Solved

Cisco ASA 5540 - Anyconnect access to particular devices only

Posted on 2014-07-21
2
562 Views
Last Modified: 2014-07-22
Hello all -

Is it possible to use the Cisco ASA 5540 to block a user from coonecting via VPN using an IPAD but still allow his Windows laptop to connect?

Any advice would be great.

Thanks

J. Meza
0
Comment
Question by:CocoCounty
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 40211630
There is Host Scan supported by Cisco Anyconnect that does a prelogin assessment checks for the following on the remote endpoint. These authentication data gathered can serves as the prelogin policy and Host Scan results, to apply a dynamic access policy (DAP) to the session.

–      Operating system
–      Presence or absence of any files you specify.
–      Presence or absence of any registry keys you specify. This check applies only if the computer is running Microsoft Windows.
–      Presence of any digital certificates you specify. This check also applies only if the computer is running Microsoft Windows.
–      IP address within a range you specify.

Starting with Cisco AnyConnect Secure Mobility Client Version 3.1, you can do posture assessment using HostScan. . It requires both the Cisco Adaptive Security Appliance and Cisco AnyConnect Secure Mobility Client. It is licensed through the Cisco AnyConnect Premium license. I did not manage to find any specific on 5540 but you can check this  5500-X example on using Lua expression to track specific mobile devices by their unique identifiers (UIDs). There are more other DAP example that cna be useful info for the lockdown checks

useful to check on more in Cisco AnyConnect Secure Mobility Solution FAQ
0
 

Author Comment

by:CocoCounty
ID: 40212466
Breadtan

Thanks for the information, I will start looking into it.
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question