I’m deploying a BPL-380 for a customer who wants to grant VPN access to a specific application server on the untagged VLAN.
How can I create a remote user policy that outlines VPN access to just one specific server on the untagged VLAN?
Thank you in advance for any assistance that you can provide!
You may be able to accomplish this using internal firewall rules depending on your scenario. Change the default rule to “Deny” and place the following rule on top:
Protocol = Any
Source = internal untagged LAN network
Destination = single address for server IP
Action = Allow
1 Like
Thanks Ron. Will this internal policy affect other devices that may need to interact with each other on the same untagged VLAN?
We are building a VPN/remote access username/password for an external developer company that needs access to a single server on the untagged network. We certainly don’t want them to have access to the other servers, however other VPN users will need access to all internal servers on the untagged VLAN.
It would be nice if we could assign an access policy per VPN user.
The internal firewall rule includes the entire untagged network for the source. This is because a MAC address is not seen with remote users therefore no DHCP reservation.
Internal firewall rules control sessions between LAN/VLAN/Static route networks/PepVPN networks/IPsec networks. If devices on the untagged LAN are connected to a switch without internal routing to other networks this should work.
1 Like