<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP on ASA with attribute-map in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576862#M279313</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guzman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks, I'm glad this helped. Just to be sure I double-checked, and this is indeed expected behavior.&lt;/P&gt;&lt;P&gt;I.e. attributes are taken from (in this order):&lt;/P&gt;&lt;P&gt;- the DAP policy&lt;/P&gt;&lt;P&gt;- user attributes pushed by the AAA server&lt;/P&gt;&lt;P&gt;- group-policy pushed by the AAA server&lt;/P&gt;&lt;P&gt;- group-policy defined in the tunnel-group&lt;/P&gt;&lt;P&gt;- DfltGrpPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking forward to your next issue &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Dec 2010 21:32:59 GMT</pubDate>
    <dc:creator>Herbert Baerten</dc:creator>
    <dc:date>2010-12-08T21:32:59Z</dc:date>
    <item>
      <title>LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576849#M278968</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having problems configuring VPN clients authentication against an LDAP server.&amp;nbsp; The main problem is when the ASA has to decide a group-policy for the non-compliance users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use LDAP attribute-maps in the ASA to map the memberOf parameter to the Cisco Group-policy attribute, then I associate memberOf with the AD group that the user must belong to has VPN access and the rigth group-policy.&amp;nbsp; This works correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the problem is when the remote user isn't in the correct AD group, I set a default-policy-group with no access to this kind of users.&amp;nbsp; After that, all the users (allowed and not allowed) fall in the same default-group-policy with no VPN access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is the ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map LDAP&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;BR /&gt;&amp;nbsp; map-value memberOf "cn=ASA_VPN,ou=ASA_VPN,ou=My Group,dc=xxx,dc=com" RemoteAccess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LDAP protocol ldap&lt;BR /&gt;aaa-server LDAP (inside) host 10.0.0.3&lt;BR /&gt; ldap-base-dn ou="My Group", dc=xxx, dc=com&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password ********&lt;BR /&gt; ldap-login-dn cn=user, ou="My Group", dc=xxx, dc=com&lt;BR /&gt; server-type microsoft&lt;BR /&gt; ldap-attribute-map LDAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy NOACCESS internal&lt;BR /&gt;group-policy NOACCESS attributes&lt;BR /&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt;group-policy RemoteAccess internal&lt;BR /&gt;group-policy RemoteAccess attributes&lt;BR /&gt; dns-server value 10.0.0.3&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value xxx.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccess type remote-access&lt;BR /&gt;tunnel-group RemoteAccess general-attributes&lt;BR /&gt; address-pool POOL&lt;BR /&gt; authentication-server-group LDAP&lt;BR /&gt; default-group-policy NOACCESS&lt;BR /&gt;tunnel-group RemoteAccess ipsec-attributes&lt;BR /&gt; pre-shared-key *******&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, I have followed all the examples availables in the web &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; to solve the problem but I can't obtain a good result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Somebody has an solution for this problem????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Guzmán&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576849#M278968</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2019-03-11T00:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576850#M279002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guzmán&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you get the output of "debug ldap 255" when an authorised user tries to connect?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should show what memberOf attributes are being received from the LDAP server (and normally also which group-policy it is being mapped to).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Nov 2010 22:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576850#M279002</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2010-11-28T22:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576851#M279035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Herbert, thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I saw the output of the "debug ldap 255" command previously and it was the base to make the config that I've pasted in my previous post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is when an attribute isn't present in the parameters that the LDAP server pass back to the ASA when authenticate a user, how can I represent these in the ldap attribute-map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't find documents that explain or shows a configuration to represent values that aren't present in the LDAP attributes pass to the NAS (an ASA in this case). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I map the group with privileges to remote access to the memberOf attribute in an LDAP attribute-map.&amp;nbsp; All the rest of the groups must be not allowed to access but I doesn't want to make this association for each case in the LDAP attribute-map.&amp;nbsp; There is a way to map a generic attribute with wildrcards for example?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that I was clear now with my problem and someone can help me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Guzmán&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Nov 2010 12:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576851#M279035</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2010-11-29T12:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576852#M279074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guzman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please provide an example of what it is that you are trying to accomplish? In your original post I did recreate your issue and was able to get the mapping to successfully work. I would like you make the changes to your map-value under your ldap attribute-map since the behavior seems to be case sensitive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What attributes is the LDAP server handing back, because for every user that authenticates it would be safe to assume that there all the DN's are being handed back for each of the users that successfully authenticates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Nov 2010 17:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576852#M279074</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2010-11-29T17:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576853#M279129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik, thanks for your help.&amp;nbsp; Here is the scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to access the network through the CiscoVPN Client using the user pepe,the access must be allowed.&amp;nbsp; When I'm trying to access using the user cisco, the access must be denied.&amp;nbsp; To check if the user has or no access to the network, I compare the LDAP attribute msNPAllowDialin in the parameters pass from the LDAP server to the ASA.&amp;nbsp; For these case I configure the following LDAP attribute-map:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map LDAP&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; msNPAllowDialin Group-Policy&lt;BR /&gt;&amp;nbsp; map-value msNPAllowDialin FALSE NOACCESS&lt;BR /&gt;&amp;nbsp; map-value msNPAllowDialin TRUE RemoteAccess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW-XX# debug ldap 255&lt;BR /&gt;debug ldap&amp;nbsp; enabled at level 255&lt;BR /&gt;FW-XX# &lt;BR /&gt;[1023] Session Start&lt;BR /&gt;[1023] New request Session, context 0xac31c1a8, reqType = Authentication&lt;BR /&gt;[1023] Fiber started&lt;BR /&gt;[1023] Creating LDAP context with uri=ldap://10.0.0.3:389&lt;BR /&gt;[1023] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.0.0.3:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[1023] supportedLDAPVersion: value = 3&lt;BR /&gt;[1023] supportedLDAPVersion: value = 2&lt;BR /&gt;[1023] Binding as asa_ldap_auth&lt;BR /&gt;[1023] Performing Simple authentication for asa_ldap_auth to 10.0.0.3&lt;BR /&gt;[1023] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [ou="AD Client", dc=client, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=pepe]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[1023] User DN = [CN=pepe,OU=AD Client,DC=client,DC=com,DC=uy]&lt;BR /&gt;[1023] Talking to Active Directory server 10.0.0.3&lt;BR /&gt;[1023] Reading password policy for pepe, dn:CN=pepe,OU=AD Client,DC=client,DC=com,DC=uy&lt;BR /&gt;[1023] Read bad password count 0&lt;BR /&gt;[1023] Binding as pepe&lt;BR /&gt;[1023] Performing Simple authentication for pepe to 10.0.0.3&lt;BR /&gt;[1023] Processing LDAP response for user pepe&lt;BR /&gt;[1023] Message (pepe): &lt;BR /&gt;[1023] Checking password policy&lt;BR /&gt;[1023] Authentication successful for pepe to 10.0.0.3&lt;BR /&gt;[1023] Retrieved User Attributes:&lt;BR /&gt;[1023]&amp;nbsp; objectClass: value = top&lt;BR /&gt;[1023]&amp;nbsp; objectClass: value = person&lt;BR /&gt;[1023]&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[1023]&amp;nbsp; objectClass: value = user&lt;BR /&gt;[1023]&amp;nbsp; cn: value = pepe&lt;BR /&gt;[1023]&amp;nbsp; givenName: value = pepe&lt;BR /&gt;[1023]&amp;nbsp; distinguishedName: value = CN=pepe,OU=AD Client,DC=client,DC=com,DC=uy&lt;BR /&gt;[1023]&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[1023]&amp;nbsp; whenCreated: value = 20101124125130.0Z&lt;BR /&gt;[1023]&amp;nbsp; whenChanged: value = 20101129123829.0Z&lt;BR /&gt;[1023]&amp;nbsp; displayName: value = pepe&lt;BR /&gt;[1023]&amp;nbsp; uSNCreated: value = 4484415&lt;BR /&gt;[1023]&amp;nbsp; memberOf: value = CN=Computacion,OU=Computacion,OU=AD Client,DC=client,DC=com,DC=uy&lt;BR /&gt;[1023]&amp;nbsp; uSNChanged: value = 4529614&lt;BR /&gt;[1023]&amp;nbsp; name: value = pepe&lt;BR /&gt;[1023]&amp;nbsp; objectGUID: value = Y7U. &lt;A href="mailto:..@.......K"&gt;..@.......K&lt;/A&gt;&lt;BR /&gt;[1023]&amp;nbsp; userAccountControl: value = 512&lt;BR /&gt;[1023]&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[1023]&amp;nbsp; codePage: value = 0&lt;BR /&gt;[1023]&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[1023]&amp;nbsp; badPasswordTime: value = 0&lt;BR /&gt;[1023]&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[1023]&amp;nbsp; lastLogon: value = 0&lt;BR /&gt;[1023]&amp;nbsp; pwdLastSet: value = 129355079094572938&lt;BR /&gt;[1023]&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[1023]&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;[1023]&amp;nbsp; objectSid: value = ............*.7\..Pz..;+[...&lt;BR /&gt;[1023]&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[1023]&amp;nbsp; logonCount: value = 0&lt;BR /&gt;[1023]&amp;nbsp; sAMAccountName: value = pepe&lt;BR /&gt;[1023]&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[1023]&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:pepe@client.com.uy"&gt;pepe@client.com.uy&lt;/A&gt;&lt;BR /&gt;[1023]&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=client,DC=com,DC=uy&lt;BR /&gt;&lt;STRONG&gt;[1023]&amp;nbsp; msNPAllowDialin: value = TRUE&lt;BR /&gt;[1023]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = RemoteAccess&lt;BR /&gt;&lt;/STRONG&gt;[1023]&amp;nbsp; lastLogonTimestamp: value = 129355068182940604&lt;BR /&gt;[1023] Fiber exit Tx=717 bytes Rx=2354 bytes, status=1&lt;BR /&gt;[1023] Session End&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[1026] Session Start&lt;BR /&gt;[1026] New request Session, context 0xac31c1a8, reqType = Authentication&lt;BR /&gt;[1026] Fiber started&lt;BR /&gt;[1026] Creating LDAP context with uri=ldap://10.0.0.3:389&lt;BR /&gt;[1026] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.0.0.3:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[1026] supportedLDAPVersion: value = 3&lt;BR /&gt;[1026] supportedLDAPVersion: value = 2&lt;BR /&gt;[1026] Binding as asa_ldap_auth&lt;BR /&gt;[1026] Performing Simple authentication for asa_ldap_auth to 10.0.0.3&lt;BR /&gt;[1026] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [ou="AD Client", dc=client, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=cisco]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[1026] User DN = [CN=cisco cisco,OU=Computacion,OU=AD Client,DC=client,DC=com,DC=uy]&lt;BR /&gt;[1026] Talking to Active Directory server 10.0.0.3&lt;BR /&gt;[1026] Reading password policy for cisco, dn:CN=cisco cisco,OU=Computacion,OU=AD Client,DC=client,DC=com,DC=uy&lt;BR /&gt;[1026] Read bad password count 0&lt;BR /&gt;[1026] Binding as cisco&lt;BR /&gt;[1026] Performing Simple authentication for cisco to 10.0.0.3&lt;BR /&gt;[1026] Processing LDAP response for user cisco&lt;BR /&gt;[1026] Message (cisco): &lt;BR /&gt;[1026] Checking password policy&lt;BR /&gt;[1026] Authentication successful for cisco to 10.0.0.3&lt;BR /&gt;[1026] Retrieved User Attributes:&lt;BR /&gt;[1026]&amp;nbsp; objectClass: value = top&lt;BR /&gt;[1026]&amp;nbsp; objectClass: value = person&lt;BR /&gt;[1026]&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[1026]&amp;nbsp; objectClass: value = user&lt;BR /&gt;[1026]&amp;nbsp; cn: value = cisco cisco&lt;BR /&gt;[1026]&amp;nbsp; sn: value = cisco&lt;BR /&gt;[1026]&amp;nbsp; givenName: value = cisco&lt;BR /&gt;[1026]&amp;nbsp; distinguishedName: value = CN=cisco cisco,OU=Computacion,OU=AD Client,DC=client,DC=com,DC=uy&lt;BR /&gt;[1026]&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[1026]&amp;nbsp; whenCreated: value = 20101115105935.0Z&lt;BR /&gt;[1026]&amp;nbsp; whenChanged: value = 20101129122027.0Z&lt;BR /&gt;[1026]&amp;nbsp; displayName: value = cisco cisc&lt;BR /&gt;[1026]&amp;nbsp; uSNCreated: value = 4392339&lt;BR /&gt;[1026]&amp;nbsp; memberOf: value = CN=Computacion,OU=Computacion,OU=AD Client,DC=client,DC=com,DC=uy&lt;BR /&gt;[1026]&amp;nbsp; uSNChanged: value = 4529311&lt;BR /&gt;[1026]&amp;nbsp; name: value = cisco cisco&lt;BR /&gt;[1026]&amp;nbsp; objectGUID: value = .._..Y.I..VgqU.p&lt;BR /&gt;[1026]&amp;nbsp; userAccountControl: value = 512&lt;BR /&gt;[1026]&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[1026]&amp;nbsp; codePage: value = 0&lt;BR /&gt;[1026]&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[1026]&amp;nbsp; badPasswordTime: value = 0&lt;BR /&gt;[1026]&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[1026]&amp;nbsp; lastLogon: value = 129350869389142699&lt;BR /&gt;[1026]&amp;nbsp; pwdLastSet: value = 129342923756433259&lt;BR /&gt;[1026]&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[1026]&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;[1026]&amp;nbsp; objectSid: value = ............*.7\..Pz..;+J...&lt;BR /&gt;[1026]&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[1026]&amp;nbsp; logonCount: value = 15&lt;BR /&gt;[1026]&amp;nbsp; sAMAccountName: value = cisco&lt;BR /&gt;[1026]&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[1026]&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:cisco@client.com.uy"&gt;cisco@client.com.uy&lt;/A&gt;&lt;BR /&gt;[1026]&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=client,DC=com,DC=uy&lt;BR /&gt;&lt;STRONG&gt;[1026]&amp;nbsp; msNPAllowDialin: value = FALSE&lt;BR /&gt;[1026]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = NOACCESS&lt;BR /&gt;&lt;/STRONG&gt;[1026]&amp;nbsp; lastLogonTimestamp: value = 129355068276222451&lt;BR /&gt;[1026] Fiber exit Tx=763 bytes Rx=2579 bytes, status=1&lt;BR /&gt;[1026] Session End&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see: the ASA receives the msNPAllowDialin in both cases but If the user in the AD doesn't have explicitly check the Allow or Deny attribute in his AD profile, the ASA doesn't receibe the msNPAllowDialin attribute from the LDAP server and the user is allowed to access the network due to there is no match defined to this case in the attribute-map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is: how can I make a LDAP map attribute to represent an absent value in the parameters send from the LDAP server to the ASA?&amp;nbsp; I want to know if there is a way to configure a wildcard condition under the ldap attribute-map to match everything less an specific condition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Nov 2010 18:12:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576853#M279129</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2010-11-29T18:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576854#M279167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guzman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you're on the right track (and&amp;nbsp; your first example should have worked as well, provided that you change&amp;nbsp; the "cn" to "CN" in your attribute map etc as my colleague pointed out).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccess general-attributes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; default-group-policy NOACCESS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then users that do not get mapped to an existing group-policy, should use the default policy NOACCESS.&lt;/P&gt;&lt;P&gt;Are you saying this is not the case? Or did you change the above config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you get the "debug ldap 255" as well as "debug crypto isakmp 10" for such a user, and also "show vpn-sessiondb remote filter name &lt;USERNAME&gt;" when he is connected?&lt;/USERNAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 21:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576854#M279167</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2010-11-30T21:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576855#M279202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Herbert, thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that ALL the users are being mapped to the default policy NOACCESS, even the ones that match the ldap correct attribute-map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made two tests, in the first case I used the following ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(3) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name test.com.uy&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 200.40.40.40 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.59.1.229 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name hb.com.uy&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.59.2.0 255.255.255.240 &lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip local pool Prueba_NT 10.59.2.1-10.59.2.14 mask 255.255.255.240&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;ldap attribute-map member&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;BR /&gt;&amp;nbsp; map-value memberOf CN=VPN-USERS,CN=Users,DC=test,DC=com,DC=uy Allow-Access&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server WinNT protocol nt&lt;BR /&gt;aaa-server WinNT (inside) host 10.59.1.60&lt;BR /&gt; timeout 5&lt;BR /&gt; nt-auth-domain-controller waasmobile&lt;BR /&gt;aaa-server LDAP protocol ldap&lt;BR /&gt;aaa-server LDAP (inside) host 10.59.1.60&lt;BR /&gt; ldap-base-dn dc=test, dc=com, dc=uy&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *****&lt;BR /&gt; ldap-login-dn cn=Administrator, cn=Users, dc=test, dc=com, dc=uy&lt;BR /&gt; server-type microsoft&lt;BR /&gt; ldap-attribute-map member&lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy NOACCESS internal&lt;BR /&gt;group-policy NOACCESS attributes&lt;BR /&gt; vpn-simultaneous-logins 0&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;group-policy Allow-Access internal&lt;BR /&gt;group-policy Allow-Access attributes&lt;BR /&gt; dns-server value 10.59.1.3 10.1.0.120&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value test.com&lt;BR /&gt;username admin password eY/fQXw7Ure8Qrz7 encrypted privilege 15&lt;BR /&gt;tunnel-group VPN-Access type remote-access&lt;BR /&gt;tunnel-group VPN-Access general-attributes&lt;BR /&gt; address-pool Prueba_NT&lt;BR /&gt; authentication-server-group LDAP&lt;BR /&gt;tunnel-group VPN-Access ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:149e7395200967928760ed70af29d548&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;As you can see, in the "&lt;STRONG&gt;tunnel-group VPN-Access general-attributes&lt;/STRONG&gt;" I didn't configure a default policy then the ASA used the &lt;STRONG&gt;DfltGrpPolicy&lt;/STRONG&gt; (that allow access to all type of users) when the user isn't in the right LDAP group.&amp;nbsp; And an allowed user access, using the group-policy right properties, where the user is mapped from the correct LDAP group to the Allow-Access group-policy.&amp;nbsp; Here are the debug captures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dec 01 12:50:43 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 854&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing SA payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ke payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ISA_KE payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing nonce payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, Received xauth V6 VID&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, Received DPD VID&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Fragmentation VID&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, Received NAT-Traversal ver 02 VID&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 12:50:43 [IKEv1]: IP = 200.40.40.61, Connection landed on tunnel_group VPN-Access&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing IKE SA payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ISAKMP SA payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ke payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing nonce payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Generating keys for Responder...&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing hash payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Cisco Unity VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing xauth V6 VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing dpd vid payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Traversal VID ver 02 payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Dec 01 12:50:43 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 440&lt;BR /&gt;Dec 01 12:50:43 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NOTIFY (11) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 168&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000408)&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 12:50:43 [IKEv1]: Group = VPN-Access, IP = 200.40.40.61, Automatic NAT Detection Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote end is NOT behind a NAT device&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This&amp;nbsp;&amp;nbsp; end is NOT behind a NAT device&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:50:43 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=d7758d48) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72&lt;BR /&gt;Dec 01 12:50:49 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=d7758d48) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 88&lt;BR /&gt;Dec 01 12:50:49 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:50:49 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[21] Session Start&lt;BR /&gt;[21] New request Session, context 0xd7b91748, reqType = Authentication&lt;BR /&gt;[21] Fiber started&lt;BR /&gt;[21] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[21] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[21] supportedLDAPVersion: value = 3&lt;BR /&gt;[21] supportedLDAPVersion: value = 2&lt;BR /&gt;[21] Binding as Administrator&lt;BR /&gt;[21] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[21] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=tecnico2]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[21] User DN = [CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[21] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[21] Reading password policy for tecnico2, dn:CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[21] Read bad password count 0&lt;BR /&gt;[21] Binding as tecnico2&lt;BR /&gt;[21] Performing Simple authentication for tecnico2 to 10.59.1.60&lt;BR /&gt;[21] Processing LDAP response for user tecnico2&lt;BR /&gt;[21] Message (tecnico2): &lt;BR /&gt;[21] Authentication successful for tecnico2 to 10.59.1.60&lt;BR /&gt;[21] Retrieved User Attributes:&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = tecnico2&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = tecnico2&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20100813180305.0Z&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101201131638.0Z&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = tecnico2&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 28717&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94358&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = tecnico2&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = 8R.:.L.L.\.s....&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 129344820578485000&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 129344820762703750&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129343856087235000&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8`...&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 3&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = tecnico2&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:tecnico2@test.com.uy"&gt;tecnico2@test.com.uy&lt;/A&gt;&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; msNPAllowDialin: value = FALSE&lt;BR /&gt;[21]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 129356829987391250&lt;BR /&gt;[21] Fiber exit Tx=571 bytes Rx=2607 bytes, status=1&lt;BR /&gt;[21] Session End&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: primary DNS = cleared&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: secondary DNS = cleared&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: primary WINS = cleared&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: secondary WINS = cleared&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: IP Compression = disabled&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: Split Tunneling Policy = Disabled&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: Browser Proxy Setting = no-modify&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKEGetUserAttributes: Browser Proxy Bypass Local = disable&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, User (tecnico2) authenticated.&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=9a76dfe6) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 64&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=9a76dfe6) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 60&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Processing cfg ACK attributes&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=d77426c6) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 186&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Processing cfg Request attributes&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for IPV4 address!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for IPV4 net mask!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for DNS server address!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for WINS server address!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Received unsupported transaction mode attribute: 5&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Banner!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Save PW setting!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Default Domain Name!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Split Tunnel List!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Split DNS!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for PFS setting!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Client Browser Proxy Setting!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for backup ip-sec peer list!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Client Smartcard Removal Disconnect Setting!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for Application Version!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Client Type: WinNT&amp;nbsp; Client Application Version: 5.0.07.0290&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for FWTYPE!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for DHCP hostname for DDNS is: test-PC!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, MODE_CFG: Received request for UDP Port!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Obtained IP addr (10.59.2.1) prior to initiating Mode Cfg (XAuth enabled)&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Sending subnet mask (255.255.255.240) to remote client&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Assigned private IP address 10.59.2.1 to remote user&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Send Client Browser Proxy Attributes!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Browser Proxy set to No-Modify. Browser Proxy data will NOT be included in the mode-cfg reply&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Send Cisco Smartcard Removal Disconnect enable!!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=d77426c6) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 174&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DECODE]: IP = 200.40.40.61, IKE Responder starting QM: msg id = e12a0835&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Delay Quick Mode processing, Cert/Trans Exch/RM DSID in progress&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Resume Quick Mode processing, Cert/Trans Exch/RM DSID completed&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, PHASE 1 COMPLETED&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, Keep-alive type for this connection: DPD&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Starting P1 rekey timer: 82080 seconds.&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, sending notify message&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=c2242dc9) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 92&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=e12a0835) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 1026&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing SA payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing nonce payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DECODE]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, ID_IPV4_ADDR ID received&lt;BR /&gt;10.59.2.1&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Received remote Proxy Host data in ID Payload:&amp;nbsp; Address 10.59.2.1, Protocol 0, Port 0&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DECODE]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Received local IP Proxy Subnet data in ID Payload:&amp;nbsp;&amp;nbsp; Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, QM IsRekeyed old sa not found by addr&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE Remote Peer configured for crypto map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing IPSec SA payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IPSec SA Proposal # 8, Transform # 1 acceptable&amp;nbsp; Matches global IPSec SA entry # 65535&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE: requesting SPI!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE got SPI from key engine: SPI = 0x1671e4c9&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, oakley constucting quick mode&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing IPSec SA payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Overriding Initiator's IPSec rekeying duration from 2147483 to 28800 seconds&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing IPSec nonce payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing proxy ID&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Transmitting Proxy Id:&lt;BR /&gt;&amp;nbsp; Remote host: 10.59.2.1&amp;nbsp; Protocol 0&amp;nbsp; Port 0&lt;BR /&gt;&amp;nbsp; Local subnet:&amp;nbsp; 0.0.0.0&amp;nbsp; mask 0.0.0.0 Protocol 0&amp;nbsp; Port 0&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Sending RESPONDER LIFETIME notification to Initiator&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DECODE]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE Responder sending 2nd QM pkt: msg id = e12a0835&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=e12a0835) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 184&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=e12a0835) with payloads : HDR + HASH (8) + NONE (0) total length : 52&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, loading all IPSEC SAs&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Generating Quick Mode Key!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, NP encrypt rule look up for crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 matching ACL Unknown: returned cs_id=d804a6d8; rule=00000000&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Generating Quick Mode Key!&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, NP encrypt rule look up for crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 matching ACL Unknown: returned cs_id=d804a6d8; rule=00000000&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Security negotiation complete for User (tecnico2)&amp;nbsp; Responder, Inbound SPI = 0x1671e4c9, Outbound SPI = 0xd978f3a7&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE got a KEY_ADD msg for SA: SPI = 0xd978f3a7&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Pitcher: received KEY_UPDATE, spi 0x1671e4c9&lt;BR /&gt;Dec 01 12:50:52 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Starting P2 rekey timer: 27360 seconds.&lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Adding static route for client address: 10.59.2.1 &lt;BR /&gt;Dec 01 12:50:52 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, PHASE 2 COMPLETED (msgid=e12a0835)&lt;BR /&gt;Dec 01 12:51:02 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=ee89c5a1) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:51:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:51:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Received keep-alive of type DPD R-U-THERE (seq number 0x4d87eb79)&lt;BR /&gt;Dec 01 12:51:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x4d87eb79)&lt;BR /&gt;Dec 01 12:51:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:02 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=ec835364) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;ciscoasa# Dec 01 12:51:12 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=9a7980b9) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:51:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:51:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Received keep-alive of type DPD R-U-THERE (seq number 0x4d87eb7a)&lt;BR /&gt;Dec 01 12:51:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x4d87eb7a)&lt;BR /&gt;Dec 01 12:51:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:12 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=24fa2d42) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;ciscoasa# show vpn-sessiondb remote filter name tecnico2&lt;/P&gt;&lt;P&gt;Session Type: IPsec&lt;/P&gt;&lt;P&gt;Username&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : tecnico2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Index&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 5&lt;BR /&gt;Assigned IP&amp;nbsp; : 10.59.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Public IP&amp;nbsp;&amp;nbsp;&amp;nbsp; : 200.40.40.61&lt;BR /&gt;Protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : IKE IPsec&lt;BR /&gt;License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : IPsec&lt;BR /&gt;Encryption&amp;nbsp;&amp;nbsp; : 3DES AES128&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hashing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SHA1&lt;BR /&gt;Bytes Tx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes Rx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 28209&lt;BR /&gt;Group Policy : DfltGrpPolicy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tunnel Group : VPN-Access&lt;BR /&gt;Login Time&amp;nbsp;&amp;nbsp; : 12:50:43 UTC Wed Dec 1 2010&lt;BR /&gt;Duration&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0h:00m:35s&lt;BR /&gt;Inactivity&amp;nbsp;&amp;nbsp; : 0h:00m:00s&lt;BR /&gt;NAC Result&amp;nbsp;&amp;nbsp; : Unknown&lt;BR /&gt;VLAN Mapping : N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : none&lt;/P&gt;&lt;P&gt;ciscoasa# Dec 01 12:51:23 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=a28ce7b0) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:51:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:51:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Received keep-alive of type DPD R-U-THERE (seq number 0x4d87eb7b)&lt;BR /&gt;Dec 01 12:51:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x4d87eb7b)&lt;BR /&gt;Dec 01 12:51:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:23 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=21dce641) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:51:25 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=81bd3649) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 72&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, processing delete&lt;BR /&gt;Dec 01 12:51:25 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Connection terminated for peer tecnico2.&amp;nbsp; Reason: Peer Terminate&amp;nbsp; Remote Proxy 10.59.2.1, Local Proxy 0.0.0.0&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Active unit receives a delete event for remote peer 200.40.40.61.&lt;/P&gt;&lt;P&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE Deleting SA: Remote Proxy 10.59.2.1, Local Proxy 0.0.0.0&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE SA AM:ab2a9fc1 rcv'd Terminate: state AM_ACTIVE&amp;nbsp; flags 0x0861d041, refcnt 1, tuncnt 0&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE SA AM:ab2a9fc1 terminating:&amp;nbsp; flags 0x0961d001, refcnt 0, tuncnt 0&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, sending delete/delete with reason message&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing IKE delete payload&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:25 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=810818ad) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x1671e4c9&lt;BR /&gt;Dec 01 12:51:25 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x1671e4c9&lt;BR /&gt;Dec 01 12:51:25 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Session is being torn down. Reason: User Requested&lt;BR /&gt;Dec 01 12:51:25 [IKEv1]: Ignoring msg to mark SA with dsID 20480 dead because SA deleted&lt;BR /&gt;Dec 01 12:51:25 [IKEv1]: IP = 200.40.40.61, Received encrypted packet with no matching SA, dropping&lt;/P&gt;&lt;P&gt;ciscoasa# Dec 01 12:51:37 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 854&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing SA payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ke payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ISA_KE payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing nonce payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, Received xauth V6 VID&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, Received DPD VID&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Fragmentation VID&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, Received NAT-Traversal ver 02 VID&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 12:51:37 [IKEv1]: IP = 200.40.40.61, Connection landed on tunnel_group VPN-Access&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing IKE SA payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ISAKMP SA payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ke payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing nonce payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Generating keys for Responder...&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing hash payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Cisco Unity VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing xauth V6 VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing dpd vid payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Traversal VID ver 02 payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing VID payload&lt;BR /&gt;Dec 01 12:51:37 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Dec 01 12:51:37 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 440&lt;BR /&gt;Dec 01 12:51:38 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NOTIFY (11) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 168&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000408)&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 12:51:38 [IKEv1]: Group = VPN-Access, IP = 200.40.40.61, Automatic NAT Detection Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote end is NOT behind a NAT device&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This&amp;nbsp;&amp;nbsp; end is NOT behind a NAT device&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:38 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=69d30f5f) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=69d30f5f) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 88&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[23] Session Start&lt;BR /&gt;[23] New request Session, context 0xd7b91748, reqType = Authentication&lt;BR /&gt;[23] Fiber started&lt;BR /&gt;[23] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[23] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[23] supportedLDAPVersion: value = 3&lt;BR /&gt;[23] supportedLDAPVersion: value = 2&lt;BR /&gt;[23] Binding as Administrator&lt;BR /&gt;[23] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[23] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=tecnico1]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[23] User DN = [CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[23] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[23] Reading password policy for tecnico1, dn:CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[23] Read bad password count 0&lt;BR /&gt;[23] Binding as tecnico1&lt;BR /&gt;[23] Performing Simple authentication for tecnico1 to 10.59.1.60&lt;BR /&gt;[23] Processing LDAP response for user tecnico1&lt;BR /&gt;[23] Message (tecnico1): &lt;BR /&gt;[23] Authentication successful for tecnico1 to 10.59.1.60&lt;BR /&gt;[23] Retrieved User Attributes:&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = tecnico1&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = tecnico1&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20100813180216.0Z&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101201131651.0Z&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = tecnico1&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 28706&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=VPN-USERS,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = Allow-Access&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = Allow-Access&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94359&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = tecnico1&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = ^;&amp;gt;.'..E./T4H...&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 129343952572078750&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 129343952638172500&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129343765648016250&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P....CtxCfgPresent..............&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8_...&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 28&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = tecnico1&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:tecnico1@test.com.uy"&gt;tecnico1@test.com.uy&lt;/A&gt;&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; msNPAllowDialin: value = TRUE&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101116140935.0Z&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 16020131235128.0Z&lt;BR /&gt;[23]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 129356830114110000&lt;BR /&gt;[23] Fiber exit Tx=571 bytes Rx=2960 bytes, status=1&lt;BR /&gt;[23] Session End&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: primary DNS = 10.59.1.3&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: secondary DNS = 10.1.0.120&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: primary WINS = cleared&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: secondary WINS = cleared&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: default domain = test.com&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: IP Compression = disabled&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: Split Tunneling Policy = Disabled&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: Browser Proxy Setting = no-modify&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKEGetUserAttributes: Browser Proxy Bypass Local = disable&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, User (tecnico1) authenticated.&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=11f8aede) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 64&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=11f8aede) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 60&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Processing cfg ACK attributes&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=a67b0834) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 186&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Processing cfg Request attributes&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for IPV4 address!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for IPV4 net mask!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for DNS server address!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for WINS server address!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Received unsupported transaction mode attribute: 5&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Banner!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Save PW setting!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Default Domain Name!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Split Tunnel List!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Split DNS!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for PFS setting!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Client Browser Proxy Setting!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for backup ip-sec peer list!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Client Smartcard Removal Disconnect Setting!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for Application Version!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Client Type: WinNT&amp;nbsp; Client Application Version: 5.0.07.0290&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for FWTYPE!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for DHCP hostname for DDNS is: test-PC!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, MODE_CFG: Received request for UDP Port!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Obtained IP addr (10.59.2.1) prior to initiating Mode Cfg (XAuth enabled)&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Sending subnet mask (255.255.255.240) to remote client&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Assigned private IP address 10.59.2.1 to remote user&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, construct_cfg_set: default domain = test.com&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Send Client Browser Proxy Attributes!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Browser Proxy set to No-Modify. Browser Proxy data will NOT be included in the mode-cfg reply&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Send Cisco Smartcard Removal Disconnect enable!!&lt;BR /&gt;Dec 01 12:51:46 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:46 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=a67b0834) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 202&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DECODE]: IP = 200.40.40.61, IKE Responder starting QM: msg id = ecfeeeba&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Delay Quick Mode processing, Cert/Trans Exch/RM DSID in progress&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Resume Quick Mode processing, Cert/Trans Exch/RM DSID completed&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, PHASE 1 COMPLETED&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: IP = 200.40.40.61, Keep-alive type for this connection: DPD&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Starting P1 rekey timer: 82080 seconds.&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, sending notify message&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=57b9cfb) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 92&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=ecfeeeba) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 1026&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing SA payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing nonce payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DECODE]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, ID_IPV4_ADDR ID received&lt;BR /&gt;10.59.2.1&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Received remote Proxy Host data in ID Payload:&amp;nbsp; Address 10.59.2.1, Protocol 0, Port 0&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DECODE]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Received local IP Proxy Subnet data in ID Payload:&amp;nbsp;&amp;nbsp; Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, QM IsRekeyed old sa not found by addr&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE Remote Peer configured for crypto map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing IPSec SA payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IPSec SA Proposal # 8, Transform # 1 acceptable&amp;nbsp; Matches global IPSec SA entry # 65535&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE: requesting SPI!&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE got SPI from key engine: SPI = 0x6427c16d&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, oakley constucting quick mode&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing IPSec SA payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Overriding Initiator's IPSec rekeying duration from 2147483 to 28800 seconds&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing IPSec nonce payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing proxy ID&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Transmitting Proxy Id:&lt;BR /&gt;&amp;nbsp; Remote host: 10.59.2.1&amp;nbsp; Protocol 0&amp;nbsp; Port 0&lt;BR /&gt;&amp;nbsp; Local subnet:&amp;nbsp; 0.0.0.0&amp;nbsp; mask 0.0.0.0 Protocol 0&amp;nbsp; Port 0&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Sending RESPONDER LIFETIME notification to Initiator&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DECODE]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE Responder sending 2nd QM pkt: msg id = ecfeeeba&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=ecfeeeba) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 184&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=ecfeeeba) with payloads : HDR + HASH (8) + NONE (0) total length : 52&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, loading all IPSEC SAs&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Generating Quick Mode Key!&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, NP encrypt rule look up for crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 matching ACL Unknown: returned cs_id=d804a6d8; rule=00000000&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Generating Quick Mode Key!&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, NP encrypt rule look up for crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 matching ACL Unknown: returned cs_id=d804a6d8; rule=00000000&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Security negotiation complete for User (tecnico1)&amp;nbsp; Responder, Inbound SPI = 0x6427c16d, Outbound SPI = 0x447190ba&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE got a KEY_ADD msg for SA: SPI = 0x447190ba&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Pitcher: received KEY_UPDATE, spi 0x6427c16d&lt;BR /&gt;Dec 01 12:51:47 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Starting P2 rekey timer: 27360 seconds.&lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Adding static route for client address: 10.59.2.1 &lt;BR /&gt;Dec 01 12:51:47 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, PHASE 2 COMPLETED (msgid=ecfeeeba)&lt;BR /&gt;Dec 01 12:51:57 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=1b9e1152) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:51:57 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:51:57 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:51:57 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Received keep-alive of type DPD R-U-THERE (seq number 0x8215eda5)&lt;BR /&gt;Dec 01 12:51:57 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x8215eda5)&lt;BR /&gt;Dec 01 12:51:57 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:51:57 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:51:57 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=c68fdcb8) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:52:07 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=6622c9be) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:52:07 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:52:07 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:52:07 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Received keep-alive of type DPD R-U-THERE (seq number 0x8215eda6)&lt;BR /&gt;Dec 01 12:52:07 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x8215eda6)&lt;BR /&gt;Dec 01 12:52:07 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:52:07 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:52:07 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=36933657) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;ciscoasa# show vpn-sessiondb remote filter name tecnico1&lt;/P&gt;&lt;P&gt;Session Type: IPsec&lt;/P&gt;&lt;P&gt;Username&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : tecnico1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Index&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 6&lt;BR /&gt;Assigned IP&amp;nbsp; : 10.59.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Public IP&amp;nbsp;&amp;nbsp;&amp;nbsp; : 200.40.40.61&lt;BR /&gt;Protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : IKE IPsec&lt;BR /&gt;License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : IPsec&lt;BR /&gt;Encryption&amp;nbsp;&amp;nbsp; : 3DES AES128&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hashing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SHA1&lt;BR /&gt;Bytes Tx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes Rx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 27265&lt;BR /&gt;Group Policy : Allow-Access&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tunnel Group : VPN-Access&lt;BR /&gt;Login Time&amp;nbsp;&amp;nbsp; : 12:51:38 UTC Wed Dec 1 2010&lt;BR /&gt;Duration&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0h:00m:35s&lt;BR /&gt;Inactivity&amp;nbsp;&amp;nbsp; : 0h:00m:00s&lt;BR /&gt;NAC Result&amp;nbsp;&amp;nbsp; : Unknown&lt;BR /&gt;VLAN Mapping : N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : none&lt;/P&gt;&lt;P&gt;ciscoasa# Dec 01 12:52:17 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=b5a6bb7e) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:52:17 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:52:17 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:52:17 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Received keep-alive of type DPD R-U-THERE (seq number 0x8215eda7)&lt;BR /&gt;Dec 01 12:52:17 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x8215eda7)&lt;BR /&gt;Dec 01 12:52:17 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:52:17 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:52:17 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=326aab25) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;BR /&gt;Dec 01 12:52:23 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=b227fd3e) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 72&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, processing delete&lt;BR /&gt;Dec 01 12:52:23 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Connection terminated for peer tecnico1.&amp;nbsp; Reason: Peer Terminate&amp;nbsp; Remote Proxy 10.59.2.1, Local Proxy 0.0.0.0&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Active unit receives a delete event for remote peer 200.40.40.61.&lt;/P&gt;&lt;P&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE Deleting SA: Remote Proxy 10.59.2.1, Local Proxy 0.0.0.0&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE SA AM:3d7d6b46 rcv'd Terminate: state AM_ACTIVE&amp;nbsp; flags 0x0861d041, refcnt 1, tuncnt 0&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE SA AM:3d7d6b46 terminating:&amp;nbsp; flags 0x0961d001, refcnt 0, tuncnt 0&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, sending delete/delete with reason message&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing IKE delete payload&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:52:23 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=5988faaf) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x6427c16d&lt;BR /&gt;Dec 01 12:52:23 [IKEv1 DEBUG]: Pitcher: received key delete msg, spi 0x6427c16d&lt;BR /&gt;Dec 01 12:52:23 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Session is being torn down. Reason: User Requested&lt;BR /&gt;Dec 01 12:52:23 [IKEv1]: Ignoring msg to mark SA with dsID 24576 dead because SA deleted&lt;BR /&gt;Dec 01 12:52:23 [IKEv1]: IP = 200.40.40.61, Received encrypted packet with no matching SA, dropping&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case both users (tecnico1 and tecnico2) were allowed to access but only tecnico1 must be validated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I configure in the "&lt;STRONG&gt;tunnel-group VPN-Access general-attributes&lt;/STRONG&gt;" the default group policy NOACCESS, all the users are rejected (even tecnico1 that must be allowed).&amp;nbsp; Here are the captures from the debug commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# conf t&lt;BR /&gt;ciscoasa(config)# tunnel-group VPN-Access general-attributes&lt;BR /&gt;ciscoasa(config-tunnel-general)# def&lt;BR /&gt;ciscoasa(config-tunnel-general)# default-group-policy NOACCESS&lt;BR /&gt;ciscoasa(config-tunnel-general)#&amp;nbsp; &lt;BR /&gt;ciscoasa# Dec 01 12:53:58 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 854&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing SA payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ke payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ISA_KE payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing nonce payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, Received xauth V6 VID&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, Received DPD VID&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Fragmentation VID&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, Received NAT-Traversal ver 02 VID&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 12:53:58 [IKEv1]: IP = 200.40.40.61, Connection landed on tunnel_group VPN-Access&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing IKE SA payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ISAKMP SA payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ke payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing nonce payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Generating keys for Responder...&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing hash payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Cisco Unity VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing xauth V6 VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing dpd vid payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Traversal VID ver 02 payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Dec 01 12:53:58 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 440&lt;BR /&gt;Dec 01 12:53:58 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NOTIFY (11) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 168&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000408)&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 12:53:58 [IKEv1]: Group = VPN-Access, IP = 200.40.40.61, Automatic NAT Detection Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote end is NOT behind a NAT device&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This&amp;nbsp;&amp;nbsp; end is NOT behind a NAT device&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:53:58 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=fceec8e4) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72&lt;BR /&gt;Dec 01 12:54:02 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=fceec8e4) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 88&lt;BR /&gt;Dec 01 12:54:02 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:54:02 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[26] Session Start&lt;BR /&gt;[26] New request Session, context 0xd7b91748, reqType = Authentication&lt;BR /&gt;[26] Fiber started&lt;BR /&gt;[26] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[26] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[26] supportedLDAPVersion: value = 3&lt;BR /&gt;[26] supportedLDAPVersion: value = 2&lt;BR /&gt;[26] Binding as Administrator&lt;BR /&gt;[26] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[26] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=tecnico1]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[26] User DN = [CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[26] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[26] Reading password policy for tecnico1, dn:CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[26] Read bad password count 0&lt;BR /&gt;[26] Binding as tecnico1&lt;BR /&gt;[26] Performing Simple authentication for tecnico1 to 10.59.1.60&lt;BR /&gt;[26] Processing LDAP response for user tecnico1&lt;BR /&gt;[26] Message (tecnico1): &lt;BR /&gt;[26] Authentication successful for tecnico1 to 10.59.1.60&lt;BR /&gt;[26] Retrieved User Attributes:&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = tecnico1&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = tecnico1&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20100813180216.0Z&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101201131651.0Z&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = tecnico1&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 28706&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=VPN-USERS,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = Allow-Access&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = Allow-Access&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94359&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = tecnico1&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = ^;&amp;gt;.'..E./T4H...&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 129343952572078750&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 129343952638172500&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129343765648016250&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P....CtxCfgPresent..............&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8_...&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 28&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = tecnico1&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:tecnico1@test.com.uy"&gt;tecnico1@test.com.uy&lt;/A&gt;&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; msNPAllowDialin: value = TRUE&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101116140935.0Z&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 16020131235128.0Z&lt;BR /&gt;[26]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 129356830114110000&lt;BR /&gt;[26] Fiber exit Tx=571 bytes Rx=2960 bytes, status=1&lt;BR /&gt;[26] Session End&lt;BR /&gt;Dec 01 12:54:02 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Login authentication failed due to max simultaneous-login restriction.&lt;BR /&gt;Dec 01 12:54:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:54:02 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:54:02 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=21820a03) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 97&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# Dec 01 12:54:15 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=21820a03) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 88&lt;BR /&gt;Dec 01 12:54:15 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:54:15 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[29] Session Start&lt;BR /&gt;[29] New request Session, context 0xd7b91748, reqType = Authentication&lt;BR /&gt;[29] Fiber started&lt;BR /&gt;[29] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[29] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[29] supportedLDAPVersion: value = 3&lt;BR /&gt;[29] supportedLDAPVersion: value = 2&lt;BR /&gt;[29] Binding as Administrator&lt;BR /&gt;[29] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[29] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=tecnico2]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[29] User DN = [CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[29] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[29] Reading password policy for tecnico2, dn:CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[29] Read bad password count 0&lt;BR /&gt;[29] Binding as tecnico2&lt;BR /&gt;[29] Performing Simple authentication for tecnico2 to 10.59.1.60&lt;BR /&gt;[29] Processing LDAP response for user tecnico2&lt;BR /&gt;[29] Message (tecnico2): &lt;BR /&gt;[29] Authentication successful for tecnico2 to 10.59.1.60&lt;BR /&gt;[29] Retrieved User Attributes:&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = tecnico2&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = tecnico2&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20100813180305.0Z&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101201131638.0Z&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = tecnico2&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 28717&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94358&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = tecnico2&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = 8R.:.L.L.\.s....&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 129344820578485000&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 129344820762703750&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129343856087235000&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8`...&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 3&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = tecnico2&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:tecnico2@test.com.uy"&gt;tecnico2@test.com.uy&lt;/A&gt;&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; msNPAllowDialin: value = FALSE&lt;BR /&gt;[29]&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 129356829987391250&lt;BR /&gt;[29] Fiber exit Tx=571 bytes Rx=2607 bytes, status=1&lt;BR /&gt;[29] Session End&lt;BR /&gt;Dec 01 12:54:15 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Login authentication failed due to max simultaneous-login restriction.&lt;BR /&gt;Dec 01 12:54:15 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:54:15 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:54:15 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=b26b55ca) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 97&lt;BR /&gt;Dec 01 12:54:22 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=b26b55ca) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 68&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;BR /&gt;Dec 01 12:54:22 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Error processing payload: Payload ID: 14&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE TM V6 FSM error history (struct &amp;amp;0xd779e1f8)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; TM_DONE, EV_ERROR--&amp;gt;TM_WAIT_REPLY, EV_PROC_MSG--&amp;gt;TM_WAIT_REPLY, EV_HASH_OK--&amp;gt;TM_WAIT_REPLY, NullEvent--&amp;gt;TM_WAIT_REPLY, EV_COMP_HASH--&amp;gt;TM_WAIT_REPLY, EV_VALIDATE_MSG--&amp;gt;TM_WAIT_REPLY, EV_DECRYPT_OK--&amp;gt;TM_WAIT_REPLY, NullEvent&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE AM Responder FSM error history (struct &amp;amp;0xd5f105b0)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_TM_FAIL--&amp;gt;AM_TM_INIT_XAUTH_V6H, NullEvent--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_ACTIVATE_NEW_SA--&amp;gt;AM_TM_INIT_XAUTH_V6H, NullEvent--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_START_TM--&amp;gt;AM_TM_INIT_XAUTH, EV_START_TM--&amp;gt;AM_PROC_MSG3, EV_TEST_TM_H6&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, IKE SA AM:6a7c6581 terminating:&amp;nbsp; flags 0x0105c001, refcnt 0, tuncnt 0&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, sending delete/delete with reason message&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing IKE delete payload&lt;BR /&gt;Dec 01 12:54:22 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 12:54:22 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=687f493f) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;Dec 01 12:54:22 [IKEv1]: IP = 200.40.40.61, Received encrypted packet with no matching SA, dropping&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh debug&lt;BR /&gt;debug ldap&amp;nbsp; enabled at level 255&lt;BR /&gt;debug crypto isakmp enabled at level 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My conclusion is: that the ASA is mapping the allowed users to the right group-policy (Allow-Access) but isn't applying it to the VPN session because allways use the default-policy-group in the tunnel-group.&amp;nbsp; Can this be solved in any way?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Guzmán&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Dec 2010 17:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576855#M279202</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2010-12-01T17:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576856#M279224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guzman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I spotted the problem:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;ldap attribute-map member&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;ldap attribute-map member&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(and so you are right, the default policy was always applied because it was never overridden by the atrribute-map. With the above correction the IETF-Radius-Class will override the default policy)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Dec 2010 19:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576856#M279224</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2010-12-01T19:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576857#M279260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Herbert, I've used the parameter Group-Policy due to I found it in Cisco documentation.&amp;nbsp; I've read that it substitute the old keyword IETF-Radius-Class in versions 8.2 and higher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still I've made the configuration change that you suggest and the result is the same that in the previous post:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run ldap&lt;BR /&gt;ldap attribute-map member&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;BR /&gt;&amp;nbsp; map-value memberOf CN=VPN-USERS,CN=Users,DC=test,DC=com,DC=uy Allow-Access&lt;BR /&gt;ciscoasa# sh deb&lt;BR /&gt;ciscoasa# sh debug &lt;BR /&gt;debug ldap&amp;nbsp; enabled at level 255&lt;BR /&gt;debug crypto isakmp enabled at level 10&lt;BR /&gt;ciscoasa# sh run tunn&lt;BR /&gt;ciscoasa# sh run tunnel-group &lt;BR /&gt;tunnel-group VPN-Access type remote-access&lt;BR /&gt;tunnel-group VPN-Access general-attributes&lt;BR /&gt; address-pool Prueba_NT&lt;BR /&gt; authentication-server-group LDAP&lt;BR /&gt; default-group-policy NOACCESS&lt;BR /&gt;tunnel-group VPN-Access ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;ciscoasa# sh run group-po&lt;BR /&gt;ciscoasa# sh run group-policy &lt;BR /&gt;group-policy NOACCESS internal&lt;BR /&gt;group-policy NOACCESS attributes&lt;BR /&gt; vpn-simultaneous-logins 0&lt;BR /&gt;group-policy Allow-Access internal&lt;BR /&gt;group-policy Allow-Access attributes&lt;BR /&gt; dns-server value 10.59.1.3 10.1.0.120&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value test.com&lt;BR /&gt;ciscoasa# Dec 01 16:47:05 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 854&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing SA payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ke payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ISA_KE payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing nonce payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, Received xauth V6 VID&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, Received DPD VID&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Fragmentation VID&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, Received NAT-Traversal ver 02 VID&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 16:47:05 [IKEv1]: IP = 200.40.40.61, Connection landed on tunnel_group VPN-Access&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing IKE SA payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ISAKMP SA payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ke payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing nonce payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Generating keys for Responder...&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing hash payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Cisco Unity VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing xauth V6 VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing dpd vid payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Traversal VID ver 02 payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing VID payload&lt;BR /&gt;Dec 01 16:47:05 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Dec 01 16:47:05 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 440&lt;BR /&gt;Dec 01 16:47:06 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NOTIFY (11) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 168&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000408)&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 01 16:47:06 [IKEv1]: Group = VPN-Access, IP = 200.40.40.61, Automatic NAT Detection Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote end is NOT behind a NAT device&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This&amp;nbsp;&amp;nbsp; end is NOT behind a NAT device&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 16:47:06 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=127c9463) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72&lt;BR /&gt;Dec 01 16:47:12 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=127c9463) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 88&lt;BR /&gt;Dec 01 16:47:12 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 16:47:12 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[2] Session Start&lt;BR /&gt;[2] New request Session, context 0xd7b91748, reqType = Authentication&lt;BR /&gt;[2] Fiber started&lt;BR /&gt;[2] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[2] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[2] defaultNamingContext: value = DC=test,DC=com,DC=uy&lt;BR /&gt;[2] supportedLDAPVersion: value = 3&lt;BR /&gt;[2] supportedLDAPVersion: value = 2&lt;BR /&gt;[2] supportedSASLMechanisms: value = GSSAPI&lt;BR /&gt;[2] supportedSASLMechanisms: value = GSS-SPNEGO&lt;BR /&gt;[2] supportedSASLMechanisms: value = EXTERNAL&lt;BR /&gt;[2] supportedSASLMechanisms: value = DIGEST-MD5&lt;BR /&gt;[2] Binding as Administrator&lt;BR /&gt;[2] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[2] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=tecnico2]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[2] User DN = [CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[2] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[2] Reading password policy for tecnico2, dn:CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[2] Read bad password count 0&lt;BR /&gt;[2] Binding as tecnico2&lt;BR /&gt;[2] Performing Simple authentication for tecnico2 to 10.59.1.60&lt;BR /&gt;[2] Processing LDAP response for user tecnico2&lt;BR /&gt;[2] Message (tecnico2): &lt;BR /&gt;[2] Authentication successful for tecnico2 to 10.59.1.60&lt;BR /&gt;[2] Retrieved User Attributes:&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = tecnico2&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = tecnico2&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=tecnico2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20100813180305.0Z&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101201131638.0Z&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = tecnico2&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 28717&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to IETF-Radius-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94358&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = tecnico2&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = 8R.:.L.L.\.s....&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 129344820578485000&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 129344820762703750&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129343856087235000&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8`...&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 3&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = tecnico2&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:tecnico2@test.com.uy"&gt;tecnico2@test.com.uy&lt;/A&gt;&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; msNPAllowDialin: value = FALSE&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 129356829987391250&lt;BR /&gt;[2] Fiber exit Tx=571 bytes Rx=2607 bytes, status=1&lt;BR /&gt;[2] Session End&lt;BR /&gt;Dec 01 16:47:14 [IKEv1]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Login authentication failed due to max simultaneous-login restriction.&lt;BR /&gt;Dec 01 16:47:14 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 16:47:14 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 16:47:14 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=c262c842) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 97&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# Dec 01 16:47:30 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=c262c842) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 88&lt;BR /&gt;Dec 01 16:47:30 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 16:47:30 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico2, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[4] Session Start&lt;BR /&gt;[4] New request Session, context 0xd7b91748, reqType = Authentication&lt;BR /&gt;[4] Fiber started&lt;BR /&gt;[4] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[4] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[4] supportedLDAPVersion: value = 3&lt;BR /&gt;[4] supportedLDAPVersion: value = 2&lt;BR /&gt;[4] Binding as Administrator&lt;BR /&gt;[4] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[4] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=tecnico1]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[4] User DN = [CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[4] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[4] Reading password policy for tecnico1, dn:CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[4] Read bad password count 0&lt;BR /&gt;[4] Binding as tecnico1&lt;BR /&gt;[4] Performing Simple authentication for tecnico1 to 10.59.1.60&lt;BR /&gt;[4] Processing LDAP response for user tecnico1&lt;BR /&gt;[4] Message (tecnico1): &lt;BR /&gt;[4] Authentication successful for tecnico1 to 10.59.1.60&lt;BR /&gt;[4] Retrieved User Attributes:&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = tecnico1&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = tecnico1&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=tecnico1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20100813180216.0Z&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101201131651.0Z&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = tecnico1&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 28706&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=VPN-USERS,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to IETF-Radius-Class: value = Allow-Access&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = Allow-Access&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to IETF-Radius-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=soporte,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to IETF-Radius-Class: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=Remote Desktop Users,CN=Builtin,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94359&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = tecnico1&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = ^;&amp;gt;.'..E./T4H...&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 129343952572078750&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 129343952638172500&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129343765648016250&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userParameters: value = m:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P....CtxCfgPresent..............&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8_...&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 28&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = tecnico1&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:tecnico1@test.com.uy"&gt;tecnico1@test.com.uy&lt;/A&gt;&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; msNPAllowDialin: value = TRUE&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101117151522.0Z&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 20101116140935.0Z&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 16020131235128.0Z&lt;BR /&gt;[4]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 129356830114110000&lt;BR /&gt;[4] Fiber exit Tx=571 bytes Rx=2960 bytes, status=1&lt;BR /&gt;[4] Session End&lt;BR /&gt;Dec 01 16:47:30 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Login authentication failed due to max simultaneous-login restriction.