<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP Authentication Issues in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268805#M116909</link>
    <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to get LDAP Authentication working for the VPN, but when I go to test a user that is not defined in the VPN group within AD, they are still able to authenticate and are granted access to the VPN. I am at a loss as to what the actual issue is because everything appears to be defined properly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached the ldap debug logs for a user that is working properly and a user that is not working properly. My understanding is that they should only be able to authenticate against this one group JOB_ADMINS_VPN and if they are not in this group then they should be denied VPN login rights. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,dc=net JOB_ADMINS&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS (Prod) host 10.5.1.11&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-group-base-dn OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=saVPNLDAP,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure I am missing something small, but I am not sure what I am missing. Any help with this issue will be grately apperciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 03:22:56 GMT</pubDate>
    <dc:creator>Alexander Deems</dc:creator>
    <dc:date>2019-03-11T03:22:56Z</dc:date>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268805#M116909</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to get LDAP Authentication working for the VPN, but when I go to test a user that is not defined in the VPN group within AD, they are still able to authenticate and are granted access to the VPN. I am at a loss as to what the actual issue is because everything appears to be defined properly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached the ldap debug logs for a user that is working properly and a user that is not working properly. My understanding is that they should only be able to authenticate against this one group JOB_ADMINS_VPN and if they are not in this group then they should be denied VPN login rights. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,dc=net JOB_ADMINS&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS (Prod) host 10.5.1.11&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-group-base-dn OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=saVPNLDAP,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure I am missing something small, but I am not sure what I am missing. Any help with this issue will be grately apperciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268805#M116909</guid>
      <dc:creator>Alexander Deems</dc:creator>
      <dc:date>2019-03-11T03:22:56Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268806#M116910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please review the below listed config and see what you are missing else share&amp;nbsp; "sh run" from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuration for restricting access to a particular windows group on AD&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy noaccess internal&lt;/P&gt;&lt;P&gt;group-policy noaccess attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 1&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ldap attribute-map LDAP-MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf &lt;DN of="" the="" vpn="" group=""&gt; &lt;GROUP policy="" name=""&gt;&lt;/GROUP&gt;&lt;/DN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LDAP-AD protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAP-AD host &lt;IP-OF-WINDOWS-AD&gt;&lt;/IP-OF-WINDOWS-AD&gt;&lt;/P&gt;&lt;P&gt; server-port 389&lt;/P&gt;&lt;P&gt; ldap-base-dn &lt;AD base="" dn=""&gt;&lt;/AD&gt;&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-dn &lt;LOGIN user="" dn=""&gt;&lt;/LOGIN&gt;&lt;/P&gt;&lt;P&gt; ldap-login-password &lt;PASSWORD for="" login="" user="" dn=""&gt;&lt;/PASSWORD&gt;&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map LDAP-MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy &lt;GROUP policy="" name=""&gt; internal&lt;/GROUP&gt;&lt;/P&gt;&lt;P&gt;group-policy &lt;GROUP policy="" name=""&gt; attributes&lt;/GROUP&gt;&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec ...&lt;/P&gt;&lt;P&gt; address-pools value &lt;ADDRESS pool="" name=""&gt;&lt;/ADDRESS&gt;&lt;/P&gt;&lt;P&gt; .....&lt;/P&gt;&lt;P&gt; .....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;TUNNEL group="" name=""&gt; type remote-access&lt;/TUNNEL&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;TUNNEL group="" name=""&gt; general-attributes&lt;/TUNNEL&gt;&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP-AD&lt;/P&gt;&lt;P&gt; default-group-policy noaccess&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;group-policy noaccess attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 15:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268806#M116910</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-01T15:37:24Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268807#M116911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jatin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup the noaccess policy and made it the default policy under the tunnel-group but both users are still able to authenticate against the LDAP server. I have posted the relevate configurations that I have for the LDAP configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.5.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.7.12.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.6.1.64 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.6.1.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.10.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.40.4.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.1.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.11.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.1.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.4.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.14.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.4.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.2.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool server-mgmt_Admins2 10.5.22.2-10.5.22.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,dc=net JOB_ADMINS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS (Prod) host 10.5.1.11&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-group-base-dn OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=saVPNLDAP,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy noaccess internal&lt;/P&gt;&lt;P&gt;group-policy noaccess attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 1&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 ssl-clientless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy JOB_ADMINS_GRP internal&lt;/P&gt;&lt;P&gt;group-policy JOB_ADMINS_GRP attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value JOB_ADMINS_splitTunnelAcl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group JOB_ADMINS type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group JOB_ADMINS general-attributes&lt;/P&gt;&lt;P&gt; address-pool server-mgmt_Admins2&lt;/P&gt;&lt;P&gt; authentication-server-group JOB_ADMINS&lt;/P&gt;&lt;P&gt; default-group-policy JOB_ADMINS_GRP&lt;/P&gt;&lt;P&gt;tunnel-group JOB_ADMINS ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 16:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268807#M116911</guid>
      <dc:creator>Alexander Deems</dc:creator>
      <dc:date>2013-05-01T16:34:53Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268808#M116912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what you need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under ldap attribute map you have group-policy name incorrectly configured. It should be &lt;STRONG&gt;JOB_ADMINS_GRP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------------&lt;/P&gt;&lt;P&gt;ldap attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,dc=net&lt;STRONG&gt; &lt;SPAN style="text-decoration: underline;"&gt;JOB_ADMINS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; --------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the noaccess group policy simultaneous sessions should be set to 0&lt;/P&gt;&lt;P&gt;-------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;group-policy noaccess internal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;group-policy noaccess attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; vpn-simultaneous-logins 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the tunnel-group set the default-group-policy as&amp;nbsp; noaccess because legimitate users should get the right group through ldap attribute map. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;------------------------------------------------------------------&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group JOB_ADMINS type remote-access&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group JOB_ADMINS general-attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; address-pool server-mgmt_Admins2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; authentication-server-group JOB_ADMINS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;default-group-policy noaccess&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case it doesn't work....run the &lt;STRONG&gt;debug ldap 255&lt;/STRONG&gt; and send the debugs and new ldap config again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 16:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268808#M116912</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-01T16:50:48Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268809#M116913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jatin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have made the changes that you have mentioned, but now&amp;nbsp; I am not able to authenticate with either account but they are showing&amp;nbsp; both as successful when looking at the debug logs of ldap. If I look at&amp;nbsp; the logs after beign authenticated they are both being applied to the&amp;nbsp; noaccess policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.5.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.7.12.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.6.1.64 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.6.1.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.10.