cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1945
Views
10
Helpful
5
Replies

How to make sure only corporate machines are allowed to go inside corporate network using Cisco ASA 4110 ?

Jhon2
Level 1
Level 1

Hi,

Does any one knows  How to make sure only corporate machines are allowed to go inside corporate network using Cisco ASA 4110 and stop personal machines going inside?.

 

Thanks! 

1 Accepted Solution

Accepted Solutions

You can use a Dynamic Access Policy (DAP) to check the value of various attributes on the remote PC, including thing such as a registry key that identifies it as a domain-joined computer. That's a 7.0 feature.

https://www.cisco.com/c/en/us/td/docs/security/firepower/70/relnotes/firepower-release-notes-700/features.html#Cisco_Concept.dita_4fafcd80-18a7-4ffc-9d80-ba1fbd412f6b

You could also issue machine certificates and use that as one of several means of authentication. i.e., machine certificate plus username/password (LDAP, with MFA enforcement).

https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/firepower_threat_defense_remote_access_vpns.html#id_login_via_clientcert_aaa

View solution in original post

5 Replies 5

Hi Jhon

I think you are looking for Cisco Trustsec, please see the following link and let us know if it is what you need.

https://www.ciscolive.com/c/dam/r/ciscolive/apjc/docs/2016/pdf/BRKCRS-2891.pdf

 

Regards.




>> Marcar como útil o contestado, si la respuesta resolvió la duda, esto ayuda a futuras consultas de otros miembros de la comunidad. <<

thanks for your kind assistance @Julio E. Moisa 

Hi Julio,

 

Thanks for your answer.

 

But I will try be more specific on my question through giving you some more Context:

 

As I wrote before the scenario is CISCO ASA 4110 as VPN Concentrator, Cisco AnyConnect Secure Mobility Client and a MFA to give users access to the corporate network. The problem is:

How to make sure only corporate machines are allowed inside the corporate network if users are using valid LDAP credentials and clients (AnnyConnect and MFA) installed in personal computers allowing not corporate machines going inside the intranet (actually they can)?

 

Is there any special policy/attribute  we can use on CISCO ASA 4110 in conjonction with LDAP to validate only corporate assigned machines to a valid user in the LDAP can authenticate and get inside the network?

 

I was reading on manual asa-95-vpn-config.pdf a possible solution scenario like this:

 

Enforce Logon Hours and Time-of-Day Rules

The following example shows how to configure and enforce the hours that a clientless SSL user (such as a

business partner) is allowed to access the network.

On the AD server, use the Office field to enter the name of the partner, which uses the

physicalDeliveryOfficeName attribute. Then we create an attribute map on the ASA to map that attribute to

the Cisco attribute Access-Hours. During authentication, the ASA retrieves the value of

physicalDeliveryOfficeName and maps it to Access-Hours.

 

Is this  last one an alternative or we need another component to limit personal computers using valid credentials and clients?

 

Thanks in advance!

You can use a Dynamic Access Policy (DAP) to check the value of various attributes on the remote PC, including thing such as a registry key that identifies it as a domain-joined computer. That's a 7.0 feature.

https://www.cisco.com/c/en/us/td/docs/security/firepower/70/relnotes/firepower-release-notes-700/features.html#Cisco_Concept.dita_4fafcd80-18a7-4ffc-9d80-ba1fbd412f6b

You could also issue machine certificates and use that as one of several means of authentication. i.e., machine certificate plus username/password (LDAP, with MFA enforcement).

https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/firepower_threat_defense_remote_access_vpns.html#id_login_via_clientcert_aaa

Thanks a lot Marvin!

 

Both  answers sounds  great, I´ll try both of them and give my comments.

 

Regards,

 

Jhon.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: