I am testing a solution and I'm having a hard time wrapping my head around it.
We have internal and external VPN "customers" - internal obviously having more access than external. Authentication is all done via RSA and keyfob/token.
One issue we run into is that internal customers currently have the option of using their personal PCs to VPN in from wherever, which isn't ideal. So I'm exploring the idea of configuring DAP for specific group policies to check the PC for a file, registry entry, something along those lines, perhaps LDAP group.
What I don't want to do is have the DAP policy apply to the group policies that my external customers use, as they are allowed to use their PCs. Caveat being they aren't as free to roam on the network as internal.
I'm hoping to gather some thoughts from the community here on what would be the best way to go about doing this before I dive headfirst into promising a result.
Setting up some 3rd party devices for my Fire and Rescue trucks that will VPN back to our FPR-2110. I can blatantly see what's going on with the IKEv2 platform and protocol debugs on. It's selecting the wrong dynamic map!IKEv2-PLAT-4: (32): Cry...
On January 22, 2020, the Cisco Product Security Incident Response Team (PSIRT) disclosed a vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC). The vulnerability could allow an unauthenticated, remote attac...
Meet the Authors Event - A Cybersecurity Deep Dive with Omar Santos
(Live event – Thursday, January 23rd, 2020 at 10:00 a.m. Pacific / 1:00 p.m. Eastern / 7:00 p.m. Paris)
This event will have place on Thursday 23rd, January 2020 at 10hrs PDT
Posting this for anyone interested in using a Raspberry PI as a flow collector for Stealthwatch. We created a very lightweight version of our software. It can create flows if the eth port is attached to a SPAN or you can forward NetFlow/IPFIX ...