07-09-2011 07:27 AM - edited 02-21-2020 05:26 PM
Need a ASA rule that allows only a specific VPN user access to a specific internal IP. Is there a way to do this? We use ACS for AD authentication for the remote VPN users, so the user is known? Can I do this in the ASA (preferred), or do we need to get creative with the ACS? We use a IP pool for the VPN user IPs, so I don't know the user IP ahead of time.
Thanks,
-Keith
Sent from Cisco Technical Support iPad App
07-09-2011 08:13 AM
Hi Keith,
I see two ways to do this but both of them will require a little help from the ACS server.
1.) Different group-policies
You can set the group policy the user will be put into by setting the attribute 25 value on the ACS to "OU=
Once this is done, you can bind a different vpn-filter to each group-policy and control your user access through this mean.
2.) Setting up the vpn-filter on the ACS directly.
You can define the vpn-filter on the ACS directly through the AV-pair attribute on your ACS. With this method, you can have all users share the same group-policy but use different vpn filters.
More info on how to set this up:
http://www.cisco.com/en/US/partner/docs/security/asa/asa80/configuration/guide/extsvr.html#wp1675755
Regards,
Nicolas
07-09-2011 10:07 AM
Thanks, I'll try your suggestions.
- Keith
Sent from Cisco Technical Support iPad App
07-09-2011 07:10 PM
Hey Keith,
We tried this and found it was much easier to bypass ACS and go straight to AD using LDAP, and map to different VPN group policies based on AD group membership. Much cleaner and lots more options for control.
Russell
Sent from Cisco Technical Support iPad App
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide