DAP?
Regards,
 Joe Sanchez
On Jun 15, 2012, at 12:01 AM, Mahmoud Genidy <ccie.mahmoud_at_gmail.com> wrote:
> Thanks you all guys ,,,
> 
> It is clear that the required effort is not justifiable to secure  remote
> VPN hosts based on their source address with ASAs, although it is possible
> with work arounds.
> 
> Cheers
> Mahmoud
> 
> On Wed, Jun 13, 2012 at 7:30 PM, Carlos G Mendioroz <tron_at_huapi.ba.ar>wrote:
> 
>> I have not even tried, but wouldn't it work to use a policy on an ACS (5)
>> to do the trick ?
>> After reading some, it seems this is preciselly the type of question that
>> the new ACS policy based configuration tries to address.
>> 
>> -Carlos
>> 
>> Joseph L. Brunner @ 13/06/2012 01:10 -0300 dixit:
>> 
>>> Mahmoud,
>>> 
>>> It sounds more and more like a cisco asa vpn is not the right solution
>>> for your client.
>>> 
>>> Consider Citrix Xenapp or similar.
>>> 
>>> I think your client is trying to solve a human resources problem with
>>> technology. This is where I seek out his boss and confirm that person's
>>> mission.
>>> 
>>> -Joe
>>> 
>>> 
>>> From: marc abel [mailto:marcabel_at_gmail.com]
>>> Sent: Tuesday, June 12, 2012 11:23 PM
>>> To: Mahmoud Genidy <ccie.mahmoud_at_gmail.com>
>>> Cc: Joseph L. Brunner; Cisco certification <ccielab_at_groupstudy.com>
>>> Subject: Re: ASA dial in VPN policies
>>> 
>>> You can only establish remote access VPN connections on the primary
>>> interface which has the default route so I don't believe this will work.
>>> 
>>> You can not control who can access the ASA via IPSEC by using an
>>> access-list. You would have to apply that to the control plane and that
>>> would affect all VPN groups.
>>> 
>>> You can apply an access-list to restrict which resources people can
>>> access once they successfully connect, but to do this you either have to
>>> use vpn filter or specify the "no sysopt connection permit-vpn" which turns
>>> of the bypassing of access-list for the VPN.
>>> 
>>> In your case I think the best you are going to do is use a group password
>>> and user authentication rather than a certificate. It wont restrict which
>>> IP they connect from however.
>>> 
>>> -Marc
>>> 
>>> On Tue, Jun 12, 2012 at 7:47 PM, Mahmoud Genidy <ccie.mahmoud_at_gmail.com<*
>>> *mailto:ccie.mahmoud_at_gmail.com>**> wrote:
>>> Thanks Joseph
>>> 
>>> Knowing it is an option configurable with Fortigate I thought there may be
>>> an equivlent in ASA.
>>> 
>>> I couldn't undersand your point when you said it is not possible then you
>>> said it can be done using "isakmp profile match identity address"?
>>> 
>>> I thought about some alternative solution: To create a second external
>>> outside interface on the ASA and apply ACL on the internet router
>>> connected
>>> to this interface to restrict the VPN access. Another option would be to
>>> apply the ACL on the outside interface its self however I doubt it will
>>> work!
>>> 
>>> 
>>> On Tue, Jun 12, 2012 at 4:12 PM, Joseph L. Brunner
>>> <joe_at_affirmedsystems.com<**mailto:joe_at_affirmedsystems.com**>>wrote:
>>> 
>>> Not possible... practically speaking.. people move around a lot, etc.
>>>> 
>>>> If you knew their ip was going to always be X - say you had some
>>>> consultants that only use the vpn from a major site, etc. then it could
>>>> be
>>>> done with isakmp profiles matching "isakmp profile match identity
>>>> address"
>>>> and the like - but remember, we are architects and designers more than we
>>>> are "errand boys" at our level...
>>>> 
>>>> Just because some business person has a vision of Acid Burn and Crash
>>>> Override sitting at their Toshiba Tecra's and some neon characters going
>>>> by
>>>> in the background doesn't mean IT works that way...
>>>> 
>>>> What works for most must for all :0)
>>>> 
>>>> That's how I support it!
>>>> 
>>>> -----Original Message-----
>>>> From: nobody_at_groupstudy.com<mailto:n**obody_at_groupstudy.com<nobody_at_groupstudy.com>>
>>>> [mailto:nobody_at_groupstudy.com<**mailto:nobody_at_groupstudy.com>] On
>>>> Behalf Of
>>>> Mahmoud Genidy
>>>> Sent: Tuesday, June 12, 2012 1:51 AM
>>>> To: Cisco certification
>>>> Subject: Re: ASA dial in VPN policies
>>>> 
>>>> Let me rephrase the question:
>>>> 
>>>> How to restrict remote access VPN users based on their source (Reall) IP
>>>> address in ASA firewall?
>>>> 
>>>> 
>>>> On Tue, Jun 12, 2012 at 3:17 PM, Joseph L. Brunner
>>>> <joe_at_affirmedsystems.com<**mailto:joe_at_affirmedsystems.com**>>wrote:
>>>> 
>>>> This is done in the real world by giving out two vpn groups... not by
>>>>> tweaking little things behind the scenes for the one group...
>>>>> 
>>>>> There are other things you probably need to do with your time/life
>>>>> than this...
>>>>> 
>>>>> Two groups...
>>>>> 
>>>>> -----Original Message-----
>>>>> From: nobody_at_groupstudy.com<mailto:n**obody_at_groupstudy.com<nobody_at_groupstudy.com>>
>>>>> [mailto:nobody_at_groupstudy.com<**mailto:nobody_at_groupstudy.com>] On
>>>>> Behalf
>>>>> Of Mahmoud Genidy
>>>>> Sent: Monday, June 11, 2012 9:31 PM
>>>>> To: Cisco certification
>>>>> Subject: ASA dial in VPN policies
>>>>> 
>>>>> Hi Team,
>>>>> 
>>>>> Is it possible to have the ASA configured for two different dial in
>>>>> VPN access policies as follows:
>>>>> 
>>>>> -         -  First group of remote dial in VPN users are active
>>>>> directory
>>>>> authenticated and restricted with private certificate
>>>>> 
>>>>> -        -  Second group of remote dial in VPN users are active
>>>>> directory
>>>>> authenticated and restricted based on their source real IP address
>>>>> 
>>>>> 
>>>>> 
>>>>> What may be the options for implementation, and would this require the
>>>>> two groups of users to dial into two different external ASA IP address?
>>>>> 
>>>>> 
>>>>> 
>>>>> The story behind this is that the customer has implemented a Private
>>>>> Certificate as part of remote dial in VPN access authentication. They
>>>>> have some of their remote users not happy with this option as it
>>>>> restricts remote access to specific PC or Laptop where the certificate
>>>>> 
>>>> is installed.
>>>> 
>>>>> However they need flexibility of connecting from any PC within their
>>>>> remote small office/home where they connect through a gateway with a
>>>>> fixed Real-IP address. So for this group of users they need to
>>>>> implement another policy where they can have access restriction based
>>>>> on their source real IP address. Other users who already happy with
>>>>> the private certificate will stay the same.
>>>>> 
>>>>> 
>>>>> 
>>>>> Cheers
>>>>> 
>>>>> Mahmoud
>>>>> CCIE#23690
>>>>> 
>>>>> 
>>>>> Blogs and organic groups at http://www.ccie.net
>>>>> 
>>>>> ______________________________**______________________________**
>>>>> __________
>>>>> _ Subscription information may be found at:
>>>>> http://www.groupstudy.com/**list/CCIELab.html<http://www.groupstudy.com/list/CCIELab.html>
>>>>> 
>>>> 
>>>> 
>>>> Blogs and organic groups at http://www.ccie.net
>>>> 
>>>> ______________________________**______________________________**
>>>> ___________
>>>> Subscription information may be found at:
>>>> http://www.groupstudy.com/**list/CCIELab.html<http://www.groupstudy.com/list/CCIELab.html>
>>>> 
>>> 
>>> 
>>> Blogs and organic groups at http://www.ccie.net
>>> 
>>> ______________________________**______________________________**
>>> ___________
>>> Subscription information may be found at:
>>> http://www.groupstudy.com/**list/CCIELab.html<http://www.groupstudy.com/list/CCIELab.html>
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> --
>>> Marc Abel
>>> CCIE #35470
>>> (Routing and Switching)
>>> 
>>> 
>>> Blogs and organic groups at http://www.ccie.net
>>> 
>>> ______________________________**______________________________**
>>> ___________
>>> Subscription information may be found at:
>>> http://www.groupstudy.com/**list/CCIELab.html<http://www.groupstudy.com/list/CCIELab.html>
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>> --
>> Carlos G Mendioroz  <tron_at_huapi.ba.ar>  LW7 EQI  Argentina
> 
> 
> Blogs and organic groups at http://www.ccie.net
> 
> _______________________________________________________________________
> Subscription information may be found at: 
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Fri Jun 15 2012 - 06:51:56 ART
This archive was generated by hypermail 2.2.0 : Sun Jul 01 2012 - 10:39:52 ART