accesslist per user that logs in by vpn client

Unanswered Question
Apr 15th, 2008
User Badges:


i have the problem finding a similar command on ios. on my asa, responsible for wlan vpn, i have a command like this:

group-policy mygroup attributes

vpn-filter value vpnclient

that applies the access-list vpnclient to every user logs into (Cisco VPN Client). now my vpn from the internet is handled by a 28xx with crypto module and, of course it has ios, everything changed :-( . Can someone please point me to something similar. i took a short look in the ios 12.4 security command refrerence but found nothing.

I want to apply a access-list to every user that logs in by VPN Client.

regards Martin

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Jon Marshall Wed, 04/16/2008 - 00:38
User Badges:
  • Super Blue, 32500 points or more
  • Hall of Fame,

    Founding Member

  • Cisco Designated VIP,

    2017 LAN, WAN


2 options spring to mind neither of which may meet your requirements exactly

1) Do you hand out the IP addresses to the VPN clients when they connect to the 2851. If so you could use an access-list that restricts traffic from that subnet/subnets to subnets within your network. This would probably be the easiest way to approach this.

2) You could i you have an ACS use a per-group DACL (Downloadable Access List) which is downloaded to the router. However this would require a lot more setting up/testing than option 1


m.hierling Wed, 04/16/2008 - 04:18
User Badges:


perhaps i should describe the setup in more detail:

i have a ip pool /28 where some service people can log into our network. every company gets its own vpn group/group pass and user. They all get a ip from the same pool but do not have access to the same resources inside our network. at the moment i have only 1 customer so the the access-list on the interface did the job. but now i have to add a 2nd, same ip range but other resources inside our lan. with the access-list all users have access to all resources, what i don't want. So a access-list per vpn group would be the solution. Do you have any information about the downloadable acls?

regards Martin

d.rocco Fri, 12/05/2008 - 01:54
User Badges:


you can associate a vpn group to a tunnel interface and configure an inbound ACL to any tunnel interface:

for example, if you have 10 vpn group, you can create 10 different tunnel interface.

Please rate if helpful!



This Discussion