I received a question from a customer looking for a way to prevent an end user from using the SSLVPN client when at the office. As far as I know there isn't a PRACTICAL way to do this but I'm throwing it out here in case there are some good ideas.
The office has an ASA and a S2S tunnel to the UTM 9 in a datacenter where all their servers and apps are housed. Only LAN traffic goes over the tunnel, split tunnel is in effect at the office site so they appear to come from the internet and can make the SSLVPN connection just like from anywhere else. If I were to block port 443 traffic from the public ip of the office, then the IT staff at the office cannot setup users ahead of time, can't even get to the user portal. Unless they were to have a secondary internet connection they could use just for setup, I don't see a way to do this other than to educate the users.
This thread was automatically locked due to age.