I have a vpn group all set up, and it allows full access from the vpn client to my internal network. I now want to limit the access to internal resources for this VPN.
The VPN group is called PMVPN and there is a rule in access list 101:
access-list 101 permit tcp 172.19.2.0 255.255.255.0 interface inside log
I've created a second access list called vpn2 that sets the limits to where I want the clients to go on my internal network.
How do I create the access group for PMVPN to use the vpn2 access group, and do I need to get rid of the rule in list 101 or change it?
Thanks!
Scott
If via radius, you could use cisco-av pairs to limit access to resources based on group membership of the authenticating user.
If you are using local database, you would need to create an alternate access list in which you define what resources/ips individuals connected through this VPN are allowed.
Not sure whether you have to detach the group-access prior to altering the access list. But to be safe, it is better to remove the rule from being used, alter it and then reenable it.
While it might be convenient to use the same rule in different places, setting up individual access list for different items might be better in the long run.