&lt;BR /&gt;Dec 01 16:47:30 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 16:47:30 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 16:47:30 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=ff57eafb) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 97&lt;BR /&gt;Dec 01 16:47:37 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=ff57eafb) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 68&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;BR /&gt;Dec 01 16:47:37 [IKEv1]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, Error processing payload: Payload ID: 14&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE TM V6 FSM error history (struct &amp;amp;0xd7b558b0)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; TM_DONE, EV_ERROR--&amp;gt;TM_WAIT_REPLY, EV_PROC_MSG--&amp;gt;TM_WAIT_REPLY, EV_HASH_OK--&amp;gt;TM_WAIT_REPLY, NullEvent--&amp;gt;TM_WAIT_REPLY, EV_COMP_HASH--&amp;gt;TM_WAIT_REPLY, EV_VALIDATE_MSG--&amp;gt;TM_WAIT_REPLY, EV_DECRYPT_OK--&amp;gt;TM_WAIT_REPLY, NullEvent&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE AM Responder FSM error history (struct &amp;amp;0xd8195508)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_TM_FAIL--&amp;gt;AM_TM_INIT_XAUTH_V6H, NullEvent--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_ACTIVATE_NEW_SA--&amp;gt;AM_TM_INIT_XAUTH_V6H, NullEvent--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_START_TM--&amp;gt;AM_TM_INIT_XAUTH, EV_START_TM--&amp;gt;AM_PROC_MSG3, EV_TEST_TM_H6&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, IKE SA AM:a35671e3 terminating:&amp;nbsp; flags 0x0105c001, refcnt 0, tuncnt 0&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, sending delete/delete with reason message&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing IKE delete payload&lt;BR /&gt;Dec 01 16:47:37 [IKEv1 DEBUG]: Group = VPN-Access, Username = tecnico1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 01 16:47:37 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=35e2539e) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;Dec 01 16:47:37 [IKEv1]: IP = 200.40.40.61, Received encrypted packet with no matching SA, dropping&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see in this output that the problem is exactly the same with the new keyword.&amp;nbsp; I'm thinking about a bug or a functionality limitation in the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Guzmán&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Dec 2010 20:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576857#M279260</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2010-12-01T20:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576858#M279272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm wondering if this is because the user is part of more than one AD&amp;nbsp; group. Normally this should work if the first group returned by the LDAP server is the one used in the attribute map. But just to be sure could you remove the test user (or create another test user)&amp;nbsp; from the soporte and "Remote Desktop Users" groups and see if that makes&amp;nbsp; any difference?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Dec 2010 22:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576858#M279272</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2010-12-01T22:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576859#M279286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Herbert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've probed your suggestion and the result is the same, all the users fall to the default-policy NOACCESS.&amp;nbsp; Here is the debug output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run ldap&lt;BR /&gt;ldap attribute-map member&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;BR /&gt;&amp;nbsp; map-value memberOf CN=VPN-USERS,CN=Users,DC=test,DC=com,DC=uy Allow-Access&lt;BR /&gt;ciscoasa# sh run tunn&lt;BR /&gt;ciscoasa# sh run tunnel-group &lt;BR /&gt;tunnel-group VPN-Access type remote-access&lt;BR /&gt;tunnel-group VPN-Access general-attributes&lt;BR /&gt; address-pool Prueba_NT&lt;BR /&gt; authentication-server-group LDAP&lt;BR /&gt; default-group-policy NOACCESS&lt;BR /&gt;tunnel-group VPN-Access ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;ciscoasa# sh run group-pol&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;ciscoasa# sh run group-policy &lt;BR /&gt;group-policy NOACCESS internal&lt;BR /&gt;group-policy NOACCESS attributes&lt;BR /&gt; vpn-simultaneous-logins 0&lt;BR /&gt;group-policy Allow-Access internal&lt;BR /&gt;group-policy Allow-Access attributes&lt;BR /&gt; dns-server value 10.59.1.3 10.1.0.120&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value test.com&lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# debug ldap 255&lt;BR /&gt;debug ldap&amp;nbsp; enabled at level 255&lt;BR /&gt;ciscoasa# debug cry isa 10&lt;BR /&gt;ciscoasa# sh debug&lt;BR /&gt;debug ldap&amp;nbsp; enabled at level 255&lt;BR /&gt;debug crypto isakmp enabled at level 10&lt;BR /&gt;ciscoasa# Dec 02 12:11:01 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 854&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing SA payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ke payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ISA_KE payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing nonce payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing ID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, Received xauth V6 VID&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, Received DPD VID&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Fragmentation VID&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, Received NAT-Traversal ver 02 VID&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 02 12:11:01 [IKEv1]: IP = 200.40.40.61, Connection landed on tunnel_group VPN-Access&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing IKE SA payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ISAKMP SA payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ke payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing nonce payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Generating keys for Responder...&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing ID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing hash payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Cisco Unity VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing xauth V6 VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing dpd vid payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Traversal VID ver 02 payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing NAT-Discovery payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Dec 02 12:11:01 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 440&lt;BR /&gt;Dec 02 12:11:01 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NOTIFY (11) + NAT-D (130) + NAT-D (130) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 168&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing hash payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Computing hash for ISAKMP&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing notify payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing NAT-Discovery payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, computing NAT Discovery hash&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000408)&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, processing VID payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Received Cisco Unity client VID&lt;BR /&gt;Dec 02 12:11:01 [IKEv1]: Group = VPN-Access, IP = 200.40.40.61, Automatic NAT Detection Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote end is NOT behind a NAT device&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This&amp;nbsp;&amp;nbsp; end is NOT behind a NAT device&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 02 12:11:01 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=56761fbb) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72&lt;BR /&gt;Dec 02 12:11:11 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=56761fbb) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 85&lt;BR /&gt;Dec 02 12:11:11 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 02 12:11:11 [IKEv1 DEBUG]: Group = VPN-Access, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[2] Session Start&lt;BR /&gt;[2] New request Session, context 0xd7b91768, reqType = Authentication&lt;BR /&gt;[2] Fiber started&lt;BR /&gt;[2] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[2] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[2] defaultNamingContext: value = DC=test,DC=com,DC=uy&lt;BR /&gt;[2] supportedLDAPVersion: value = 3&lt;BR /&gt;[2] supportedLDAPVersion: value = 2&lt;BR /&gt;[2] supportedSASLMechanisms: value = GSSAPI&lt;BR /&gt;[2] supportedSASLMechanisms: value = GSS-SPNEGO&lt;BR /&gt;[2] supportedSASLMechanisms: value = EXTERNAL&lt;BR /&gt;[2] supportedSASLMechanisms: value = DIGEST-MD5&lt;BR /&gt;[2] Binding as Administrator&lt;BR /&gt;[2] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[2] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=test1]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[2] User DN = [CN=test1,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[2] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[2] Reading password policy for test1, dn:CN=test1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[2] Read bad password count 0&lt;BR /&gt;[2] Binding as test1&lt;BR /&gt;[2] Performing Simple authentication for test1 to 10.59.1.60&lt;BR /&gt;[2] Processing LDAP response for user test1&lt;BR /&gt;[2] Message (test1): &lt;BR /&gt;[2] Authentication successful for test1 to 10.59.1.60&lt;BR /&gt;[2] Retrieved User Attributes:&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = test1&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = test1&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=test1,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20101202122728.0Z&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101202122728.0Z&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = test1&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 94365&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; memberOf: value = CN=VPN-USERS,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to Group-Policy: value = Allow-Access&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = Allow-Access&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94371&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = test1&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = q}...u5H..t...%.&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129357664485985000&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8u...&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 0&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = test1&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:test1@test.com.uy"&gt;test1@test.com.uy&lt;/A&gt;&lt;BR /&gt;[2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[2] Fiber exit Tx=562 bytes Rx=2391 bytes, status=1&lt;BR /&gt;[2] Session End&lt;BR /&gt;Dec 02 12:11:12 [IKEv1]: Group = VPN-Access, Username = test1, IP = 200.40.40.61, Login authentication failed due to max simultaneous-login restriction.&lt;BR /&gt;Dec 02 12:11:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = test1, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 02 12:11:12 [IKEv1 DEBUG]: Group = VPN-Access, Username = test1, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 02 12:11:12 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=bd364d8) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 97&lt;BR /&gt;Dec 02 12:11:24 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=bd364d8) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 85&lt;BR /&gt;Dec 02 12:11:24 [IKEv1 DEBUG]: Group = VPN-Access, Username = test1, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 02 12:11:24 [IKEv1 DEBUG]: Group = VPN-Access, Username = test1, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;[5] Session Start&lt;BR /&gt;[5] New request Session, context 0xd7b91768, reqType = Authentication&lt;BR /&gt;[5] Fiber started&lt;BR /&gt;[5] Creating LDAP context with uri=ldap://10.59.1.60:389&lt;BR /&gt;[5] Connect to LDAP server: &lt;A href="https://community.cisco.com/"&gt;ldap://10.59.1.60:389&lt;/A&gt;, status = Successful&lt;BR /&gt;[5] supportedLDAPVersion: value = 3&lt;BR /&gt;[5] supportedLDAPVersion: value = 2&lt;BR /&gt;[5] Binding as Administrator&lt;BR /&gt;[5] Performing Simple authentication for Administrator to 10.59.1.60&lt;BR /&gt;[5] LDAP Search:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [dc=test, dc=com, dc=uy]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=test2]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;BR /&gt;[5] User DN = [CN=test2,CN=Users,DC=test,DC=com,DC=uy]&lt;BR /&gt;[5] Talking to Active Directory server 10.59.1.60&lt;BR /&gt;[5] Reading password policy for test2, dn:CN=test2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[5] Read bad password count 0&lt;BR /&gt;[5] Binding as test2&lt;BR /&gt;[5] Performing Simple authentication for test2 to 10.59.1.60&lt;BR /&gt;[5] Processing LDAP response for user test2&lt;BR /&gt;[5] Message (test2): &lt;BR /&gt;[5] Authentication successful for test2 to 10.59.1.60&lt;BR /&gt;[5] Retrieved User Attributes:&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn: value = test2&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; givenName: value = test2&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=test2,CN=Users,DC=test,DC=com,DC=uy&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenCreated: value = 20101202122755.0Z&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; whenChanged: value = 20101202122755.0Z&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; displayName: value = test2&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNCreated: value = 94373&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uSNChanged: value = 94379&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: value = test2&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectGUID: value = F.2.2..C.|.R}Z.1&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userAccountControl: value = 66048&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; badPasswordTime: value = 0&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lastLogon: value = 0&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pwdLastSet: value = 129357664759735000&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectSid: value = .............X......\%.8v...&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; logonCount: value = 0&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountName: value = test2&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;A href="mailto:test2@test.com.uy"&gt;test2@test.com.uy&lt;/A&gt;&lt;BR /&gt;[5]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=test,DC=com,DC=uy&lt;BR /&gt;[5] Fiber exit Tx=562 bytes Rx=2320 bytes, status=1&lt;BR /&gt;[5] Session End&lt;BR /&gt;Dec 02 12:11:24 [IKEv1]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, Login authentication failed due to max simultaneous-login restriction.&lt;BR /&gt;Dec 02 12:11:24 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 02 12:11:24 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 02 12:11:24 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=d6fed3c0) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 97&lt;BR /&gt;Dec 02 12:11:31 [IKEv1]: IP = 200.40.40.61, IKE_DECODE RECEIVED Message (msgid=d6fed3c0) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 68&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, process_attr(): Enter!&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, Processing MODE_CFG Reply attributes.&lt;BR /&gt;Dec 02 12:11:31 [IKEv1]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, Error processing payload: Payload ID: 14&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, IKE TM V6 FSM error history (struct &amp;amp;0xd5eab788)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; TM_DONE, EV_ERROR--&amp;gt;TM_WAIT_REPLY, EV_PROC_MSG--&amp;gt;TM_WAIT_REPLY, EV_HASH_OK--&amp;gt;TM_WAIT_REPLY, NullEvent--&amp;gt;TM_WAIT_REPLY, EV_COMP_HASH--&amp;gt;TM_WAIT_REPLY, EV_VALIDATE_MSG--&amp;gt;TM_WAIT_REPLY, EV_DECRYPT_OK--&amp;gt;TM_WAIT_REPLY, NullEvent&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, IKE AM Responder FSM error history (struct &amp;amp;0xd5eab228)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_TM_FAIL--&amp;gt;AM_TM_INIT_XAUTH_V6H, NullEvent--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_ACTIVATE_NEW_SA--&amp;gt;AM_TM_INIT_XAUTH_V6H, NullEvent--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_START_TM--&amp;gt;AM_TM_INIT_XAUTH, EV_START_TM--&amp;gt;AM_PROC_MSG3, EV_TEST_TM_H6&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, IKE SA AM:c9d01986 terminating:&amp;nbsp; flags 0x0105c001, refcnt 0, tuncnt 0&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, sending delete/delete with reason message&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, constructing blank hash payload&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, constructing IKE delete payload&lt;BR /&gt;Dec 02 12:11:31 [IKEv1 DEBUG]: Group = VPN-Access, Username = test2, IP = 200.40.40.61, constructing qm hash payload&lt;BR /&gt;Dec 02 12:11:31 [IKEv1]: IP = 200.40.40.61, IKE_DECODE SENDING Message (msgid=9c639b38) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;BR /&gt;Dec 02 12:11:31 [IKEv1]: IP = 200.40.40.61, Received encrypted packet with no matching SA, dropping&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that this works only if you have configured both conditions (allow and deny) and parameters to match in the answer from the LDAP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Guzmán&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Dec 2010 16:05:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576859#M279286</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2010-12-02T16:05:17Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576860#M279299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guzman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this should definitely work, i.e. the deny part is already working ok &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; and the user that has the correct memberOf attribute should definitely get mapped to the Allow-Access policy and so should be allowed in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm thinking of this being a bug as well, but I had a quick look and did not see anything matching, and if this were a bug in 8.2.3. then I would not expect you to be the first customer to experience this, so I'm still more inclined to think it is something in the config that we are overlooking (I know frome experience typo's can sometimes be extremely hard to spot).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you get "debug aaa common 255" as well please, maybe that will tell us something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, just to be sure: you did not configure anything (like vpn-simultaneous-logins) in the DfltGrpPolicy, did you? Just double checking since your Allow-Access policy would then inherit that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe as another test, explicitly configure a non-zero value for that parameter in the Allow-Access policy, i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Allow-Access attrib&lt;/P&gt;&lt;P&gt;&amp;nbsp; vpn-simultaneous-logins 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 14:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576860#M279299</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2010-12-03T14:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576861#M279308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Herbert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It finaly works!!!&amp;nbsp; You gave me the key to solve the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There isn't a bug, is a configuration issue.&amp;nbsp; You need to specify in the group-policy the amount of concurrent vpn sessions allowed to the clients.&amp;nbsp; By default this paramenter isn't set in the new group-policy, then the ASA assumes a zero limit connection and rejects the users login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you set a value with the command vpn-simultaneous-logins to a number higher than 0 the solution starts to work and the correct users are allowed to access the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help in this case.&amp;nbsp; I suppose this information must be published in the configuration guides to help another people with the same problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See you soon with another AAA issue &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Guzmán&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 17:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576861#M279308</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2010-12-03T17:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576862#M279313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guzman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks, I'm glad this helped. Just to be sure I double-checked, and this is indeed expected behavior.&lt;/P&gt;&lt;P&gt;I.e. attributes are taken from (in this order):&lt;/P&gt;&lt;P&gt;- the DAP policy&lt;/P&gt;&lt;P&gt;- user attributes pushed by the AAA server&lt;/P&gt;&lt;P&gt;- group-policy pushed by the AAA server&lt;/P&gt;&lt;P&gt;- group-policy defined in the tunnel-group&lt;/P&gt;&lt;P&gt;- DfltGrpPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking forward to your next issue &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2010 21:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576862#M279313</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2010-12-08T21:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576863#M279315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This saved my day &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Allow-Access attrib&lt;/P&gt;&lt;P&gt;&amp;nbsp; vpn-simultaneous-logins 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was trying for days to get this working, this should really go in the config guide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lukas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 16:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576863#M279315</guid>
      <dc:creator>lus</dc:creator>
      <dc:date>2011-02-18T16:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576864#M279319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pleased that you found the solution with this post, it's the idea&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate the post if it was useful, to help other people find it quickly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Guzmán&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 16:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576864#M279319</guid>
      <dc:creator>guzman.barrio</dc:creator>
      <dc:date>2011-02-18T16:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576865#M279321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Guzman and Herbert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gr8 post thanks a lot, it helped me alot.&lt;/P&gt;&lt;P&gt;I was also stuck on the same memberOf problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have now Implemented LDAP successfully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Warm Regards&lt;BR /&gt;Fazleabbas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Apr 2011 02:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576865#M279321</guid>
      <dc:creator>fazleabbas khanbahadur</dc:creator>
      <dc:date>2011-04-28T02:08:50Z</dc:date>
    </item>
    <item>
      <title>LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576866#M279325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent post ..! Exactly the same problem I had.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the time you spent in documenting.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It's working now.!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Eduardo&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 18:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576866#M279325</guid>
      <dc:creator>edeloscobos</dc:creator>
      <dc:date>2012-09-26T18:23:55Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576867#M279327</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am having same problems. when I test, all account are mapped&amp;nbsp;by match policy (check by &lt;G class="gr_ gr_376 gr-alert gr_gramm gr_run_anim Grammar multiReplace" id="376" data-gr-id="376"&gt;debug&lt;/G&gt;) but user &lt;G class="gr_ gr_375 gr-alert gr_gramm gr_run_anim Grammar multiReplace" id="375" data-gr-id="375"&gt;are&lt;/G&gt; unable to establish VPN connection.&lt;/P&gt;
&lt;P&gt;can you upload&amp;nbsp;your working &lt;G class="gr_ gr_340 gr-alert gr_gramm gr_run_anim Punctuation multiReplace" id="340" data-gr-id="340"&gt;config.&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;here is my config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA-5545-X# sh running-config group-policy &lt;BR /&gt;group-policy NOACCESS internal&lt;BR /&gt;group-policy NOACCESS attributes&lt;BR /&gt;vpn-simultaneous-logins 0&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;dns-server value 10.11.50.3 10.11.50.4&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;group-policy GroupPolicy_TEST-VPN internal&lt;BR /&gt;group-policy GroupPolicy_TEST-VPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 10.11.50.3 10.11.50.4&lt;BR /&gt;vpn-simultaneous-logins 10&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client &lt;BR /&gt;default-domain value intra.uniri.hr&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value TEST-VPN_client_profile type user&lt;BR /&gt;ASA-5545-X#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;THX,&lt;/P&gt;
&lt;P&gt;Ivan&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2017 09:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/1576867#M279327</guid>
      <dc:creator>Ivan Marinovic</dc:creator>
      <dc:date>2017-01-17T09:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP on ASA with attribute-map</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/3841354#M279329</link>
      <description>&lt;P&gt;I have the same issue.&lt;/P&gt;&lt;P&gt;we have 5 groups profile.&lt;/P&gt;&lt;P&gt;we want the IT profile limit to IT account only in the AD. so no other group can access.&lt;/P&gt;&lt;P&gt;configured everything, not work. the debug shows no map message at all.&lt;/P&gt;&lt;P&gt;TAC found out the member of is case sensitive, it should be memberOf exactly.&lt;/P&gt;&lt;P&gt;after change the case, it start to catch the map, then every other group will match the noaccess default policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this help.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 21:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-on-asa-with-attribute-map/m-p/3841354#M279329</guid>
      <dc:creator>xiangwenwang121</dc:creator>
      <dc:date>2019-04-18T21:18:20Z</dc:date>
    </item>
  </channel>
</rss>

