View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

SEC0129 - SSL VPN AnyConnect Dynamic Access Policy (DAP) (Part 2)

Rating: 
0
No votes yet
Difficulty Level: 
3
Lab Document: 
<Please login to see the content>
The video shows you how to utilize the endpoint posture information gathered during a host scan to enforce access to Cisco ASA AnyConnect VPN through Dynamic Access Policy (DAP). We will perform various checks on the status of client Antivirus software and firewall combining with the pre-login policy results from the previous lab and alter VPN access accordingly. You will learn the effect that DAP has on both AnyConnect client and clientless VPN.
 
Part 2 of this video validates our DAP configuration with client testing
 
Topic:
  • Dynamic Access Policy (DAP)
    • Antivirus, Firewall, Process Check
  • Host Scan and Pre-Login Policy

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at labminutes.com, Metha enjoys learning and challenges himself with new technologies.

1 comments

Hello Metha,

Thank you for the video! I have a question about the DAP policies order in ASDM; in which order the policies are applied? In ASDM I see alphabetically; however, on CLI, when I issue 'debug menu dap 2' command, I see another order. What is the best way to add policies in an order?

Thanks
Best

-Erdo

Poll

Vote for the Next Video Series