Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to limit a Cisco VPN Client user to just certain Applications and Files.  I don't want to give them full network access.

Posted on 2010-08-13
8
Medium Priority
?
452 Views
Last Modified: 2012-05-10
When I configure remote access for Cisco VPN Clients, they usually have full network access.  It seem to be a default config for that.  I need to limit their access, and I don't quiet know how to do that.  Please give me some directions on doing that.  Thanks
0
Comment
Question by:clarencecummings
8 Comments
 
LVL 2

Accepted Solution

by:
gelgin earned 1000 total points
ID: 33434121
You can limit what they can access, but limiting the files and applications they have access to will require modifying their domain group profile to limit them to those domain resources you require.

0
 
LVL 1

Expert Comment

by:alismadi
ID: 33434267
whats your router model?
0
 

Author Comment

by:clarencecummings
ID: 33434311
A Cisco ASA 5520
0
Get Certified for a Job in Cybersecurity

Want an exciting career in an emerging field? Earn your MS in Cybersecurity and get certified in ethical hacking or computer forensic investigation. WGU’s MSCSIA degree program was designed to meet the most recent U.S. Department of Homeland Security (DHS) and NSA guidelines.  

 

Author Comment

by:clarencecummings
ID: 33434315
An ASA 5520 running in router mode
0
 

Author Comment

by:clarencecummings
ID: 33434869
I understand what is need to do now. I just have to modify their domain group policy.  I will do this next week when I'm back at work.  Thanks
0
 
LVL 14

Expert Comment

by:anoopkmr
ID: 33435437
yes we can do , please upload ur ASA config
0
 
LVL 9

Assisted Solution

by:gavving
gavving earned 1000 total points
ID: 33442175
If you'd like to restrict users to specific server IP numbers, that can be done using the vpn-filter command in the group-policy for the specific VPN group.  
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question