10-29-2020 05:57 AM
Hello,
We use Cisco anyconnect for our RA access. Right now, everyone can use anyconnect client and login to VPN from any country, is there a way to restrict logins from certain countries? First, is it even possible? My thought was Sourcefire only comes in play when you're already on the network not when you're trying to get on. If it is possible, will I be restricting anyconnect logins from anyconnect or will it just kill any traffic from those countries? Thank you
Cisco Firepower Management Center 750
10-29-2020 06:09 AM
Hi @Hulk8647
You cannot configure geo rules on the local FTD (the FTD that is acting as the RAVPN headend device) to restrict anyconnect logins from certain countries.
You'd have to put another device in front of the RAVPN headend device, then you could restrict this access.
HTH
10-29-2020 06:53 AM - edited 10-29-2020 06:54 AM
there is nothing I can do even on ASA? (5516) which is where that RA vpn is configured?
10-29-2020 06:58 AM
You mentioned Sourcefire, I assume you meant you were running FTD. With ASA you can configure a control-plane ACL and applied to the outside interface, this however relies on you knowing the Korean IP address ranges.
Even if you had an FTD, you cannot use geo location rules for traffic destined to the device, only for traffic through the device.
HTH
10-29-2020 07:41 AM - edited 10-29-2020 07:42 AM
To confirm and further illustrate what @Rob Ingram is saying...
If you are using an ASA with Firepower service module as your VPN headend and firewall both then you cannot use the Geoblocking capability of Firepower to restrict VPN client addresses.
You can deny access to certain addresses or networks (using a control plane ACL) but very few people try to geoblock that way as it not generally practical to keep track of every address that comes from a certain country. (Firepower does that with a geolocation feed that is updated automatically every couple of weeks.)
If your ASA sits "behind" a Firepower Threat Defense (FTD) firewall (for example, in a DMZ) then you can restrict access to the ASA's outside interface with the geoblocking feature on the FTD device.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide