Control the access of the user for the SSL VPN profile.

I have two ssl vpn profile, can I restricted the user to access only ssl vpn profile, when they get to the page of the ssl vpn service. Each profile to create different types of access, and they will have different client IP address.

Hello

Yes, using different ways; one of them is using group-lock, which is a simple check to validate if the Tunnel group or the connection profile as you called it with that sign corresponds to what you have defined under group policy. If the value of Tunnel-Group-Lock (condition true), the VPN remote access session is allowed to install;  otherwise the session is not allowed to be implemented.

The tunnel-group-lock featurecan be defined as follows:

  • via the group-policy setting locally on ASA
  • via the LDAP attribute
  • via the Radius attribute

http://www.Cisco.com/en/us/partner/docs/security/ASA/asa82/configuration/guide/vpngrp.html#wp1134870

Step 4

Kind regards

Tags: Cisco Security

Similar Questions

  • prevent the SSL VPN user to access ASA cli

    Hello

    I set up multiple users on my ASA in its local database.

    These users are used for the ssl vpn connection, but the problem I have is that users

    also have SSH access. Is it possible to avoid this?

    Thank you

    Hello Raf,

    If you do something like this:

    username xxx attributes

    type of remote access service

    the user should not get access CLI more.

    Kind regards

    Bastien

  • THE SSL VPN CLIENT ERROR!

    VPN concentrator running 4.7. I have to connect to the web vpn session. The SSL VPN Client installs. Message that says: "so that the SSL VPN connection is pending" and later another message appears that says "HTTP RESPONSE received from gateway SSL VPN is not valid" appears.

    What is strange is that the VPN concentrator lists me as it is connected with an IP address assigned to the ACS, but I can't access anything whatsoever. BTW, no ACLs WEB or IP filters are configured for this group that would not allow me access to the network. In addition, with the same information identification and the same group, I have no problem to access the network when the client SSL VPN is not configured to be used. IE web vpn before 4.7.

    Any ideas?

    The "VPN SSL HTTP RESPONSE received from gateway is incorrect" message may appear if the configuration of the client of the concentrator contains over split tunneling 26 entries.

  • which product is right for the ssl vpn: asa 5505 cisco 1841 or

    Hello

    I want to install an outside link management related so that we can ssh to our cisco devices and microsoft RDP toour servers. It's my configuration (based on what I know):

    Internet > DSL modem > ASA 5505 > management CONSOLES SWITCH > SWITCH CISCO or Windwos Server

    or

    Internet > 1841 with DSL HWIC > management CONSOLES SWITCH > SWITCH CISCO or Windwos Server

    My questions are:

    Should I go for ASA or 1841 router?

    What options is better? and ASA will do the job?

    Are there any technical support prior to purchase of products in Australia? I need technical advice on the choice of the right products, not justs eiling me products.

    Hello

    Its strongly suggested to go with ASA 5505 in the first place, it is supposed to feature for the main functionality of ssl vpn server from 1841 which has this feature to be a vpn server.

    ASDM also gives you the freedom to config box on your own based on your condition.

    regds

  • How to disable control panel access to other users

    I would like to set up a Windows 7 Pro machine so that the administrator or the Administrators group can access the control panel and disable other users to access.  So far, I can use GP to disable all access or allow access for ALL, but not to be selective in who I grant access.

    Thank you.  These items were not what I was looking for.

    That's what I needed.

    http://www.SevenForums.com/tutorials/101869-local-group-policies-apply-all-users-except-administrators.html

  • ACL rule does not work after the SSL VPN connection

    Hello

    I have the following configuration:

    -VLAN LAN (192.168.5.0/24)

    -VLAN WLAN (192.168.20.0/24)

    -SSL VPN VLAN (192.168.200.0/24)

    Default policy denies access to the local network. If the value rule ACL to allow traffic between WLAN and LAN. Works very well.

    Now I connect with AnyConnect and access resources on the network VLAN. Works.

    After you have disconnected the VPN I can't access the LAN to WLAN VLAN. If I disable the ACL rule and turn it back on, it works again until someone connects with SSL VPN.

    I use firmware 1.2.15. Any ideas when this bug fixed?

    Kind regards

    Simon

    HI Simon,.

    This bug will be fixed in 1.2.16.

    I don't know the exact date for the release.

    But it should be out soon. If you need the fix sooner,

    Please open a case of pension.

