- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Restrict Meraki VPN access Based on Device
I am looking for info on how to restrict Meraki VPN connection based on a users device. If possible only allowing domain joined devices to connect to the VPN.
A method may be by using certificate authentication but I am not sure if a user could export the certificate and just go around this method.
Solved! Go to solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
My first choice is to use Cisco AnyConnect and SAML. Authenticate against Azure AD, and use conditional access to restrict logins to Azure AD joined machines. Or you could authenticate against Cisco Duo, and restrict access to trusted devices.
https://duo.com/docs/trusted-endpoints
If you have Active Directory then you could use certificates. Deploy a CA server. Create a certificate template to deploy machine certificates, and untick "Allow private key to be exported".
https://learn.microsoft.com/en-us/answers/questions/57551/export-certificate-with-private-key
You'll need to create an AnyConnect connection profile, and specify that certificates should come from the machine certificate store (and not the user certificate store).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Theoretically, a device certificate is valid only for the machine added to the domain.
Certificate authentication: This is used to configure the trusted CA file that is used to authenticate client devices. This configuration is only required if you need to authenticate client devices with a certificate. Only certificates PEM format are supported at this time.
I'm not sure if this would work as the options you have with Meraki VPN are limited.
Perhaps you would have more options if you were using Cisco ISE as a Radius server.
I suggest you to open a support case.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
My first choice is to use Cisco AnyConnect and SAML. Authenticate against Azure AD, and use conditional access to restrict logins to Azure AD joined machines. Or you could authenticate against Cisco Duo, and restrict access to trusted devices.
https://duo.com/docs/trusted-endpoints
If you have Active Directory then you could use certificates. Deploy a CA server. Create a certificate template to deploy machine certificates, and untick "Allow private key to be exported".
https://learn.microsoft.com/en-us/answers/questions/57551/export-certificate-with-private-key
You'll need to create an AnyConnect connection profile, and specify that certificates should come from the machine certificate store (and not the user certificate store).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I will try the SAML method and see if it works.
Thank you