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.40.4.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.1.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.11.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.1.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 204.90.21.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.4.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.14.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.4.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list JOB_ADMINS_splitTunnelAcl standard permit 10.5.2.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool server-mgmt_Admins2 10.5.22.2-10.5.22.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,dc=net JOB_ADMINS_GRP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server JOB_ADMINS (Prod) host 10.5.1.11&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-group-base-dn OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=saVPNLDAP,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy noaccess internal&lt;/P&gt;&lt;P&gt;group-policy noaccess attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy JOB_ADMINS_GRP internal&lt;/P&gt;&lt;P&gt;group-policy JOB_ADMINS_GRP attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value JOB_ADMINS_splitTunnelAcl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group JOB_ADMINS type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group JOB_ADMINS general-attributes&lt;/P&gt;&lt;P&gt; address-pool server-mgmt_Admins2&lt;/P&gt;&lt;P&gt; authentication-server-group JOB_ADMINS&lt;/P&gt;&lt;P&gt; default-group-policy noaccess&lt;/P&gt;&lt;P&gt;tunnel-group JOB_ADMINS ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;debug ldap 22 55&lt;/P&gt;&lt;P&gt;debug ldap&amp;nbsp; enabled at level 255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;User that should have access:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|May&amp;nbsp; 01 2013|20:12:02|713167|||||Group = JOB_ADMINS, Username = testuser1,&amp;nbsp; IP = 99.3.21.69, Remote peer has failed user authentication -&amp;nbsp; check&amp;nbsp; configured username and password&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|May 01 2013|20:12:02|713905|||||Group = JOB_ADMINS,&amp;nbsp; Username = testuser1, IP = 99.3.21.69, Login authentication failed due&amp;nbsp; to max simultaneous-login restriction.&lt;/P&gt;&lt;P&gt;6|May 01 2013|20:12:02|113013|||||AAA unable to complete the&amp;nbsp; request Error : reason = Simultaneous logins exceeded for user : user =&amp;nbsp; testuser1&lt;/P&gt;&lt;P&gt;6|May 01 2013|20:12:02|113009|||||AAA retrieved default group policy (noaccess) for user = testuser1&lt;/P&gt;&lt;P&gt;6|May 01 2013|20:12:02|113004|||||AAA user authentication Successful : server =&amp;nbsp; 10.5.1.11 : user = testuser1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[41476] Session Start&lt;/P&gt;&lt;P&gt;[41476] New request Session, context 0x756ea2c4, reqType = Authentication&lt;/P&gt;&lt;P&gt;[41476] Fiber started&lt;/P&gt;&lt;P&gt;[41476] Creating LDAP context with uri=ldap://10.5.1.11:389&lt;/P&gt;&lt;P&gt;[41476] Connect to LDAP server: ldap://10.5.1.11:389, status = Successful&lt;/P&gt;&lt;P&gt;[41476] supportedLDAPVersion: value = 3&lt;/P&gt;&lt;P&gt;[41476] supportedLDAPVersion: value = 2&lt;/P&gt;&lt;P&gt;[41476] Binding as saVPNLDAP&lt;/P&gt;&lt;P&gt;[41476] Performing Simple authentication for saVPNLDAP to 10.5.1.11&lt;/P&gt;&lt;P&gt;[41476] LDAP Search:&lt;/P&gt;&lt;P&gt;Base DN = [DC=test,DC=net]&lt;/P&gt;&lt;P&gt;Filter&amp;nbsp; = [sAMAccountName=testuser1]&lt;/P&gt;&lt;P&gt;Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;/P&gt;&lt;P&gt;[41476] User DN = [CN=test user1,CN=Users,DC=test,DC=net]&lt;/P&gt;&lt;P&gt;[41476] Talking to Active Directory server 10.5.1.11&lt;/P&gt;&lt;P&gt;[41476] Reading password policy for testuser1, dn:CN=test user1,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] Read bad password count 0&lt;/P&gt;&lt;P&gt;[41476] Binding as testuser1&lt;/P&gt;&lt;P&gt;[41476] Performing Simple authentication for testuser1 to 10.5.1.11&lt;/P&gt;&lt;P&gt;[41476] Processing LDAP response for user testuser1&lt;/P&gt;&lt;P&gt;[41476] Message (testuser1): &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[41476] Authentication successful for testuser1 to 10.5.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[41476] Retrieved User Attributes:&lt;/P&gt;&lt;P&gt;[41476] objectClass: value = top&lt;/P&gt;&lt;P&gt;[41476] objectClass: value = person&lt;/P&gt;&lt;P&gt;[41476] objectClass: value = organizationalPerson&lt;/P&gt;&lt;P&gt;[41476] objectClass: value = user&lt;/P&gt;&lt;P&gt;[41476] cn: value = test user1&lt;/P&gt;&lt;P&gt;[41476] sn: value = user1&lt;/P&gt;&lt;P&gt;[41476] givenName: value = test&lt;/P&gt;&lt;P&gt;[41476] distinguishedName: value = CN=test user1,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] instanceType: value = 4&lt;/P&gt;&lt;P&gt;[41476] whenCreated: value = 20120806180638.0Z&lt;/P&gt;&lt;P&gt;[41476] whenChanged: value = 20130423133440.0Z&lt;/P&gt;&lt;P&gt;[41476] displayName: value = test user1&lt;/P&gt;&lt;P&gt;[41476] uSNCreated: value = 801795&lt;/P&gt;&lt;P&gt;[41476] memberOf: value = CN=JOB_ADMINS_VPN,OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to Group-Policy: value = CN=JOB_ADMINS_VPN,OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to LDAP-Class: value = CN=JOB_ADMINS_VPN,OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] memberOf: value = CN=Domain Admins,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to Group-Policy: value = CN=Domain Admins,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to LDAP-Class: value = CN=Domain Admins,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] uSNChanged: value = 5332833&lt;/P&gt;&lt;P&gt;[41476] name: value = test user1&lt;/P&gt;&lt;P&gt;[41476] objectGUID: value = ^=.R ..G..l.v...&lt;/P&gt;&lt;P&gt;[41476] userAccountControl: value = 4260352&lt;/P&gt;&lt;P&gt;[41476] badPwdCount: value = 0&lt;/P&gt;&lt;P&gt;[41476] codePage: value = 0&lt;/P&gt;&lt;P&gt;[41476] countryCode: value = 0&lt;/P&gt;&lt;P&gt;[41476] badPasswordTime: value = 130118986766771866&lt;/P&gt;&lt;P&gt;[41476] lastLogoff: value = 0&lt;/P&gt;&lt;P&gt;[41476] lastLogon: value = 130118986798595922&lt;/P&gt;&lt;P&gt;[41476] pwdLastSet: value = 130102536223967367&lt;/P&gt;&lt;P&gt;[41476] primaryGroupID: value = 513&lt;/P&gt;&lt;P&gt;[41476] objectSid: value = ............WM...~..$9......&lt;/P&gt;&lt;P&gt;[41476] adminCount: value = 1&lt;/P&gt;&lt;P&gt;[41476] accountExpires: value = 9223372036854775807&lt;/P&gt;&lt;P&gt;[41476] logonCount: value = 123&lt;/P&gt;&lt;P&gt;[41476] sAMAccountName: value = testuser1&lt;/P&gt;&lt;P&gt;[41476] sAMAccountType: value = 805306368&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[41476] userPrincipalName: value = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:testuser1@test.net"&gt;testuser1@test.net&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[41476] lockoutTime: value = 0&lt;/P&gt;&lt;P&gt;[41476] objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] dSCorePropagationData: value = 20120806185439.0Z&lt;/P&gt;&lt;P&gt;[41476] dSCorePropagationData: value = 16010101000000.0Z&lt;/P&gt;&lt;P&gt;[41476] lastLogonTimestamp: value = 130111976655441174&lt;/P&gt;&lt;P&gt;[41476] msDS-SupportedEncryptionTypes: value = 0&lt;/P&gt;&lt;P&gt;[41476] Fiber exit Tx=593 bytes Rx=2990 bytes, status=1&lt;/P&gt;&lt;P&gt;[41476] Session End&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;User that should not have access:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|May&amp;nbsp; 01 2013|20:28:58|713905|||||Group = JOB_ADMINS, Username =testuser2 ,&amp;nbsp; IP = 99.3.21.69, Login authentication failed due to max&amp;nbsp;&amp;nbsp; simultaneous-login restriction.&lt;/P&gt;&lt;P&gt;6|May 01 2013|20:28:58|113013|||||AAA unable to complete the&amp;nbsp;&amp;nbsp; request Error : reason = Simultaneous logins exceeded for user : user =&amp;nbsp; testuser2&lt;/P&gt;&lt;P&gt;6|May 01 2013|20:28:58|113009|||||AAA retrieved default group policy (noaccess) for user = testuser2&lt;/P&gt;&lt;P&gt;6|May 01 2013|20:28:58|113004|||||AAA user authentication Successful : server =&amp;nbsp; 10.5.1.11 : user = testuser2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[41478] Session Start&lt;/P&gt;&lt;P&gt;[41478] New request Session, context 0x756ea2c4, reqType = Authentication&lt;/P&gt;&lt;P&gt;[41478] Fiber started&lt;/P&gt;&lt;P&gt;[41478] Creating LDAP context with uri=ldap://10.5.1.11:389&lt;/P&gt;&lt;P&gt;[41478] Connect to LDAP server: ldap://10.5.1.11:389, status = Successful&lt;/P&gt;&lt;P&gt;[41478] supportedLDAPVersion: value = 3&lt;/P&gt;&lt;P&gt;[41478] supportedLDAPVersion: value = 2&lt;/P&gt;&lt;P&gt;[41478] Binding as saVPNLDAP&lt;/P&gt;&lt;P&gt;[41478] Performing Simple authentication for saVPNLDAP to 10.5.1.11&lt;/P&gt;&lt;P&gt;[41478] LDAP Search:&lt;/P&gt;&lt;P&gt;Base DN = [DC=test,DC=net]&lt;/P&gt;&lt;P&gt;Filter&amp;nbsp; = [sAMAccountName=testuser2]&lt;/P&gt;&lt;P&gt;Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;/P&gt;&lt;P&gt;[41478] User DN = [CN=test user2,CN=Users,DC=test,DC=net]&lt;/P&gt;&lt;P&gt;[41478] Talking to Active Directory server 10.5.1.11&lt;/P&gt;&lt;P&gt;[41478] Reading password policy for testuser2, dn:CN=test user2,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41478] Read bad password count 0&lt;/P&gt;&lt;P&gt;[41478] Binding as testuser2&lt;/P&gt;&lt;P&gt;[41478] Performing Simple authentication for testuser2 to 10.5.1.11&lt;/P&gt;&lt;P&gt;[41478] Processing LDAP response for user testuser2&lt;/P&gt;&lt;P&gt;[41478] Message (testuser2): &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[41478] Authentication successful for testuser2 to 10.5.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[41478] Retrieved User Attributes:&lt;/P&gt;&lt;P&gt;[41478] objectClass: value = top&lt;/P&gt;&lt;P&gt;[41478] objectClass: value = person&lt;/P&gt;&lt;P&gt;[41478] objectClass: value = organizationalPerson&lt;/P&gt;&lt;P&gt;[41478] objectClass: value = user&lt;/P&gt;&lt;P&gt;[41478] cn: value = test user2&lt;/P&gt;&lt;P&gt;[41478] sn: value = user2&lt;/P&gt;&lt;P&gt;[41478] givenName: value = test&lt;/P&gt;&lt;P&gt;[41478] distinguishedName: value = CN=test user2,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41478] instanceType: value = 4&lt;/P&gt;&lt;P&gt;[41478] whenCreated: value = 20130430211013.0Z&lt;/P&gt;&lt;P&gt;[41478] whenChanged: value = 20130430211855.0Z&lt;/P&gt;&lt;P&gt;[41478] displayName: value = test user2&lt;/P&gt;&lt;P&gt;[41478] uSNCreated: value = 5521902&lt;/P&gt;&lt;P&gt;[41478] uSNChanged: value = 5522087&lt;/P&gt;&lt;P&gt;[41478] name: value = test user2&lt;/P&gt;&lt;P&gt;[41478] objectGUID: value = .