    Kind regards

    Wei

  • Cannot change the SSL VPN customization

    Hello

    I have ASA 5520 and activate SSL VPN

    I want to optimize my portal page, removing the "Cisco SSL VPN" and put my company name and logo.

    I created a new customization, but when click on Edit to change a wen page appears but the load.

    can someone help me?

    Concerning

    If you want to change the Cisco logo for your company logo, please follow this example configuration for personalization of Portal:

    Change the logo:

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00808bd92b.shtml

    Change the title:

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00808bd861.shtml

    Hope that helps.

  • images of the SSL vpn-html-content filtering

    Hello

    I'm trying to do content filtering via ssl VPN (clientless) on ASA 5505

    Above command is supposed to block anything with the html img tag, but it seems not to do.

    # sh run Group Policy

    Group without internal customer-grp-policy policy

    attributes without customer-grp-policy-group policy

    value of server DNS 8.8.8.8

    VPN-tunnel-Protocol webvpn

    Split-tunnel-policy tunnelall

    WebVPN

    bookmark URL-list value

    filtering the content-HTML-java images cookies

    SVC request to enable default webvpn

    #sh run tunnel-group

    Remote clientless-tunnel tunnel-group type

    attributes global-tunnel-group clientless-tunnel

    without client group policy - by default-grp-policy

    tunnel-group clientless-tunnel webvpn-attributes

    Group-alias clientless-alias enable

    What I'm missing here? or am I just misunderstood how it works?

    Thank you!

    Hello

    How it works for you?

    HTML-content-filter

    Thank you.

    Portu.

  • New for mapping SSL VPN ACS ASA - ASA groups

    Greetings,

    I am new to ASA, so any help is greatly appreciated.

    I just installed and installed an ASA 5520. I installed an SSL VPN. What I'm trying to achieve is to configure profiles of different groups and different users can access various resources when they access the VPN.

    Current config-

    ASA 5520 v8.3

    ACS 4.0

    Field of Windwos 2003

    I have different installation profiles in the ASA. (i.e. business Dept.) When I choose in the drop down menu, it allows me to open a session and displays the options I've chosen for this group. The problem is that I can connect in this group with any account. GBA, all windows domain users are in the default group. I guess the default group is being processed and which has hosted and user logon.

    Can anyone provide a good article or tips on how to configure the ASA and the ACS for several groups of users. We have several departments that will have to get the parameters when they connect. The ACS groups are mapped to the Windows groups that correspond to each Department

    Any help is greatly appreciated.

    Thank you

    Tim

    Hello

    I think that you need to activate locking group.

    In order to configure Group locking, send group policy name in the attribute class 25 on the Authentication Dial - In User Service (RADIUS Remote) server and choose the group to lock the user in policy.  For example, to lock the user 123 of Cisco in the RemoteGroup group, define the class of attributes 25 Internet Engineering Task Force (IETF) UO = RemotePolicy; for this user on the RADIUS server.

  • Should what license I for 25 SSL VPN peers

    Hi all

    I want to implement cluster active / standby with a pair of ASAs 5550 and I have a licensing question. Here's the "sh - key retail activation" leave two output devices...

    ASA1:

    SH - activation in detail key:

    Serial number: XXXXX

    No temporary key assets.

    Activation key running: XXXXX XXXXX XXXXX XXXXX XXXXX

    The devices allowed for this platform:

    The maximum physical Interfaces: unlimited

    VLAN maximum: 250

    Internal hosts: unlimited

    Failover: Active/active

    VPN - A: enabled

    VPN-3DES-AES: enabled

    Security contexts: 2

    GTP/GPRS: disabled

    SSL VPN peers: 2

    Total of the VPN peers: 5000

    Sharing license: disabled

    AnyConnect for Mobile: disabled

    AnyConnect Cisco VPN phone: disabled

    AnyConnect Essentials: disabled

    Assessment of Advanced endpoint: disabled

    Proxy sessions for the UC phone: 2

    Total number of Sessions of Proxy UC: 2

    Botnet traffic filter: disabled

    This platform includes an ASA 5550 VPN Premium license.

    Flash activation key is the SAME as the key running.

    ASA2:

    SH - activation in detail key:

    Serial number: XXXXX

    No temporary key assets.

