<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuring Cisco ACS 5.3 for AnyConnect VPN and Management of a in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957691#M245816</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Just to share---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the way we handled this particular instances since there is only one group who will use this ASA.&amp;nbsp; On the 5505, we made modified the default simultaneous logins to 0.&amp;nbsp; And then on our VPN group profile, we unchecked the inherit box and modified so we could have 4 users.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACS, we modified the Policy Elements, Authorization and Permissions-&amp;gt;Network Access-&amp;gt;Authorization Profiles, we added two IETF attributes.&amp;nbsp; One was Radius-IETF-&amp;gt;Radius Attribute Class-&amp;gt;Type=String-&amp;gt;Value OU=name of VPN profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second attribute was Service Type, Type was enumeration, Value=Login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seems to have cleared up just anyone login into this and allowed only the needed member to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to all for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Jun 2012 16:25:55 GMT</pubDate>
    <dc:creator>dpatkins</dc:creator>
    <dc:date>2012-06-14T16:25:55Z</dc:date>
    <item>
      <title>Configuring Cisco ACS 5.3 for AnyConnect VPN and Management of a Cisco ASA 5500.</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957688#M245747</link>
      <description>&lt;P&gt;We have configured a Cisco ASA 5505 as a VPN endpoint for one of our user groups.&amp;nbsp; It works, but it works too well.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; We have a group called XXX that we need to have access to the Cisco AnyConnect Client.&amp;nbsp; We have selected this group from our Active Directory and added it to our ACS configuration.&amp;nbsp; We also have added a group called YYY that will manage the ASA. However, this group has no need to access the VPN.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have added XXX to the Policy elements Network Access-&amp;gt; Authorization Profiles.&amp;nbsp; We also have a profile for YYY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It continues to hit on our default Service Rule that says permit all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have also created a Default network access rule. for this.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am at a loss.&amp;nbsp; I am pretty sure I have missed a check box or something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would definitely be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:11:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957688#M245747</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2019-03-11T02:11:26Z</dc:date>
    </item>
    <item>
      <title>Configuring Cisco ACS 5.3 for AnyConnect VPN and Management of a</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957689#M245762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are we using TACACS protocl for managing ASA and Radius for VPN access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For administration, you should edit default device admin access-policy and create an authorization-policy. Same way, you can edit default-network access for vpn access and create a respective policy for that too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA, you need to configure tacacs and radius both as a server group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For administration you can define tacacs as an external authentication server under aaa commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server TACACS protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa authentication http console TACACS&lt;/P&gt;&lt;P&gt;aaa authentication telnet console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console TACACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console TACACS LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For VPN you need to define radius authentication under the tunnel-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 15:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957689#M245762</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2012-06-12T15:53:01Z</dc:date>
    </item>
    <item>
      <title>Configuring Cisco ACS 5.3 for AnyConnect VPN and Management of a</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957690#M245779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jkatyal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the response.&amp;nbsp; I do not think the management portion is as important as teh VPN in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to have only personnel located in the AD group XYZ be able to access the VPN on ASA5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have worked some with Cisco TAC and since we had migrated to the ACS5.3, the Access Policy was configure with NDG Location, in all locations.&amp;nbsp; We configured it with a new location and added that to the policy but it still did nto fix it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in a nutshell, how do we configure a situation where a Cisco VPN group going to a specific device can only have access if it belongs to a specific AD group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 14:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957690#M245779</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2012-06-13T14:11:05Z</dc:date>
    </item>
    <item>
      <title>Configuring Cisco ACS 5.3 for AnyConnect VPN and Management of a</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957691#M245816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Just to share---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the way we handled this particular instances since there is only one group who will use this ASA.&amp;nbsp; On the 5505, we made modified the default simultaneous logins to 0.&amp;nbsp; And then on our VPN group profile, we unchecked the inherit box and modified so we could have 4 users.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACS, we modified the Policy Elements, Authorization and Permissions-&amp;gt;Network Access-&amp;gt;Authorization Profiles, we added two IETF attributes.&amp;nbsp; One was Radius-IETF-&amp;gt;Radius Attribute Class-&amp;gt;Type=String-&amp;gt;Value OU=name of VPN profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second attribute was Service Type, Type was enumeration, Value=Login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seems to have cleared up just anyone login into this and allowed only the needed member to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to all for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 16:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957691#M245816</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2012-06-14T16:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Cisco ACS 5.3 for AnyConnect VPN and Management</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957692#M245835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My apologies, I am using Radius for both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2012 13:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957692#M245835</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2012-06-18T13:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Cisco ACS 5.3 for AnyConnect VPN and Management</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957693#M245855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the Radius actually working with our AD group.  I just need to know how to separate it.  The users can log in to using the AnyConnect Client.  However, so can the users of the administrative group.  I am trying to ensure I have the proper restrictions set up. I do not want the VPN users to be able to manage the device nor should the management users be able to access the VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2012 13:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cisco-acs-5-3-for-anyconnect-vpn-and-management-of-a/m-p/1957693#M245855</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2012-06-18T13:19:42Z</dc:date>
    </item>
  </channel>
</rss>

