cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
809
Views
5
Helpful
4
Replies

DAP rule for IPSec clients

brian.kennedy
Level 1
Level 1

I'm setting up DAP rules for AnyConnect clients. When I set the default policy to terminate, I get the right results from AnyConnect connections, but all IPSec clients cannont connect. I know I need to set up a DAP rule for IPSec clients to allow them through, but can't remember how to set that up.

4 Replies 4

Todd Pula
Level 7
Level 7

You can add a policy for your IPSec users which will match on the "application" endpoint attribute type. You will then set the "client type" to "IPSec" and the default action to continue.

Ok, that worked. Follow-up question though. So the only thing I'm looking at doing right now is setting up a policy to look at Anti-virus and disallow if the signature is more than a week old. Works fine with the AnyConnect. But if I add that to the IPSec rule (app = ipsec and av exists (< 7 days), it won't let the IPSec client connect at all. I seem to recall something about if we're doing posturing with IPSec client, we have to use endpoint assesment or pre-login policy? Is that the case; it would be nice to do it all w/in one DAP rule.

Thanks

Brian

Brian,

You can't do hostscan with IPSEC, which is required for checking whether av/as/fw is installed. You have to use anyconnect.

--Jason

Hmm, no posturing for av/as/fw at all with IPSec, or just through the DAP? W/ pre-login policies you can check for file/registry/os, etc.

Review Cisco Networking products for a $25 gift card