I now have a new boss and they have decided to change our remote access policies.
So I already have a working SSL VPN and RDP deployment, thanks in part to the expertise of this forum. Thank you all for that.
Originally we only allowed company hardware to connect to the SSL and everyone else was stuck with the RDP session.
Now I need to be able to allow non-company hardware to connect to the SSL, so I decided to enable CSD and do an OS check and a virus scan check.
After enabling CSD, I have found that when users connect to the RDP session it runs all of the CSD checks and is not allowing connections. Is there a way to only use CSD for the SSL Client connections, and for CSD to ignore all of the RDP Plugin connections?
I did a quick search of the Group Policies and did not see a CSD option in there.
I am running ASA 8.x and the newest version of CSD.
Essentially you are going to end up with 3 DAP's with one of them being the default policy which in most cases would terminate the session if the user did not match the 2 preceding policies. The first DAP would be the one where the user with AV would hit and be granted AnyConnect, the second would be where the users without AV would get Clientless access only thus being able to use RDP.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :