Hi, The SSL VPN users are authenticated with ADS for connecting the SSL VPN. How to restrict the users with the access servers listed in Split tunnel. For example in Split tunnel there are 4 servers from Server-1 to Server-4
When user-1 logs in he should be able to access Server-1. He should not be able to access the other three.. The rest of users should be able to access all the servers. Pls advise.
The easiest way would be to use ACS to have downloadable ACL's for each user.
Not using ACS though, you might have a tougher time. Hopefully somebody has a good way to do this. Off of the top of my head, you might be able to try creating two different Connection Profiles -- one for access to the 1 server, one for access to the other 3 servers, then associate a different Group Policy to each connection profile. This would allow you to define two ACL's that would block what you wanted.
So you would have two Connection Profiles:
You would also create two group policies:
Also need two ACL's:
access-list AllowServer1 permit ip any 220.127.116.11
access-list AllowServer1 deny ip any any
access-list AllowServer2-4 permit ip any 18.104.22.168
access-list AllowServer2-4 permit ip any 22.214.171.124
access-list Allowserver2-4 permit ip any 126.96.36.199
access-list AllowServer2-4 deny ip any any
Then you have to use the respective ACL's as filter lists on the matching group policies and connection profiles.
Like I said... off the top of my head. Hopefully someone knows an easier way.
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...