Solved

Can Cisco ASA 5510 perform user authentication for internet access

Posted on 2008-06-23
4
2,018 Views
Last Modified: 2010-04-21
We are currently using Checkpoint at our head office and one of our remote sites. There is a site to site VPN and users at teh remote site use Checkpoint user accounts and Radius authentication for Internet access. Not all site personnel are allowed internet access.
We will be changing shortly to a full ASA, TACACS setup at head office with an MPLS connection to the remote site. Of course the timing of the MPLS installation is horrible. The Checkoint SPLAT box at the remote site is failing.
We would like to install an ASA5510 at the remote site. The VPN setup can be done, but I don't yet know how I can control Internet access at the site. Can this be done with an ASA or do I need some type of proxy server.
0
Comment
Question by:Potashcorp2
  • 2
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
AugustTen earned 500 total points
ID: 21847055
Hi, the ASA can be configured with "cut-through proxy" to challenge a user at the application layer and then authenticate against standard AAA servers or the local database.

This can be used together with filtering databases like Websense, integrated with LDAP, AD etc etc
0
 

Author Comment

by:Potashcorp2
ID: 21847135
This is probably what I want. Can you point me to any documentation on this?
We have not yet ordered the 5510 so I don't have manuals yet.
0
 
LVL 3

Expert Comment

by:AugustTen
ID: 21847188
Try this link:

http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/fwaaa.html

This is very useful together with per-user downloadable ACL's for example.
0
 

Author Closing Comment

by:Potashcorp2
ID: 31469780
Thanks. That is exactly what I need.
Saved me doing hours of web searching.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Broadband over Power Lines Broadband over Power Lines is the technology of transmitting computer data through power lines. This method of connectivity allows the user to have access to the internet without having to rely on additional cables, suc…
Hi All,  Recently I have installed and configured a Sonicwall NS220 in the network as a firewall and Internet access gateway. All was working fine until users started reporting that they cannot use the Cisco VPN client to connect to the customer'…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now