I?m configuring an IPSEC client VPN on an ASA5520 and want to require a personal Firewall on remote workstations, the list of personal FW does not include the windows FW, Do you know if this was not added for a security reason? And If I need to add it as a custom FW the ASA is requesting a vendor ID and product ID as well, do you know what the best way to find these information is?
Cisco only supports the list of personal firewalls depicted on the ASA now. Not really sure when windows will get added. But you can personalise the protocols which the user can access through filters and you can apply to the userprofile, so that the user does not access anything else. This is the best way of doing this. This is just an access-list which will allow or disallow TCP/UDP ports for the user.
Thank you very much Raj for the quick respond, what I?m trying to do here is allowing remote users to access the Internet while connected to the internal network through the IPSEC client VPN but make sure that their workstations are protected from the Internet, I don?t want to tunnel everything but I have Split-Tunneling already configured to tunnel private traffic through the VPN.
One thing I though of is using the CPP feature and configure an ACL to permit all outbound traffic but deny all inbound to these users.
Do you think this is a good option or do you recommend something else?
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...