03-02-2020 09:37 AM
Hello
I have a general question on VPN and best practices when it comes to how to deploy it. I have had other jobs where VPN is already setup and deployed to users and devices within our domain/AD. At this new place, we are still working it out, but the difference here is the supervisor wants to roll out the VPN client to users that will be connecting from their personal devices (PC's). My concern is letting these devices that are not in our domain into our network. As I've said every where else I worked, WE MAINTAINED those devices, made sure they were patched, up to date antivirus and things like that.
We are using Global Protect and I know it can check for those things before allowing a connection. I've mentioned things like mapped drives and GPO will not work since they are not assets owned by our org and not within our domain but he said he would not support the idea of buying laptops for remote users ¯\_(ツ)_/¯
What do you all think? Do you work in an environment where they let personal computers VPN into a domain? With today's VPN technology is this practice considered safe? Is it safer to allow only devices already existing in the domain?
03-02-2020 09:53 AM
03-02-2020 09:56 AM
it depends on each company policy. do worry too much having a good security is good. but if the company does not want to invest that their problem you done the right think tell them what is the best way to do it.
give you an example. Alpha company give their employee laptop with AD join and all patching updates etc. they think they are secure on the network side. however on anyconnect side for user authentication they using LDAP to authenticate the user. which mean user can connect to company network from outside with any laptop as long as his AD credentials are alive and working s/he can connect. so here you go security is compromise now :(
to make network secure you can do a posture (ISE) at anyconnect with user and machine cert. but as said earlier. it a user education everyone/every company is different. you made your point if they does not consider this its not your problem.
03-02-2020 10:06 AM
"however on anyconnect side for user authentication they using LDAP to authenticate the user. which mean user can connect to company network from outside with any laptop as long as his AD credentials are alive and working s/he can connect."
This is literally what will be occurring and also why I am expressing concern :(
We are using certificate along with LDAP login. I guess the best way to try and band-aid this is to do the security posture checks prior to connection.
03-02-2020 10:11 AM
for this you need ISE deployment. which is another project so as long as you convince your employer you good to go. LDAP with cert is good least your have more control though.
03-02-2020 08:58 PM
Dear ,
As i read your post.
You want to authenticate user with no compromise AD
1. option will be AD authentication (that you dont want to use).
2. Radius authentication , (You can use custom radius software or Cisco authentication solution
-- Cisco Identity Services Engine (ISE)
3. You can use two fector authentication duo - for this you have to buy duo solution .
This are the option to authenticate Any connect VPN , You can choose what you have convenient to use.
I hope you got your answer .
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide