06-03-2020 05:52 AM
Good afternoon,
I am after a bit of help regarding a Remote Access solution we are designing to allow Engineers to manage and configure our network devices via SSH/HTTPs through a RA VPN via our Internet Edge.
We have a dedicated VPN firewall Cisco ASA 5525X in our Edge to terminate Engineers VPNs, but was wondering whether a Client based Anyconnect solution was better than a Clientless one for this design.
Ideally we would like to use exisiting Engineering laptops however we need to ensure that the security of our network is not compromised by an infected endpoint. Perhaps Clientless maybe a better solution in this case is what I was thinking.
Any help would be much appreciated. Thank you.
06-03-2020 06:08 AM
06-03-2020 08:46 AM
I agree. Among other things, running SSH in a clientless setup is both technically ugly and offers questionable security.
06-03-2020 11:21 PM
If I was asked to create a locked down VPN, I'd use:
If it was a corporate production environment (i.e. for customer-facing revenue-generating resources) I'd further segment access by requiring a jump server.
In either case also enforce MFA for device access in addition to VPN access (zero trust model).
06-04-2020 01:46 AM
Thank you for the feedback.
Yes we are running ASA software on the VPN Firewall. I think we have some Anyconnect Apex licenses for the remote engineers laptops, but there are concerns over the security posture of these laptops as they do connect to the Internet.
We don't have ISE, only ACS, so would have mean any posturing will be done within the ASA?
I have heard of Duo and I think this is a technology we could implement for this scenario, although are scope of users is probably around 25.
06-04-2020 01:59 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide