<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DAP rule for IPSec clients in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337574#M969933</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, that worked.  Follow-up question though.  So the only thing I'm looking at doing right now is setting up a policy to look at Anti-virus and disallow if the signature is more than a week old.  Works fine with the AnyConnect.  But if I add that to the IPSec rule (app = ipsec and av exists (&amp;lt; 7 days), it won't let the IPSec client connect at all.  I seem to recall something about if we're doing posturing with IPSec client, we have to use endpoint assesment or pre-login policy?  Is that the case;  it would be nice to do it all w/in one DAP rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Nov 2009 17:18:18 GMT</pubDate>
    <dc:creator>brian.kennedy</dc:creator>
    <dc:date>2009-11-02T17:18:18Z</dc:date>
    <item>
      <title>DAP rule for IPSec clients</title>
      <link>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337572#M969931</link>
      <description>&lt;P&gt;I'm setting up DAP rules for AnyConnect clients.  When I set the default policy to terminate, I get the right results from AnyConnect connections, but all IPSec clients cannont connect.  I know I need to set up a DAP rule for IPSec clients to allow them through, but can't remember how to set that up.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:46:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337572#M969931</guid>
      <dc:creator>brian.kennedy</dc:creator>
      <dc:date>2020-02-21T11:46:09Z</dc:date>
    </item>
    <item>
      <title>Re: DAP rule for IPSec clients</title>
      <link>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337573#M969932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can add a policy for your IPSec users which will match on the "application" endpoint attribute type.  You will then set the "client type" to "IPSec" and the default action to continue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Nov 2009 16:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337573#M969932</guid>
      <dc:creator>Todd Pula</dc:creator>
      <dc:date>2009-11-02T16:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: DAP rule for IPSec clients</title>
      <link>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337574#M969933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, that worked.  Follow-up question though.  So the only thing I'm looking at doing right now is setting up a policy to look at Anti-virus and disallow if the signature is more than a week old.  Works fine with the AnyConnect.  But if I add that to the IPSec rule (app = ipsec and av exists (&amp;lt; 7 days), it won't let the IPSec client connect at all.  I seem to recall something about if we're doing posturing with IPSec client, we have to use endpoint assesment or pre-login policy?  Is that the case;  it would be nice to do it all w/in one DAP rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Nov 2009 17:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337574#M969933</guid>
      <dc:creator>brian.kennedy</dc:creator>
      <dc:date>2009-11-02T17:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: DAP rule for IPSec clients</title>
      <link>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337575#M969935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't do hostscan with IPSEC, which is required for checking whether av/as/fw is installed.  You have to use anyconnect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Nov 2009 17:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337575#M969935</guid>
      <dc:creator>Jason Gervia</dc:creator>
      <dc:date>2009-11-02T17:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: DAP rule for IPSec clients</title>
      <link>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337576#M969937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, no posturing for av/as/fw at all with IPSec, or just through the DAP?  W/ pre-login policies you can check for file/registry/os, etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Nov 2009 17:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dap-rule-for-ipsec-clients/m-p/1337576#M969937</guid>
      <dc:creator>brian.kennedy</dc:creator>
      <dc:date>2009-11-02T17:32:58Z</dc:date>
    </item>
  </channel>
</rss>

