02-15-2008 03:50 AM - edited 03-05-2019 09:10 PM
Hi there.
I have a 2611 router, IOS version 12.3(25), configured as an VPN server. I have already configured the IP Sec parameters, users...and it is all working fine. But my customer needs to limit the access of one user that uses the same group and interface of the others. Is it possible to set up an AAA profile that matches some ACL to permit access to a few IP addresses? I was thinking a method to set up an ACL and implement it on the interface, but this will affect the traffic of the other users, since their external access addresses are dynamic (one time they are at home, other time they are on the remote office and so on). Note: we do not have an authentication server. Any ideas? Thanks in advance.
Regards.
02-15-2008 06:19 AM
One option would be to create a seperate group for this user and limit access based on a network list.
Hope this helps. If so, please rate the post.
Brandon
02-15-2008 07:08 AM
Hi Brandon, actually I did it already. But another problem has raised: I have just one interface with a valid public IP address. When I map the group on the interface, the other group is removed by default. I was thinking about to create sub-interfaces, but in this case I have to assign a second IP address on the sub-interface. Do this solution will work? By the way, thanks a lot for your help.
Regards.
02-15-2008 01:04 PM
Separate VPN group associated with different ACL should work for you as Brandon pointed out.
I guess you may be confused with crypto map group setup. Remember, you can assign different crypto map group number for different VPN group.
02-18-2008 04:44 AM
Hi James.
Yes, I know that I can assign different crypto map group for different VPN groups; the problem that I am facing is that the customer router have only one physical interface available, with just one valid public IP address available also. So, when I assign one group to the interface, the other user group is removed because I can have just one crypto map group assigned to the interface. Both groups works well, but with this inconvenience. The major problem is that my customer does not have a server which I can customize to run RADIUS authentication; so I cannot work with authentication profiles. I don't know if I could explain well, but this is the problem...
All the documentation that I found is focused on the same basic solution: RADIUS servers working as an authenticator and authorizing the user access based on network profiles.
Thanks a lot for your help.
02-27-2008 11:45 AM
are you build up a site2sit2 vpn tunnel or dynamic vpn tunnel for customer? how can you identify that specific user?
the requirement: "to limit access based on user profile but not ip" can be achieved by cisco vpnclient + different vpngroup setup in vpn server site
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide