12-13-2012 05:12 AM
Hello,
I have a question.
I can make some "local policy" with client of SSL VPN AnyConnect and block access to internet?
The user would only have access to the internet if he was connected to the VPN (by internal proxy).
Thank you & Regards.
12-13-2012 08:34 AM
What do you mean by local policy?
User would need internet connection to connect with SSL VPN. Do you want the user to connect to the internet via the ASA through the proxy if they are connected on SSL VPN?
If that is the case, then you can remove the split tunnel policy, and configure tunnelall, then all traffic will traverse via the ASA when user is connected to SSL VPN.
12-13-2012 08:57 AM
Thank you for the quick answer Jennifer.
My question is if I can block the internet and leave just "only open" the address (url) of the SSL VPN.
Once connected the user authenticated on my proxy and could access the internet.
I think would be a local policy on the user's computer to do that, just don't know if it is possible.
Regards.
12-13-2012 09:20 AM
Hello Rafael,
On the ASA you could restrict the traffic from the client to the internet if need it, allow the traffic from the VPN clients to the proxy and then only allow outbound internet access from the proxy ip address,
I think that is what you are looking and yes it is possible
Regards
Julio
12-13-2012 09:33 AM
Hello Julio,
I can see how to do this by GPO of Operating System.
Block all internet traffic and release only: SSL VPN (IP External) and Proxy (IP Internal).
Do you would know if it would be possible to do with AnyConnect? (create one local policy)
Thank you.
12-13-2012 10:52 AM
Hello Rafael,
FIrst of all lets make sure we are on the right page,
What we are going to do is to send all the client traffic across the SSL tunnel ( even the internet traffic) then on the ASA side we will allow only outbound traffic from the proxy server ip address.
Is this what you are looking for?
Regards
12-13-2012 11:22 AM
Hi Julio,
I think we have some misunderstanding.
I don't have a "split tunnel" - by default all traffic of internet go to SSL Tunnel (when connected on SSL VPN).
My problem:
I can't let the user connect to Internet, only can connect if connected to VPN.
If the user is using "public internet" (hotspot, home) - I'll allow only connect to VPN.
I've seen other solutions manufacturer that does that.
Regards.
12-13-2012 12:59 PM
Hello Rafael,
Well in order to allow the user to go to the internet you will need to perform an U-turning and Nat it to the outside interface the thing is that as soon as you add that the traffic will be allowed by default. I would say you could configure an ACL for the outside interface on the outbound direction and restrict the traffic there,
Regards,
Julio
12-14-2012 03:07 AM
Hello Julio,
I think this forum (http://goo.gl/d8h6x) better explains my question.
I found something https://communities.cisco.com/thread/24669 (Boot VPN).
Regards.
12-14-2012 08:11 AM
Hi Rafael,
You are right. Cisco AnyConnect can't push policy if you are not connected to the SSL VPN to restrict internet access. This is something that Microsoft GPO does.
However, Cisco does have a Web Security product called ScanSafe that is on the cloud that can protect your web traffic. It does web scanning and URL blocking, and you can use the AnyConnect Web Security module to send the web traffic to the ScanSafe cloud proxy when the user are not in the office. If you are interested, pls kindly contact your local Cisco account representative.
Here is more information on ScanSafe for your reference:
12-14-2012 08:34 AM
Thank you Jennifer and Julio.
I'll check the ScanSafe solution.
Regards.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide