06-16-2010 06:27 AM
I have ASA 5520 firewall in my enterprise.Remote access VPN is configured in firewall for users.Now i want create a new vpn group.This new group vpn users should connect only from the allowed public ip.
Is it possible to achieve it in the ASA without affecting the exisiting user vpn access.
06-16-2010 06:58 AM
Hi,
The ASA will respond to all ISAKMP requests from any public IP when configured for IPsec.
If you create an ACL apply it with ''control-plane'' and restrict which IPs can connect via VPN to the ASA is an option, but that will affect all VPN connections.
To apply a restriction of the source IP for VPN for a certain VPN group, the only option that I see is using an ACS server that applies this restriction to the VPN group.
Federico.
06-16-2010 08:36 AM
Thx for the suggestion.Applying acl on ctrl plane will affect my user VPN too.
I dont ACS server.I want to achieve it with ASA.
06-16-2010 11:07 AM
I don't think there's a way to do this on the ASA itsefl unfortunately.
The only way to restrict the ASA from responding to IPsec (on the ASA itself) is by applying an ACL with the control-plane keyword.
But the problem is that it will affect all VPN connections.
Federico.
06-27-2017 11:47 PM
There is best solutions:
- If you use AAA based on LDAP, then use:
nat-assigned-to-public-ip {interface}
- If you use AAA based on RADIUS, then use:
NAS-Port-ID (RADIUS attribute 87)
NAS-Port-ID = Public IP in AnyConnect VPN.
Details:
11-10-2014 03:35 AM
Is that Possible to do for SSL Client VPN ???
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide