<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two AAA Identity Groups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271412#M135993</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So basically, you have to use authorization as well as authentication instead of just authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Jun 2013 11:21:50 GMT</pubDate>
    <dc:creator>Alex Pfeil</dc:creator>
    <dc:date>2013-06-13T11:21:50Z</dc:date>
    <item>
      <title>Two AAA Identity Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271410#M135982</link>
      <description>&lt;P&gt;I have some administators that log into switches and some end-users that need to be able to authenticate to a VPN.&amp;nbsp; I am running ACS5.2.&amp;nbsp; How can I setup Authentication on the ACS so that an ASA 5520 will authenticate the users to a VPN, but will not authenticate the administrators.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I logged into the VPN session using an administrator account that is not a member of the user group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would think that it would be easy to do this and I am probably overlooking something, but the ASA is setup to use authentication from the ACS and it seems to authenticate any user that is on the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex Pfeil&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271410#M135982</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2019-03-11T03:32:09Z</dc:date>
    </item>
    <item>
      <title>Two AAA Identity Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271411#M135986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With ACS 5.2, you need to add ASA as a TACACS and RADIUS aaa client. &lt;/P&gt;&lt;P&gt;Create 2 differernt identities groups on ACS. One for Admin and other for VPN users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a authorization rule under default network access with a conditions as&lt;/P&gt;&lt;P&gt;Identity-group: Admin&lt;/P&gt;&lt;P&gt;Protocol as radius&lt;/P&gt;&lt;P&gt;Device: ASA-IP address ( if you don't see this condition, use the customize tab available in the bottom right corner)&lt;/P&gt;&lt;P&gt;Authorization profile: Deny access.&lt;/P&gt;&lt;P&gt;Save&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case you would like to configure same via ASA database (without ACS). here is a blog I created a month ago&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/community/netpro/security/aaa/blog/2013/05/05/restrict-local-admin-user-mgmt-purpose-to-access-vpn-on-asa-and-ios"&gt;https://supportforums.cisco.com/community/netpro/security/aaa/blog/2013/05/05/restrict-local-admin-user-mgmt-purpose-to-access-vpn-on-asa-and-ios&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Jun 2013 08:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271411#M135986</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-13T08:56:09Z</dc:date>
    </item>
    <item>
      <title>Two AAA Identity Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271412#M135993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So basically, you have to use authorization as well as authentication instead of just authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Jun 2013 11:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271412#M135993</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2013-06-13T11:21:50Z</dc:date>
    </item>
    <item>
      <title>Two AAA Identity Groups</title>
      <link>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271413#M135999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes we have to use the autorization rule for determining the access permissions in a network access&amp;nbsp; service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Jun 2013 12:54:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/two-aaa-identity-groups/m-p/2271413#M135999</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-13T12:54:49Z</dc:date>
    </item>
  </channel>
</rss>