$....CI._M..!..&lt;/P&gt;&lt;P&gt;[41478] userAccountControl: value = 512&lt;/P&gt;&lt;P&gt;[41478] badPwdCount: value = 0&lt;/P&gt;&lt;P&gt;[41478] codePage: value = 0&lt;/P&gt;&lt;P&gt;[41478] countryCode: value = 0&lt;/P&gt;&lt;P&gt;[41478] badPasswordTime: value = 130118938289218719&lt;/P&gt;&lt;P&gt;[41478] lastLogoff: value = 0&lt;/P&gt;&lt;P&gt;[41478] lastLogon: value = 130118938313398762&lt;/P&gt;&lt;P&gt;[41478] pwdLastSet: value = 130118301831344840&lt;/P&gt;&lt;P&gt;[41478] primaryGroupID: value = 513&lt;/P&gt;&lt;P&gt;[41478] objectSid: value = ............WM...~..$9..C...&lt;/P&gt;&lt;P&gt;[41478] accountExpires: value = 9223372036854775807&lt;/P&gt;&lt;P&gt;[41478] logonCount: value = 0&lt;/P&gt;&lt;P&gt;[41478] sAMAccountName: value = testuser2&lt;/P&gt;&lt;P&gt;[41478] sAMAccountType: value = 805306368&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[41478] userPrincipalName: value = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:testuser2@test.net"&gt;testuser2@test.net&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[41478] objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41478] dSCorePropagationData: value = 20130430211855.0Z&lt;/P&gt;&lt;P&gt;[41478] dSCorePropagationData: value = 16010101000000.0Z&lt;/P&gt;&lt;P&gt;[41478] lastLogonTimestamp: value = 130118303181995212&lt;/P&gt;&lt;P&gt;[41478] Fiber exit Tx=599 bytes Rx=2769 bytes, status=1&lt;/P&gt;&lt;P&gt;[41478] Session End&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 20:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268809#M116913</guid>
      <dc:creator>Alexander Deems</dc:creator>
      <dc:date>2013-05-01T20:40:42Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268810#M116914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking at the debugs, I don't see user getting the right group-policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication will be successfull but the group retrieval noaccess will do the trick as we have simultaneous session set to 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[41476] memberOf: value = CN=JOB_ADMINS_VPN,OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to Group-Policy: value = CN=JOB_ADMINS_VPN,OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to LDAP-Class: value = CN=JOB_ADMINS_VPN,OU=VPN,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] memberOf: value = CN=Domain Admins,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to Group-Policy: value = CN=Domain Admins,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] mapped to LDAP-Class: value = CN=Domain Admins,CN=Users,DC=test,DC=net&lt;/P&gt;&lt;P&gt;[41476] uSNChanged: value = 5332833&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more change and you will be good to go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map JOB_ADMIN_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,&lt;STRONG&gt;d&lt;/STRONG&gt;c=net JOB_ADMINS_GRP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above config replace &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,&lt;STRONG&gt;d&lt;/STRONG&gt;c=net JOB_ADMINS_GRP&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;map-value memberOf CN=JOB_ADMINS_VPN,OU=VPN,DC=test,DC=net JOB_ADMINS_GRP&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: The d in dc=net is in smaller case. However your ldap says it should be in upper case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;JOB_ADMINS_GRP&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 21:21:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268810#M116914</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-01T21:21:49Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268811#M116915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jatin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Awesome! Thank you for your help on this issue and after a few changes it is working perfectly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 May 2013 13:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268811#M116915</guid>
      <dc:creator>Alexander Deems</dc:creator>
      <dc:date>2013-05-02T13:46:56Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication Issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268812#M116916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Amazing!!! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to know let you know that I have added a PPT&amp;nbsp; &lt;STRONG&gt;setting up LDAP on ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Here is a link for your refrence. It may help you further while working on this issue.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-32670"&gt;https://supportforums.cisco.com/docs/DOC-32670&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 May 2013 14:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication-issues/m-p/2268812#M116916</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-02T14:54:31Z</dc:date>
    </item>
  </channel>
</rss>

