group-policy VPNCLIENT internal group-policy VPNCLIENT attributes ! USE MY DNS SERVER (Optional) dns-server value 192.168.1.2 192.168.1.3 vpn-tunnel-protocol ikev1 ! FORCE THE VPNCLIENT TO TUNNEL ALL TRAFFIC split-tunnel-policy tunnelall
tunnel-group VPNCLIENT type remote-access tunnel-group VPNCLIENT general-attributes address-pool VPN-POOL default-group-policy VPNCLIENT tunnel-group VPNCLIENT ipsec-attributes ikev1 pre-shared-key shhhh!!!! ! (OPTIONAL) DISABLE PROMPTING OF A USERNAME AND PASSWORD - I LEAVE THIS OFF FOR TESTING ikev1 user-authentication none
Issue: I have 1 username within CISCO ISE that I wish to limit to only being able to TACACS into 1 device. e.g. BOB SMITH can SSH / WebUI into device X only.. I have been testing with Policy Sets / Policy Elements. Not sure if I'm on the correct...
I recently did an upgrade on an sfr on 5545 with Firepower Services from 6.2.0 to 6.4.0. The upgrade took a little more than an hour and everything thing came up on the sfr module ok after the reboot. Looking at it through the FMC, everything seems f...
I'm trying to open web traffic to: upgrade.bitdefender.com on an FMC. I made a change to the access control rules as indicated in the attached pic, but it's had no effect. Is the correct policy to modify? Thanks!