Forum Discussion
rod_23093
Nimbostratus
Aug 21, 2009Pre Inspection Question
I have this situation.
I have a firepass that presents both network access and a citrix portal access to users.
The problem i have is that I would like to allocate the SSL VPN network access only to our company laptops and citrix portal access to all other non company PC's.
I would guess I create a pre inspection policy that checks for certificates issued from our CA domain - that way we can tell which nodes belong to our network - however what I can't figure out is how to i dynamically map these applications.
company laptops get network access
no company PC's get portal access
Any help would be appreciated.
thanks
rod
3 Replies
- psilvas
Altostratus
First goto Users>Endpoint Security>Protected configurations to create the rule for Network Access (can create multiple for multiple resources) You should be able to simply go to the bottom of the Network Access resource (creation) page and find: Endpoint Protection Required for this Resource Group - you can then select the Protected Config you created and attach it to that resource. hope that helps.
ps - rod_23093
Nimbostratus
Hi Thanks for your reply.
The problem is that I have user 1 who is a member of Active Directory Laptop group, and is also a member of domain users group.
The problem is that when user 1 logs in say from an internet kiosk he will be presented with both citrix and network access - I want to restrict network access to non company computers so that no information can be saved locally (you would be able to do this via network access)
I need to know how deliver different application access to a user who is a member of 2 different groups
(laptop users get network access)
(domain users get citrix portal access)
My user is a member of both these groups - however I need to be able to give him only citrix portal access when logging in from a non work PC, and when he logs in using his laptop he gets network access.
Hope thats explained it better.
thanks
Rod - rod_23093
Nimbostratus
Hi - I have solved my issue out myself.
I created a pre logon sequence that checks the registry (specifically domain membership. key = "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"."DefaultDomainName"="DOMAIN NAME"
I entered to 2 actions DOMAIN PC and NON Domain PC and set up a new action that defined custom variables, for domain PC I entered domainmember=1 and for non domain pc i entered domainmember=2
Domain PC was followed with a loging allowed page and non Domain PC was followed with a Logon Denied Page
I set up a new protected configuration called domain check and for the protection criteria I specified unauthorized access and added 2 custom checks session.userdef.DomainMember==1 and session.userdef.DomainMember==2
I then applied this new protected configuration to my SSL network access via the protected resources page and hey presto it works
domain pc's now get full access and non domain pc's get restricted access (No SSL VPN)
Hope that helps.
Rod
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects