Solved

How to limit a Cisco VPN Client user to just certain Applications and Files.  I don't want to give them full network access.

Posted on 2010-08-13
8
431 Views
Last Modified: 2012-05-10
When I configure remote access for Cisco VPN Clients, they usually have full network access.  It seem to be a default config for that.  I need to limit their access, and I don't quiet know how to do that.  Please give me some directions on doing that.  Thanks
0
Comment
Question by:clarencecummings
8 Comments
 
LVL 2

Accepted Solution

by:
gelgin earned 250 total points
ID: 33434121
You can limit what they can access, but limiting the files and applications they have access to will require modifying their domain group profile to limit them to those domain resources you require.

0
 
LVL 1

Expert Comment

by:alismadi
ID: 33434267
whats your router model?
0
 

Author Comment

by:clarencecummings
ID: 33434311
A Cisco ASA 5520
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:clarencecummings
ID: 33434315
An ASA 5520 running in router mode
0
 

Author Comment

by:clarencecummings
ID: 33434869
I understand what is need to do now. I just have to modify their domain group policy.  I will do this next week when I'm back at work.  Thanks
0
 
LVL 14

Expert Comment

by:anoopkmr
ID: 33435437
yes we can do , please upload ur ASA config
0
 
LVL 9

Assisted Solution

by:gavving
gavving earned 250 total points
ID: 33442175
If you'd like to restrict users to specific server IP numbers, that can be done using the vpn-filter command in the group-policy for the specific VPN group.  
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question