Restricting access to Cisco AnyConnect via source address

Remote Access VPN (AnyConnect) works like the following at my datacenter:

I have an ASA5520 with one AnyConnect Profile configured.   Every customer then has their own group policy configured, which specifies what they have access to once connected to the VPN.   Authentication is done by Windows 2008 NPS with attribute 25 configured.  Customers can connect to the VPN from anywhere they have internet access.

I ran into a scenario where a customer needs VPN access to a server with very sensitive information in the data center.   The VPN would only be from one server on the customer side to the one server in the data center.  I would normally setup a site to site VPN for this, but the remote end (Customer Side) does not have the means to do do.

I thought about installing AnyConnect on the customers server and they could manually connect to the VPN to access the server at the datacenter.  My problem with that is, I would want to lock that group down by source address.  If I give them AnyConnect, they could essentially access the datacenter server where ever they have internet and anyconnect installed.  Is it possible to to lock a AnyConnect group policy down by source address?   Cisco TAC tells me it is not unless I have AnyConnect Premium and meet of bunch of criteria.  I don't have AnyConnect Premium, I have AnyConnect Essentials.  I find it hard to believe there is not way to do this with AnyConnect Essentials.  Any idea's or thoughts on this?  Does it look like a site-to-site VPN is the only way?  Like I said that has been my solution from the get go, but the customer side is basically saying no.
LVL 4
denver218Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Jody LemoineNetwork ArchitectCommented:
If you're authenticating via NPS, the NAS-Port-Id sent via RADIUS will be the Internet IP address of the client. The option to add NAS-Port-Id to the network policy conditions doesn't appear to be available in the MMC GUI, but you can add it by editing the XML. Details are available here:

http://social.technet.microsoft.com/Forums/windowsserver/en-US/f96086ed-42ce-4c09-808b-38fa6aee722a/how-check-nasportid-or-add-custom-conditions-to-nps?forum=winserverNAP

I haven't actually done this through NPS, so I don't have any more detail than this. RADIUS isn't very different from implementation to implementation, so it stands to reason that if you can add the NAS-Port-Id to the network policy conditions, anything that doesn't meet the condition will be rejected by RADIUS and will cause AnyConnect to fail to authenticate.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Matt VCommented:
Does the customer not have the option to do an IPSec tunnel from the server?  Windows has this ability built in.
Henk van AchterbergSr. Technical ConsultantCommented:
You can use certificates for authentication and install the certificate on the server without the "export" option turned on.

This way only the server with the certificate can connect. You can use the always on option because authentication can be done in the background without user intervention.

This is not 100% safe but it comes close.
denver218Author Commented:
Thanks.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.