05-20-2009 01:22 AM - edited 02-21-2020 03:28 AM
Hi,
This is a wierd request as it flies in the face of the purpose of vpn clients but I ahve my reasons:
We don't like Split-T but we have a userbase on a customer site that require it. I have made a special profile for them but they tend to hand out the .pcf to others as well as using it from home, etc. So I want to tie this group policy to a single source address.
Termination device is a 5520 with 8.x
Can it be done in the crypto definition or do I need to use an ACL entry on the outside interface?
Many thanks in advance,
Mike
05-20-2009 01:49 PM
Hi Mike,
Have a look at this complete link, implementing digital certificates for controlling your VPN ra users authorized sources.. you can also have ASA as local CA server as suppose to using third party.
http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/cert_cfg.html#wp1002608
Regards
05-20-2009 05:14 PM
Thanks jorgemcse,
A bit low on time to read that whole doco right now so I won't rate your post. But thanks anyway and it will be good to investigate using the ASA as a local CA server on top of my current issue.
Regards,
Mike
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide