<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Active Directory users to manage Cisco ASA 5510 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118647#M183857</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We already have a RADIUS server in place, it's how we are authenticating our VPN users. What I really need is the how to configure the ASDM/HTTPS/Telnet/SSH management access to the ASA that authenticates the user against Active Directory instead of either:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) a preshared password for one account, or&lt;/P&gt;&lt;P&gt;b) setting up individual local user accounts on the ASA for the IT staff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 30 Dec 2012 04:24:05 GMT</pubDate>
    <dc:creator>gamercoar</dc:creator>
    <dc:date>2012-12-30T04:24:05Z</dc:date>
    <item>
      <title>Using Active Directory users to manage Cisco ASA 5510</title>
      <link>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118645#M183855</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if I'm not posting this in the right area, just let me know where it should go and I'll repost it there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that our VPN users currently use Active Directory to authenticate their VPN sessions, so now I'm wondering if there is an easy way to configure my company's Cisco ASA 5510 to use either a Windows Server 2008 R2 Active Directory group (preferred method) or specific Active Directory users (less preferred) and authenticate them for management access (privilege level 15) using their Active Directory credentials. I do not want this to change the IP range used for ASDM/HTTPS/Telnet/SSH access (currently all local networks, no VPN), as those are settings that my company does not want changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118645#M183855</guid>
      <dc:creator>gamercoar</dc:creator>
      <dc:date>2019-03-11T02:55:32Z</dc:date>
    </item>
    <item>
      <title>Using Active Directory users to manage Cisco ASA 5510</title>
      <link>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118646#M183856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For this you will need either a Radius or a TACACS+ server. There are lot of open source Radius servers out there (Open Radius) and if you have Windows Server you can use their built-in NPS server as well. Otherwise you can go with something like Cisco' ISE or ACS which both include Radius. In addition, ACS includes TACACS+ which provides you the most granularity when it comes to authorizing users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Dec 2012 03:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118646#M183856</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-12-30T03:32:29Z</dc:date>
    </item>
    <item>
      <title>Using Active Directory users to manage Cisco ASA 5510</title>
      <link>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118647#M183857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We already have a RADIUS server in place, it's how we are authenticating our VPN users. What I really need is the how to configure the ASDM/HTTPS/Telnet/SSH management access to the ASA that authenticates the user against Active Directory instead of either:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) a preshared password for one account, or&lt;/P&gt;&lt;P&gt;b) setting up individual local user accounts on the ASA for the IT staff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Dec 2012 04:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118647#M183857</guid>
      <dc:creator>gamercoar</dc:creator>
      <dc:date>2012-12-30T04:24:05Z</dc:date>
    </item>
    <item>
      <title>Using Active Directory users to manage Cisco ASA 5510</title>
      <link>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118648#M183858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK what type of Radius server are you using and do you need help with the Radius server configuration or the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Dec 2012 04:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118648#M183858</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-12-30T04:34:01Z</dc:date>
    </item>
    <item>
      <title>Using Active Directory users to manage Cisco ASA 5510</title>
      <link>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118649#M183859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I only started at my company a few months back, so I don't know what kind of RADIUS server we have, but I can see from our VPN configuration that we have one and that we use it to authenticate our VPN users. I *think* all I need is help configuring the ASA to use it for management access for either an AD group or specified AD users, though if something needs to be specially configured on the RADIUS server, then I'll have to figure that out elsewhere.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Dec 2012 05:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118649#M183859</guid>
      <dc:creator>gamercoar</dc:creator>
      <dc:date>2012-12-30T05:24:24Z</dc:date>
    </item>
    <item>
      <title>Using Active Directory users to manage Cisco ASA 5510</title>
      <link>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118650#M183860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is where we need to start. You need to find out what type, make and model of Radius server you have. From there we can try to figure out what and how the setup should look. The good news is that since it is already integrated for your VPN connection then it should not be too much work to get the rest going.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Dec 2012 17:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-active-directory-users-to-manage-cisco-asa-5510/m-p/2118650#M183860</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2012-12-31T17:19:01Z</dc:date>
    </item>
  </channel>
</rss>

