05-29-2016 08:21 AM - edited 02-21-2020 08:50 PM
Hi guys
I configured Cisco Anyconnect SSL VPN with the external authentication server (LDAP). now I want to restrict any user connect to VPN with using a session and no more than one. What can I do?
05-29-2016 09:21 AM
What exactly do you mean with session? You can configure that simultaneous logins are denied.
05-29-2016 11:10 AM
Thanks for your answer
I want each user for connecting to my network using a session.
for example, USER_A with PC1 connect to my network via SSL VPN with session ID 1001, now USER_A unable connect to my network with another PC unless the breakdown session ID 1001.
I know can use simultaneous-logins in LDAP attribute, but How can I do it? Do I need to changes user profile in Active Directory? and what are they changes?
05-29-2016 12:26 PM
Just set "vpn-simultaneous-logins 1" under the specific group policy
05-29-2016 11:37 PM
I check it and doesn't work correctly because that command specifies the number of accounts accepted from group policy for connecting to my network.
05-30-2016 01:44 AM
No, it specifies how many connections with the same user-id to this policy is allowed.
https://www.experts-exchange.com/questions/23979626/What-is-simultaneous-login-on-an-ASA-vpn-group-policy.html
06-05-2016 09:08 AM
I can do it. I have done these settings in order:
Under these settings, USER_A can just one time connect to my network at the same time and it can not connect from any elsewhere.
If I do just item 2 (just set "VPN-simultaneous-logins 1" under the specific group policy). USER_A with PC1 connect to my network via SSL VPN with session ID 1001 and DHCP pool assign it IP address 192.168.1.2, now if USER_A with PC2 connect to my network, USER_A in
I apologize for my poor English language.
Good luck to you.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide