IOS anyconnect vpn group lock and user restrictions

Dear Experts,

I now have two questions about cisco IOS vpn on ISR G2:

1 is it possible to lock user group in IOS anyconnect VPN we can do in ASA? If so, can someone share the steps for her?

2 - a customer wishes to restrict the anyconnect user login as it might turn the connection to the user on request. That is to say whenever the user wants to connect via vpn to ask the administrator to allow connection. can we do without deleting the username and create again?

the other may be on ASA or IOS.

Please see this guide:

http://www.Cisco.com/c/en/us/support/docs/security/iOS-easy-VPN/117634-c...

As he points out, "for the Cisco IOS group-lock and the ipsec: use vpn-group, it only works for IPSec (the easy VPN server)." In order to group-lock specific users in specific contexts of WebVPN (and strategies Group attached), authentication domains should be used. »

If you lock a user to a policy that authenticates, but does provide real access permissions (say an ACL that blocks all traffic to the private network) then you have essentially made their ability to non-functional connection.

If you use an external AAA server (for example, RADIUS or LDAP), then you can move in and out of the group which is authorized without disable VPN access / delete their account altogether.

Tags: Cisco Security

Similar Questions

  • Remote access VPN group name and password

    Hi guys,.

    Can someone tell me please the command to display a remote access VPN group name and the password on a firewall version 8.0 of ASA? Any help will be greatly appreciated.

    Thank you

    Lake

    Remote VPN IPsec IKEv1 access are listed as groups of tunnel. If you enter

    more system:running-config | b tunnel-group

    You can see the config sections (starting with the first mention of the tunnel-group) as well as the pre-shared key ikev1 plaintext String.

  • Group-lock for users of vpn with acs

    Hello

    Is it possible to controll what VPN profile, a user is allowed to use by Cisco ACS or the router?

    2811 router IOS 12.4 worm, ACS 4.1 using

    I just want to be sure that the VPN allows the user only the Client Profile assigned to them and no other profile groups.

    Example:

    User123abc gets their hands on a profile of co-wokers.

    HR_User_Profile.pcf

    SALES_User_Profile.pcf

    User123abc belongs to the Department of human resources and should be able to authenticate with HR_User_Profile. If User123abc is trying to authenticate by using the access SALES_User_Profile should be rejected.

    Any documentation explaining how to set up?

    The ASA will be your option. This should be controlled by the values of tunnel-group and class-group policy, group-lock, ACS and ASA

  • Password Cisco Anyconnect VPN group

    In an earlier version of the Cisco VPN client (with VPN concentrator), we had the option to set the password for the group.

    With anyconnect (SSL or IPSec, no browser based) there is no provision for this. How can I compensate for this in

    AnyConnect since only the user name and passwords are used to establish the vpn?

    I think that the problem with this approach is how to prevent a user who needs to be in a group of connection and choosing a different group on the login screen. The usual way to deal with this is with the locking of a group setting. Group lock works if users are authenticated using the local user ASA database. I got it to work when users are authenticated through RADIUS. I didn't see a way to get GANYMEDE pass the ID group ASA and so not sure that group lock will work when authenticating via GANYMEDE.

    HTH

    Rick

  • AnyConnect VPN Microsoft CA and a Public certificate

    Hello

    I'm looking for some help with a script. I'm no expert in networks by any stretch and I won't implement myself but I need to try to understand if it is possible what I'm looking for.

    We are implementing an Anyconnect VPN with certificate of our own internal CA of Microsoft authentication. I have a product which will distribute certificates from a model for mobile devices rather than the SAA itself. We have our CA and a certificate of identity on the SAA and the operation of the authentication.

    However, the IOS Anyconnect application complains that no reliable VPN.

    So from there, I get that I need a public certificate on the SAA, but can I still have the certificate of the Microsoft CA and certificate of identity making the authentication of end users?

    Can I have written some of it wrong, but I think this gives an idea where I'm going.

    Pointers would be greatly appreciated.

    Yes - IOS is somewhat capricious won't trust internal CA issued certificates. You can buy and install a certificate from a well known public certification authority and to identify your ASA. That will be the certificate bound to the ASA outside interface and it will allow the customers based on IOS (and all others) to connect using this certificate.

    This part is distinguished by the device or user certificates on clients. Those who can still be used, as long the ASA has imported the Microsoft CA on trusts and the public key of the server, the two can co-exist.

  • AnyConnect VPN session disconnect and reconnect

    I have a firewall cisco ASA 5525-X set up to accept the AnyConnect VPN client (IKEv2) connection.

    AnyConnect VPN client can successfully connect.

    During the 1st 10 minutes after logging in, will the client Anyconnect VPN lost VPN connection for a few seconds (ranging from 3 seconds to 10 seconds), then it automatically reconnect back. After that, no more lost connection times.

    The lost connection happened at all multiple. So far, all at least 4 show the same problem.

    It does not affect the operation of the network, but it gives an unpleasant impression for users.

    I tried to surveillance of the ASDM firewall logs, no newspaper of no errors.

    I use Wireshark to capture traffic on the client side, also no errors detected.

    Can idea how I can continue to troubleshoot this problem?

    Hi Limlayhin,

    You can go ahead and capture logs of dart. You can download the Pack of dart for the anyconnect version you use and that you run after you experience this problem. Please make sure that everything you clear observer logs event before you launch you the Anyconnect client.

    To clear the observer event logs, follow these steps:

    1. start > run > Eventvwr

    2. it will then open Event Viewer Window

    3 maximize the application logs and services and that you will find an option "Cisco Anyconnect Secure Mobility Client"

    4. right click on the Cisco Anyconnect Secure Mobility Client and select clear logs. Select clear after that.

    Once you are done with this, launch the anyconnect connection and allow the problem to happen. Once the problem occurs, unplug the anyconnect client and run newspapers dart. It will create a Zip file on your desktop (by default) and you can go through the logs of connection Anyconnect to look for the root cause.

    Let me know if it helps.

    Vishnu

  • One can explain the value command Anyconnect VPN etc. "vpn-filter"?

    Hello

    In Anyconnect VPN, there are two commands that I pointed out wild "BOLD". I checked it with "?" behind the command. But I still don't understand it and why it should be used here. I hope someone can explain it to me. Thank you

    Internal authority of group-policy

    attributes of authority-group policy

    VPN-filter Access_List value

    clientless ssl VPN tunnel-Protocol

    value of group-lock Third_Party

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list County_Access

    -Here is what I checked:

    Enter the name of an existing tunnel group for users to connect with group-lock

    Enter the name of an ACL configured to apply to VPN-filter users

    Vpn-filter adds an extra layer of security for VPN remote access by adding an access list to all traffic that comes from remote users.

    For example, you can restrict to a subnet (which you can do in the tunnel-group) can still say that the HTTP servers, B and C (for which you would use the access list specified by the filter-vpn).

    The group-lock prevents users defined to choose policies other group available in the drop-down list.

    For example, you can restrict VPN users generally use a group without restriction for IT admins. Or allow only external suppliers to connect to a group designated to them that restricts access to a set of resources in the DMZ.

  • PC may have the connection, but why MAC cannot have Anyconnect VPN?

    Hi, we have MAC and PC users. Two users could reach inside the network through ASA and Anyconnect VPN. However, MAC users can not have connection (please see screenshot in attachment). The output of the show run webvpn command is below:

    Act(config-WebVPN) # sh run webvpn
    WebVPN
    allow outside
    allow inside
    CSD image disk0:/csd_3.5.841-k9.pkg
    AnyConnect image disk0:/anyconnect-win-3.1.04066-k9.pkg 1
    AnyConnect enable
    tunnel-group-list activate
    Auto-signon allow ip 0.0.0.0 0.0.0.0 auth-type all the

    The lack of configuration ""anyconnect image disk0: /anyconnect -macosx- i386 - 2.5.2014 - k9.pkg "all the time." We don't think that this is the reason why MAC users are unable to reach the inside of the network because we do not have this command for a long time. Any suggestions can give? Thank you.

    > The question is that the command for MAC was not there for long. Why is it could work when the order wasn't there?

    I don't know, but I remember that in versions, it was not necessary to have * all * images in flash. Perhaps this changed some time. , You upgrade your ASA recently before the problems began?

  • ASA: group lock with NT domain authentication.

    Hello!

    We have an ASA5510. I put two group for remote VPN, and both use NT domain authentication. How can I define tunnel-group lock for users in both group.

    How can I lock the user to the group. Is there a configuration in Active Directory to set the Group of users.

    I don't know what the solution is, I found nothing.

    Please help, thanks!

    Gabor

    The field 'Department' as I spoke with would be an attribute assigned to the user account in Active Directory.

  • Cisco ASA 5510 - restrictions of VPN (AnyConnect) based on the AD user or IP address

    Hello

    I want to test how to restrict access user on an ASA 5510 AnyConnect. In politics, I can define what networks will go through the VPN tunnel and which not (split tunneling). The ASA has a LDAP connection and only AD users with a special security group can connect over AnyConnect.
    On the other hand I would like to restrict access for special users within a VPN policy.

    So my question:
    What are your recommendations to implement this szenario?

    My two ideas would be:
    1. the access rules based on the user of the AD.
    2. special reserve IP addresses in the pool of addresses AnyConnect for some users, so I can limit access to the normal firewall rules base based on the source IP address.

    What are your recommendations and is it possible to realize my ideas (and how)?

    Thanks in advance

    Best regards

    Hello

    I will suggest that you configure a second ad group in the server and another group strategy in the ASA, you can configure certain access on each group policy "the installer of the filters, assign different split political tunnel, different ACL' and in the ad server, you can assign users for example to the AD Group A and AD Group B based on the access you want to give them now , you must configure LDAP mapping to assign the user specific group policy that you want based on the AD group that they belong.

    You can follow this documentation that will help you configure the LDAP Mapping:

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

    Best regards, please rate.

  • AnyConnect tunnel-group automatic assignment without selecting any group-tunnel-group-list alias and user-group strategy.

    Objective is that the anyconnect user must select group-alias, so that when a user enters his username and password he must go to his political group and tunnel-group specific. as I removed this command in webvpn 'no tunnel-group-list don't enable '. This I can not connect (user does not authenticate).

    1 - my question is why his past does not?

    Solution:

    If I keep only a single tunnel-group by default and make several group policies and assign to each user with his specific group policy that it works. in user attribute means I have only question following the commands it works, but if I put "group-lock value test-tunnel" that it did not identify.

    Please explain why.

    WebVPN

    allow outside

    limit the cache-fs 50

    SVC disk0:/anyconnect-win-3.0.10055-k9.pkg 1 image

    enable SVC

    internal strategy of group test-gp

    attributes of the strategy of group test-gp

    VPN-tunnel-Protocol svc webvpn

    the address value test-pool pools

    username, password test test

    username test attributes

    VPN-tunnel-Protocol svc

    group-lock value test-tunnel

    Strategy Group-VPN-test-gp

    tunnel-group test-tunnel type remote access

    attributes global-tunnel-group test-tunnel

    Group Policy - by default-test-gp

    tunnel-group test-tunnel webvpn-attributes

    allow group-url https://192.168.168.2/test

    Yes, you have the right solution. You only need to create 1 group of tunnel and multiple group policy. Under the attribute of the user, you re then group policy of vpn that you want the user assigned too.

    You can also authenticate users against AD and configure ldap attribute map to map the user to a specific group policy automatically.

    Here is an example of configuration if you happen to have the AD and will authenticate against AD:

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00808d1a7c.shtml

    Hope that helps.

  • Group Lock VPN 3000 binding users to their group

    I only use a 3015 VPN with VPN Client 3.5.1 using IPSEC. Cisco ACS 3.0 is the radius, all users of the authentication server. If I use a group on the client, I can log in using a different username to groups.

    It is interesting then you get the other privileges of groups for this user as you would expect.

    If I select group Lock on core group settings is not any effect.

    I want to restrict the access of clients to the users group in its own configured.

    I use an external authentication to the Radius ACS server for groups.

    Thanks for any help you can give.

    Mark

    Hi Mark,

    You can follow the example of configuration to:

    http://www.Cisco.com/warp/public/471/altigagroup.html

    Thank you

    Jean Marc

  • AnyConnect vpn client gives error of certificate on ios cisco 2800 series

    Dear all,

    I set up a vpn on cisco router ios simple anyconnect 2811

    I also configured natting on the inorder of router to access the internet for local users

    My problem

    I can not connect same vpn if I use the method of the anyconnect vpn client

    Also please tell me how to access internal resources by configuring split tunneling

    the error I get is as below


    * 08:16:35.947 Feb 8: 252:error:14094416:SSL routines: SSL3_READ_BYTES:sslv3 certificate alert unknown:../../../../cisco.comp/pki_ssl/src/openssl/dist/ssl/s3_pkt
    .c:1062:SSL alert number 46

    Here is my configuration

    ABC host name
    !

    start the flash system: c2800nm-advsecurityk9 - mz.124 - 24.T1.bin

    !
    AAA new-model
    !
    !
    AAA authentication login default local
    local connection SSL-VPN-AUTH authentication AAA
    !
    !
    AAA - the id of the joint session
    !
    dot11 syslog
    IP source-route
    !
    !
    IP cef
    !
    !
    IP-server names 4.2.2.2
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    Crypto pki trustpoint ABC
    enrollment selfsigned
    crl revocation checking
    rsakeypair ABC 1024
    !
    !
    ABC crypto pki certificate chain
    self-signed certificate 04
    3082023 HAS 308201 3 A0030201 02020104 300 D 0609 2A 864886 F70D0101 04050030
    27312530 2306092A 864886F7 0D 010902 73 732 6569 6173742D 6B 686177 16166D
    616E6565 6A2D7261 31313032 30383038 32333036 5A170D32 30303130 301E170D
    3030305A 31303030 30273125 30230609 2 A 864886 F70D0109 0216166D 65 73732
    2D6B6861 69617374 77616E65 656A2D72 6130819F 300 D 0609 2A 864886 F70D0101
    01050003 818 0030 81890281 8100C16D 1007E434 AFAEE3C1 90141205 E7785754
    FA3C4589 3D6B3D47 57BC54A5 7237E7FE 9B7CA69C 999B4DAF 835B98E9 972CFD03
    5A43488C 05E82E10 9B540AB9 5A54AB0C 525FED0E 05B6F2FF 6703F0BD F28AE6F2
    9E98298D E184CCDC 2D54741D 589 9731 C2BA5191 59DC7DC8 1F03C116 DDCF21EB D
    0BB4E931 02F61F64 D64A6F36 92F70203 010001A 3 76307430 0F060355 1 130101
    FF040530 030101FF 30210603 551D 1104 1A 301882 7373 656961 2 73742D6B 166D
    68617761 2 726130 1 230418 30168014 2FA1E05E 1BD981A0 1F060355 6E65656A
    A3485444 0B151D9E 44A3F6F6 301D 0603 551D0E04 1604142F A1E05E1B D981A0A3
    4854440B 151D9E44 A3F6F630 0D06092A 864886F7 010104 05000381 810096EF 0D
    39D4EEED E3CA162B E6BC1B61 0C3C66ED 02884209 0F4B54F1 BA7BEFF4 CAA206CE
    44 C 99817 134363 2 F29A9E6A 945AA1B4 E4B85ED7 1800DAA1 30BE25C3 8340AE80
    714F8FBD 9A433C4B 3EE2204D 88F7AB6D 929B5C88 5E7BC2B9 25754390 1622DB7B
    EEB11694 F381E995 59C825BE 52EA5923 F87C43A3 98744BE8 BB27C381 BE14
    quit smoking
    !
    !
    privilege of username XXXX XXXX 15
    username password ABC ABC
    Archives
    The config log
    hidekeys
    !
    !
    !
    !
    !
    !
    !
    !
    interface FastEthernet0/0
    IP address | public IP address. 255.255.255.252
    NAT outside IP
    IP virtual-reassembly
    automatic duplex
    automatic speed
    !
    interface FastEthernet0/1
    IP 192.168.0.7 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    automatic duplex
    automatic speed
    !
    interface FastEthernet0/2/0
    no ip address
    Shutdown
    automatic duplex
    automatic speed
    !
    local pool IP 10.10.10.1 intranet 10.10.10.254
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 GATEWAY
    no ip address of the http server
    IP http secure server
    !
    !
    IP nat inside source map route sheep interface FastEthernet0/0 overload
    !
    extended IP access allow-traffic-to-lan list
    deny ip 192.168.0.0 0.0.0.255 10.10.10.0 0.0.0.255
    Licensing ip 192.168.0.0 0.0.0.255 any
    !
    access-list 101 permit ip 192.168.0.0 0.0.0.255 10.10.10.0 0.0.0.255
    !
    !
    !
    sheep allowed 10 route map
    match ip address allow-traffic-to-lan
    !
    !
    !
    WebVPN EIAST gateway
    IP address | public-ip | port 443
    redirect http port 80
    SSL trustpoint ABC
    development
    !
    WebVPN install svc flash:/webvpn/anyconnect-win-2.5.2018-k9.pkg sequence 1
    !
    WebVPN context XYZ
    SSL authentication check all
    !
    !
    political group XYZ
    functions compatible svc
    SVC-pool of addresses "intranet".
    SVC split include 10.10.10.0 255.255.255.0
    SVC-Server primary dns 213.42.20.20
    Group Policy - by default-XYZ
    list of authentication SSL-VPN-AUTH of AAA.
    area of bridge XYZ XYZ
    10 Max-users
    development
    !
    end

    Thank you

    Jvalin

    You could hit the next bug

    CSCtb73337    AnyConnect does not work with IOS if cert not trust/name of offset
    which is set at 12.4 (24) T02.

    Please update the code and give it a try.

  • 713060: tunnel rejected: user (user) is not a member of the Group (groupname), group-lock check failed.

    Hello

    I just set up the VPN for end users in PIX515e with 8 IOS and stuck with ' Tunnel rejected: user (msveden) is not a member of the Group (VPN shared), group-lock has failed the test. " Can someone please help me and tell me how to add the user to my VPN group?

    Concerning

    Mikael

    Maybe you are looking for this.

    ASA1 (config) # username msveden attributes

    Group-lock value mygroup ASA1(config-username) #.

    Thank you

    Ajay

  • Lock the AnyConnect VPN with broader access list

    I'm trying to lock my AnyConnect VPN interface. I use the split tunneling. I want only to http tunnel traffic to an external http server we have and ftp to another external server behave. I don't want anything else through the tunnel or anywhere else allowed on our network. My current setup, I can connect to the vpn and the servers ping external ip address, but not by name. I can also not navigate anywhere else while I'm connected. It is not imperative for me to navigate anywhere else, when you are connected, but I need to allow only access specified above.

    Configuration:

    attributes Anyconnect-group policy

    VPN-tunnel-Protocol svc webvpn

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list WebAccessVPN

    WebVPN

    list of URLS no

    SVC request to enable default webvpn

    WebAccessVPN list extended access allow icmp disable any newspaper host FTP - EXT object-group Ping_and_Trace

    External FTP FTP access WebAccessVPN-list comment

    WebAccessVPN list extended access permitted tcp disable no matter what newspaper to host FTP - EXT object-group DM_INLINE_TCP_2

    WebAccessVPN list extended access allow icmp disable any newspaper host LICENSING-EXT object-group Ping_and_Trace

    WebAccessVPN list extended access allowed object-group TCPUDP any LICENSING-EXT eq www log disable host

    WebAccessVPN list extended access deny ip any object-group DM_INLINE_NETWORK_1

    You can use the vpn filter under the attributes of political group. In the vpn-filter, you can reference the access list you created.

Maybe you are looking for