If you want to make different rules for different users and still have them use the same VPN Client profile/group, you can do it.
If you want specific configuration help you will need to provide me with information about the local networks (LAN and VPN Client) and what kind of access rules you want for the users etc.
Generally you can try the following approaches:
Configure each user which traffic you want to restrict with his/her own VPN IP address under the username configuration on the ASA
The user will always get the same IP address from the ASA when connecting with VPN Client and therefore you will know what the source address for his/her connections will be
When you have configured the IP addresses under the usernames, you can for example create an "object-group network " for them, add the mentioned IP addresses there and use that "object-group" for access rules for the VPN Client.
Rest of the VPN client usernames can be left to use the basic VPN Pool and in the access rules you can permit them to access anything behind the ASA.
As I said, the above is just the general approach you could take to easily limit access to some and permit all for others.
For more specific configuration I would need to see what the configuration looks like now.
SymptomsOutage during FTD code upgrade DiagnosisThe FTD code upgrade thru FMC will cause the traffic interruptionSolutionBelow process will upgrade the FTD with no downtime and no traffic interruption.Before the upgrade process:Download the FTD platf...
Process for FTD migration with PolicyAs per Cisco documentation, we have below steps for for de-register and register process. Please follow below steps :Step 1 : Break HA pair and de-register your FTD from FMC (old).Step 2 : Register your primary FTD wit...
Hi There,Is there a relationship between the hardware of the Cisco ASA 5505 FWs (V02) and the 9.x software version? Multiple ASA have been successfully updated with the same software. The ASAs that have been updated without any problems are V06 versi...
Dear Cisco Customers and Partners,
We know that the Cisco Identity Services Engine (ISE) is a critical element of your network security and so stability is of paramount importance. As a result, many of you asked us for a suggested release given sev...
Over 100-year-old Yokogawa Engineering Asia deploys Cisco Advanced Malware Protection (AMP) to shield itself against cyber attacks. With Cisco Talos threat intelligence, it stays ahead of the latest malicious behavior on the Internet. Learn more at http:/...