I have been tasked with preventing internal users from activating and using the Anyconnect client while on our internal network.
What is the best approach to this?
ACL applied to the inside interface inbound?
Assigning an ACL to a split tunnel configuration?
Something else?
Thank you in advance for any help.
First of all I want to thank you all for your responses.
A little more information:
I just received access for the ASA
There is no NATing involved. This agency is using public IPs.
On the ASA the inside interface is shutdown.
The Anyconnect traffic is solid.
The network that needs to be denied internally is a /16
This is using split tunneling. I thought I could use tunnelexclude policy to deny but that does not work. Any other ideas? The anyconnect works fine; it’s just this agency wants to prevent any internal users from using that /16.
just to clarify: what’s the behavior you want to deny ?
– dialing in into your own network from inside the lan
– dialing in into another companies vpn
If we‘re talking about the first one, you cannot do this with a acl.
An Acl will only filter through the firewall, not traffic towards the firewall.
I would think about a local dns pointer resolving the vpn url towards a black hole from inside the lan.
How do you do authentication? We handle this on our RADIUS server (Clearpass) for certain connection profiles. RADIUS gets all the info you need to do it (connection profile name, user’s IP), but your RADIUS server needs to be good enough / flexible enough to do it.
You can also do an ACL on the inbound interface, but that would apply to all connections/groups/users/etc…
If the internal users goes to the internet through the same ASA as they VPN into you should disable anyconnect on the inside interface. It’s just a simple setting
is this “new” on your linked document it’s referenced to 9.18.3.
I was checking with cisco for something like that early 2023 to block vpn from various countries and was told “sorry no way to do that”
It’s not new, you’ve been able to apply ACLs to the control plane for some time. However you only get extended ALCs, you cannot have it traverse the firepower engine for geolocation. So there still is no way to block various countries as you stated. You’d have to do it by IP which is kind of nuts.