<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Doubt on RA vpn user aaa using ACS 5.3 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962594#M245729</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The purpose of using radius authentication is to centralize the user accounts and policies so that you will not have to configure these on the ASA. You will need to create an authentication server group that points to your ACS, then you will have to reference this server-group to your tunnel-group so user authentication requests will be forwarded to ACS for authentication. For accounting you will create an accounting server group and also assign that to your tunnel group configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACS you will have to create a network device client which is the ASA, and the shared secret will have to be the same. You will create a network authorization policy element which will have any authorization parameters, or you can choose the Permit Access which allows authentication succeed without any special permissions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can debug the sessoin by using debug crypto vpnclient 255 to see the authentication flow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using SSL vpn (anyconnect) for these sessions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 30 Jun 2012 15:15:32 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2012-06-30T15:15:32Z</dc:date>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962593#M245716</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to set up RA VPN on ASA 8.4 with 2 groups - VPNGp1 and&amp;nbsp; VPNGp2. VPNGp1 users will access 1.2.3.0/24 and VPNGp2 users will access&amp;nbsp; 5.6.7.0/24. User authentication will happen using ACS 5.3 Radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA, I have configured the IP pools, VPN ACLs, VPN groups, group policies for each group, and tunnel groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ACS, I have created vpn-user1 and vpn-user2 for each of 2 groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if some more configuration needs to be done on ASA and&amp;nbsp; ACS... Do I need to add new users - vpn-user1 and vpn-user2 - on ASA,&amp;nbsp; under each corresponding group policy, using vpn-group-policy command?&amp;nbsp; Or I need to do something else on ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lastly, how can I configure authorization and accounting for the VPN users? Do I need to do this on ACS or on ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:15:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962593#M245716</guid>
      <dc:creator>newciscostudent</dc:creator>
      <dc:date>2019-03-11T02:15:20Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962594#M245729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The purpose of using radius authentication is to centralize the user accounts and policies so that you will not have to configure these on the ASA. You will need to create an authentication server group that points to your ACS, then you will have to reference this server-group to your tunnel-group so user authentication requests will be forwarded to ACS for authentication. For accounting you will create an accounting server group and also assign that to your tunnel group configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACS you will have to create a network device client which is the ASA, and the shared secret will have to be the same. You will create a network authorization policy element which will have any authorization parameters, or you can choose the Permit Access which allows authentication succeed without any special permissions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can debug the sessoin by using debug crypto vpnclient 255 to see the authentication flow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using SSL vpn (anyconnect) for these sessions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 15:15:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962594#M245729</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-06-30T15:15:32Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962595#M245738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure remote access vpn, not ssl vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA, I have done this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server tacacsgroup protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server tacacsgroup (management) host 1.2.3.4&lt;/P&gt;&lt;P&gt;key cisco&lt;/P&gt;&lt;P&gt;aaa authentication ssh console tacacsgroup local&lt;/P&gt;&lt;P&gt;aaa authorization command tacacsgroup&lt;/P&gt;&lt;P&gt;aaa accounting ssh console tacacsgroup&lt;/P&gt;&lt;P&gt;aaa accounting command tacacsgroup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server radgroup protocol radius&lt;/P&gt;&lt;P&gt;aaa-server radgroup (management) host 1.2.3.4&lt;/P&gt;&lt;P&gt;key cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created the ip pools, interesting traffic ACLs, group policies, and tunnel groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ACS, I have added asa as AAA client, created vpn-user1 and vpn-user2 and configured the authorization policy for each.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this config complete for RA vpn with authentication, authorization and accounting from ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I confirm that AAA (authentication, authorization and accounting of commands) of RA vpn users is happening via ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 19:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962595#M245738</guid>
      <dc:creator>newciscostudent</dc:creator>
      <dc:date>2012-06-30T19:21:56Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962596#M245746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please post the tunnel group configurations also. You have to reference the authentication server group and accounting server group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no command accounting for remote access VPN, just details about connection details: connection time data consumption...etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're asking how to verify from the acs side, check the monitoring and reports section and see the radius authetication and radius accounting reports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can create an internal user on the Asa and attempt to authenticate to see if you at denied, so you knw te request is going to the acs server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just so you know you can join acs to AD and use accounts in active directory. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2012 03:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962596#M245746</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-01T03:26:20Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962597#M245771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the ra vpn config from my asa:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ciscoasa(config)# ip local pool grponepool 192.168.1.1-192.168.1.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ciscoasa(config)# ip local pool grptwopool 192.168.1.100-192.168.1.150 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# access-list Test_Split_ACL standard permit 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# group-policy grponeGrpPol internal&lt;/P&gt;&lt;P&gt;ciscoasa(config)# group-policy grponeGrpPol attributes&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# vpn-tunnel-protocol ikev1&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# split-tunnel-network-list value Test_Split_ACL&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# dns-server value 10.10.10.10&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# default-domain value domain.com&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# vpn-filter value grponeACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# group-policy grptwoGrpPol internal&lt;/P&gt;&lt;P&gt;ciscoasa(config)# group-policy grptwoGrpPol attributes&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# vpn-tunnel-protocol ikev1&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# split-tunnel-network-list value Test_Split_ACL&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# dns-server value 10.10.10.10&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# default-domain value domain.com&lt;/P&gt;&lt;P&gt;ciscoasa(config-group-policy)# vpn-filter value grptwoACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# tunnel-group grponeTunGrp type remote-access&lt;/P&gt;&lt;P&gt;ciscoasa(config)# tunnel-group grponeTunGrp general-attributes&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)# default-group-policy grponeGrpPol&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)# address-pool grponepool&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)# authentication-server-group radgroup&lt;/P&gt;&lt;P&gt;ciscoasa(config)# tunnel-group grponeTunGrp ipsec-attributes&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-ipsec)# ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# tunnel-group grptwoTunGrp type remote-access&lt;/P&gt;&lt;P&gt;ciscoasa(config)# tunnel-group grptwoTunGrp general-attributes&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)# default-group-policy grptwoGrpPol&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)# address-pool grptwopool&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)# authentication-server-group radgroup&lt;/P&gt;&lt;P&gt;ciscoasa(config)# tunnel-group grptwoTunGrp ipsec-attributes&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-ipsec)# ikev1 pre-shared-key *****&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the aaa config from my asa:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ciscoasa(config)# aaa-server tacacsgroup protocol tacacs+&lt;/P&gt;&lt;P&gt;ciscoasa(config)# aaa-server tacacsgroup (management) host 1.2.3.4&lt;/P&gt;&lt;P&gt;ciscoasa(config)# key cisco&lt;/P&gt;&lt;P&gt;ciscoasa(config)# aaa authentication ssh console tacacsgroup local&lt;/P&gt;&lt;P&gt;ciscoasa(config)# aaa authorization command tacacsgroup&lt;/P&gt;&lt;P&gt;ciscoasa(config)# aaa accounting ssh console tacacsgroup&lt;/P&gt;&lt;P&gt;ciscoasa(config)# aaa accounting command tacacsgroup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# aaa-server radgroup protocol radius&lt;/P&gt;&lt;P&gt;ciscoasa(config)# aaa-server radgroup (management) host 1.2.3.4&lt;/P&gt;&lt;P&gt;ciscoasa(config)# key cisco&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this look complete? Or I should add 'accounting-server-group' also to tunnel group config? As you said, accounting for ra vpn do not log commands run by users, only conn related information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made tacacsgroup so I can use acs for authenticating my admin users, when I ssh into asa for managing it.&lt;/P&gt;&lt;P&gt;I checked acs monitoring and reports and yes I find the tacacs event reports and radius auth n accounting reports. But there is no radius authorization report..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if I understand correctly, when I ssh into asa, the asa sends access request to acs, the acs confirms the username and password, and records the authentication, authorization events. From here, when I will run any command, those will also be logged in acs. And I will be able to view these in acs monitoring n reports under tacacs reports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a vpn user, when user connects via vpn client, the group info will be passed along with the userid entered for authentication. ASA will receive the request and ask acs for validation. If the login information is right, then acs will confirm n based on the group membership, vpn user will be given ip address from one of the 2 pools. Then, based on what privilege level I assign to group user on acs via authorization policy, user will be able to run those commands on asa. am I right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So everything related to aaa happens using acs. Is there a way I can check authentication, authorization and accounting event &lt;SPAN style="text-decoration: underline;"&gt;on&lt;/SPAN&gt; asa for both vpn user and my admin user?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2012 13:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962597#M245771</guid>
      <dc:creator>newciscostudent</dc:creator>
      <dc:date>2012-07-01T13:55:24Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962598#M245786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Radius is a different protocol based on tacacs, the authorization in radius is the response sent in the access-accept. Unlike tacacs where once authentication succeeds the Asa in this case will send and authorization packet to the acs and that is done for every command if you choose command authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you look at your configuration the:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The aaa authentication commands are used to authenticate admin access to the Asa using tacacs, there is no way a radius user will be able to adminster this device (unless your users in acs match the same tacacs policies). Your configuration for radius is only referenced in the tunnel-group in order to authenticate the users for network access, you can implement command authorization using radius but it's not practical since based on the design of the protocol itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 03:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962598#M245786</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-02T03:02:54Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962599#M245796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;okay, right. The ra vpn users only need to access some server in internal lan, n for each ra vpn group, I mapped the acls. So yeah radius will be used to authenticate the ra vpn user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way I can check authentication, authorization and accounting event &lt;SPAN style="text-decoration: underline;"&gt;on&lt;/SPAN&gt; asa for both vpn user and my admin user?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 03:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962599#M245796</guid>
      <dc:creator>newciscostudent</dc:creator>
      <dc:date>2012-07-02T03:18:02Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962600#M245819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can issue debug VPN-sessiondb 255, and capture the debugs for the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 03:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962600#M245819</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-07-02T03:26:37Z</dc:date>
    </item>
    <item>
      <title>Doubt on RA vpn user aaa using ACS 5.3</title>
      <link>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962601#M245844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok Tarik. Thanks for answering my doubts. It was very helpful to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 03:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/doubt-on-ra-vpn-user-aaa-using-acs-5-3/m-p/1962601#M245844</guid>
      <dc:creator>newciscostudent</dc:creator>
      <dc:date>2012-07-02T03:33:40Z</dc:date>
    </item>
  </channel>
</rss>