    Activation key running: XXXXX XXXXX XXXXX XXXXX XXXXX

    The devices allowed for this platform:

    The maximum physical Interfaces: unlimited

    VLAN maximum: 250

    Internal hosts: unlimited

    Failover: Active/active

    VPN - A: enabled

    VPN-3DES-AES: enabled

    Security contexts: 2

    GTP/GPRS: disabled

    VPN SSL counterparts: 25

    Total of the VPN peers: 5000

    Sharing license: disabled

    AnyConnect for Mobile: disabled

    AnyConnect Cisco VPN phone: disabled

    AnyConnect Essentials: disabled

    Assessment of Advanced endpoint: disabled

    Proxy sessions for the UC phone: 2

    Total number of Sessions of Proxy UC: 2

    Botnet traffic filter: disabled

    This platform includes an ASA 5550 VPN Premium license.

    Flash activation key is the SAME as the key running.

    --------------------------------------------------------------

    It seems so obvious that I have to upgrade the first ASA to support 25 SSL VPN peers in order to create the cluster HA, right?

    Now, I want to know do I need the license "ASA5505-SSL25-K9" or something else.

    Thank you very much in advance for any help!

    Ah OK I see - right then: upgading pole will allow the license to share.

    Re the version target, I would recommend going directly to 8.4 (4.1). I have it deployed on several sites without problem.

  • How to assign only read access to a user for HFM App

    Hello

    I have a doubt like the United States, the actual process of the stripe to assign a user as the read access only for request of HFM. I am new to this and I know that this need be done through HSS. Could then someone let me know the process

    Please ask you to close the post if it seems your problem.

    Thank you

    ~ KKT ~.

  • web asccess for Juniper SSL VPN

    On a XP - SP3 computer, webaccess juniper VPN V7 stopped working reliably a few days ago.  Sometimes it connects, sometimes it crashes.   Even after a reboot, same thing.  It works fine on another computer on the same network.

    I went to the center of fixit, and I get

    "Input string was not in a correct format" when I try to install "diagnose and repair windows security issues...". »

    So I looked in the event viewer.

    I have several errors

    DCOM got error "the service cannot be started, either because it is disabled or because it has no enabled devices associated with" try to start the service gupdate1ca2f26cf03c938 with arguments "/ comsvc" to start the server:

    {4EB61BAC-A3B6-4760-9581-655041EF4D69}

    This one is more disturbing

    The Security Accounts Manager service failed to start due to the following error:

    The system cannot find the specified file.

    of course, brings us to this error

    Windows Service Pack Installer update service depends on the Security Accounts Manager service which failed to start because of the following error:

    The system cannot find the specified file.

    Given that I can't identify the file that is missing.  Active system with bootlog startup does not reveal something special.

    I hate the idea of having to reload, because there was no stacking of XP to create a wake to install a clean system without patches more than 100.

    ideas in addition to reload?

    Hi devicedoc,

    Your question is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public. Please post your question in the TechNet forums.

    http://social.technet.Microsoft.com/forums/en-us/category/windowsxpitpro

  • Enable Mode user SSL - VPN 2 the safety of 1921?

    Hello

    Struggling to turn the tunnel of the 2 free"user" SSL - VPN on a 1921 Sec - K9 with IOS 15.1 (3) t. using CCP to the SSL VPN and SSL VPN Manager config and continues: "function assocaiated license (SSL_VPN) with this feature is not deployed on the device. You may be able to configure this device, but the configuration would not be effective as long as the license is installed. "Use the link below to install the license."

    I followed the link, but I can't activate one of the licenses. It shows also 5000 licenses user and 1400 + days for the valid periods.

    I haven't downloaded all SSL licenses, as I hope that the use of the so-called 2 user licenses, purely for the admin, who are apparently left in the IOS. I'm hoping to set up either WebVPN, or use the device purely for connectivity to admin and remote AnyConnect supports, therefore do NOT want to buy a bundle expensive license 10 users.

    Am I mistaken here? Should I download a license for this unit?

    Any help appreciated.

    Concerning

    Richard,

    I don't deal with licenses so feel free to double check me on that (with your local SE probably).

    Yes there should be 10 webvpn peers in SSEC-K9 license (I don't know if we always DRY - K9 licenses, remember reading something about this a few months back - empty

    ( http://www.cisco.com/en/US/prod/collateral/routers/ps5854/eol_c51_484275.html ).

    Out-of-the-box ASA will contain two licenses for premium webvpn functions.

    AnyConnect can do:

    -SSL VPN

    -IPsec (IKEv2 the only), recently he started work with IOS (previously it was only working with ASA) - Although the documentation is quite rare.

