#M963300</guid>
      <dc:creator>josephium</dc:creator>
      <dc:date>2019-03-11T11:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: WebVPN restrictions</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856455#M963302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Josephium,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is a good quesiton about brute and I do not know the answer, if anyone does would love to learn it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the things I have done is implement in ver 8 the virtual software keyboard. This appears when users try to enter their password. I would think this would hinder many brute attacks and it makes access more secure as there is no local caching inadvertently, its all mouse clicks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can certainly deny subnets to the outside interface of the ASA, I do suspect that would quickly become an admin nightmare.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 13:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856455#M963302</guid>
      <dc:creator>whisperwind</dc:creator>
      <dc:date>2007-09-14T13:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: WebVPN restrictions</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856456#M963304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think you can deny access to the webvpn access using standard interface ACL's.  But I don't know of any other way to restrict it either, unless there is a device in front of the ASA that can do some blocking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 16:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856456#M963304</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-09-14T16:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: WebVPN restrictions</title>
      <link>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856457#M963307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should use AAA authentication with a lockout after a certain number of failed attempts.   For instance use a LDAP server to lookup user accounts against active directory.  The accounts can be set to lockout after a number of invalid attempts.  This won?t prevent access to the portal but will help to prevent un-authorized authentication.  8x code has very good support this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2007 21:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webvpn-restrictions/m-p/856457#M963307</guid>
      <dc:creator>cnienhuis</dc:creator>
      <dc:date>2007-09-14T21:16:14Z</dc:date>
    </item>
  </channel>
</rss>

