5-21
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 5 Identity Firewall
Monitoring the Identity Firewall
VPN with IDFW Rule -1 Example
By default, the
sysopt connection permit-vpn
command is enabled and VPN traffic is exempted from
an access list check. To apply interface-based ACL rules for VPN traffic, VPN traffic access list
bypassing needs to be disabled.
In this example, if the user logs in from the outside interface, the IDFW rules control which network
resources are accessible. All VPN users are to be stored under the LOCAL domain. Therefore, it is only
meaningful to apply the rules for LOCAL users or object groups that include LOCAL users.
! Apply VPN-Filter with bypassing access-list check disabled
no sysopt connection permit-vpn
access-list v1 extended deny ip user LOCAL\idfw any 10.0.0.0 255.255.255.0
access-list v1 extended permit ip user LOCAL\idfw any 20.0.0.0 255.255.255.0
access-group v1 in interface outside
VPN with IDFW Rule -2 Example
By default, the
sysopt connection permit-vpn
command is enabled, with VPN traffic access bypassing
enabled. A VPN filter can be used to apply the IDFW rules to the VPN traffic. A VPN filter with IDFW
rules can be defined in the CLI username and group policy.
In the example, when user idfw logs in, the user can access network resources in the 10.0.00/24 subnet.
However, when user user1 logs in, access to network resources in 10.0.00/24 subnet is denied. Note that
all VPN users are stored under the LOCAL domain. Therefore, it is only meaningful to apply the rules
for LOCAL users or object groups that include LOCAL users.
Note
IDFW rules can only be applied to VPN filters under group policy and are not available in all of the other
group policy features.
! Apply VPN-Filter with bypassing access-list check enabled
sysopt connection permit-vpn
access-list v1 extended permit ip user LOCAL\idfw any 10.0.0.0 255.255.255.0
access-list v2 extended deny ip user LOCAL\user1 any 10.0.0.0 255.255.255.0
username user1 password QkBIIYVi6IFLEsYv encrypted privilege 0 username user1 attributes
vpn-group-policy group1 vpn-filter value v2
username idfw password eEm2dmjMaopcGozT encrypted
username idfw attributes
vpn-group-policy testgroup vpn-filter value v1
sysopt connection permit-vpn
access-list v1 extended permit ip user LOCAL\idfw any 10.0.0.0 255.255.255.0 access-list
v1 extended deny ip user LOCAL\user1 any 10.0.0.0 255.255.255.0 group-policy group1
internal
group-policy group1 attributes
vpn-filter value v1
vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless
Monitoring the Identity Firewall
See the following commands for monitoring the Identity Firewall status:
•
show user-identity ad-agent
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......