    HTH, but I would say, better ask your local SE ;-)

    Marcin

  • ASA 5520: SSL VPN by using a different IP address that the ASA public IP address

    Hi guys,.

    I'm trying to configure an SSL VPN on a Cisco ASA5520.

    Unfortunately port 443 interface OUTSIDE of the SAA is already used by Microsoft Outlook Web Access and I can not change the configuration of Outlook. This configuration already in place allows me to use the public IP address of the ASA as IP Cisco VPN for the Web page.

    I don't not want to use a different port so to keep life easy for users.

    I have a few available public IPs that I can use so I wanted to use one of them instead of the OUTSIDE of the ASA interface. Any idea how I could do?

    Thank you

    Dario

    Unfortunately you can not use any other public ip address, except the ASA outside IP interface to complete the SSL VPN.

    The only options that you have is to change the Outlook to use another port or the SSL VPN to use a different port.

  • Restrictions on the IP VPN peer

    Hi all

    I hope that someone can help you.

    I'm trying to restrict my ASA to meet the demands of the handshake any IP address outside the specified remote peer - I don't have a VPN between the HO and DC. So far I have removed the encryption card WATCH 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP I thought I would have responded to any request VPN. I also disabled the SSL VPN for good measure.

    I have installed the certificates that I tried to get the rsa - sig, which was a failure - if you have a Watchguard on the other end originally do not try!

    The ike-scan output that runs from an address different from the peer:

    [email protected] / * /: ~ $ sudo ike-scan - v - M - trans = 5, 1, 2, 5 - id = test

    *. *. *. * - showbackoff

    [sudo] password for ubee:

    WARNING: Specify a load of identification with the option - id or - n is not

    no effect except if you also specify aggressive mode with - aggressive

    or - A

    DEBUG: pkt len = 84 bytes, bandwidth = 56000 bps, int = 16000 we from ike-scan 1.9 1 guests

    *. *. *. * Hand Mode Handshake returned

    HDR = (CKY - R = 17fa18bf79c4afa5)

    ITS = (Enc = 3DES Hash = SHA1 Group = 5:modp1536 Auth = LifeType PSK = seconds

    LifeDuration = 28800)

    VID = 4048b7d56ebce88525e7de7f00d6c2d3c0000000 (IKE Fragmentation)

    IKE Backoff Patterns:

    IP address no.   Recv Delta time

    *. *. *. * 1 1310135704.612627 0.000000

    *. *. *. * 2 1310135712.610471 7.997844

    *. *. *. * 3 1310135720.615189 8.004718

    *. *. *. * 4 1310135728.618697 8.003508

    *. *. *. * Guess implementation: Cisco VPN concentrator

    Ending ike-scan 1.9: 1 hosts scanned 84,077 seconds (0.01 hosts/sec). 1 handshake returned; 0 returned warn [email protected] / * /: ~ $

    ASA debugs showing ike-scan request above:

    6. July 8, 2011 | 09:08:30 | 302016 | 89.243.83.209 | 54971 | *. *. *. * | 500 | Connection disassembly UDP 9928544 for outside:89.243.83.209/54971 of identity: *. *. *. * / 500 duration 0:02:24 500 bytes

    6. July 8, 2011 | 09:06:06 | 302015 | 89.243.83.209 | 54971 | *. *. *. * | 500 | Built connection UDP incoming 9928544 for outside:89.243.83.209/54971 (89.243.83.209/54971) to the identity: *. *. *. * / 500 (*. *. *. * / 500)

    Thanks in advance.

    Damo.

    Hey Damo,

    Assuming that you don't need to IKE to listen to the world, but only to specific counterparts, you can possibly use the access map command option, for example as follows:

    test from the list of access permit udp host 10.48.67.145 interface outside isakmp eq

    extended access list test deny udp any any eq isakmp

    extended list permits all ip one access test

    Access-group test in interface out-of-control plan

    This will prevent other hosts to reach the IKE process:

    % 4 ASA-106023: Deny udp src outside:10.48.67.144/500 dst identity:10.48.67.76/500 by access-group 'test' [0xe4b28725, 0 x 0]

    You can learn more about this option on the following links:

    http://www.Cisco.com/en/us/docs/security/ASA/asa84/configuration/guide/access_rules.html#wp1086468

    http://www.Cisco.com/en/us/docs/security/ASA/asa84/command/reference/A1.html#wp1597389

    HTH

    Alain

Maybe you are looking for