<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAC VPN SSO Help in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775694#M310158</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That works. Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 13 Nov 2011 01:45:44 GMT</pubDate>
    <dc:creator>t805986</dc:creator>
    <dc:date>2011-11-13T01:45:44Z</dc:date>
    <item>
      <title>NAC VPN SSO Help</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775692#M310126</link>
      <description>&lt;P&gt;I have recently inherited the administration of a NAC solution that is in need of a tune up (currently running 4.1.8!!). The biggest compliant I get from users is that VPN SSO does not work and that users must open a web browser to authenticate to NAC once their SSL VPN has been established. I'm quite familiar with how to configure VPN SSO and I'm ready to do so, however I can't find the answer to one specific question I have. Can you enable VPN SSO for a select types of users only? We have a combination of both employees (who have the agent) and contractors (who don't have the agent). I only want VPN SSO to work for employees and I want contractors to have to open a web browser to authenticate. Is this possible and if so how? I have found that if you don't have the agent and VPN SSO is enabled the login is very awkward. You open a browser, you get redirected to NAC and then you get logged in once java or active x runs without having to provide your credentials and then you don't get redirected back to your orginal http request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:32:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775692#M310126</guid>
      <dc:creator>t805986</dc:creator>
      <dc:date>2019-03-11T01:32:57Z</dc:date>
    </item>
    <item>
      <title>NAC VPN SSO Help</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775693#M310137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For your employees you can use the class attribute to map them to a user role within NAC under the Cisco VPN auth provider mapping criteria. You can also map the contractors class attribute to the uanauthenticate role so when the pull up their browser they will see the authenticaiton page. Once they authenticate then in their user role you can select the redirection page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Tarik Admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Nov 2011 04:27:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775693#M310137</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2011-11-12T04:27:42Z</dc:date>
    </item>
    <item>
      <title>NAC VPN SSO Help</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775694#M310158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That works. Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Nov 2011 01:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775694#M310158</guid>
      <dc:creator>t805986</dc:creator>
      <dc:date>2011-11-13T01:45:44Z</dc:date>
    </item>
    <item>
      <title>NAC VPN SSO Help</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775695#M310194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What does the class attribute correspond to with VPN SSO that is matched against?&amp;nbsp; (E.g., the VPN group name, etc.?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to do something similar with VPN SSO, but map users to roles based on their VPN pool IP address.&amp;nbsp; How would this be accomplished?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Nov 2011 01:04:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775695#M310194</guid>
      <dc:creator>dgoodenberger</dc:creator>
      <dc:date>2011-11-17T01:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAC VPN SSO Help</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775696#M310217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You really have two options. My VPN SSO mapping rules match radius attribute 25, which is the name of the VPN group policy the user belongs to. When the ASA sends the accounting message to the NAC to indicate a new user has logged in, it includes radius attribute 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other option is to just match based on "Framed IP Address". EIther one should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Nov 2011 14:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775696#M310217</guid>
      <dc:creator>t805986</dc:creator>
      <dc:date>2011-11-17T14:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAC VPN SSO Help</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775697#M310251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply.&amp;nbsp; I tried attribute 25, but it wasn't working.&amp;nbsp; When I enabled "debug radius decode" on the ASA (v 8.2.4) I can see that this attribute is not in the RADIUS accounting packet sent to the CAS (v 4.8.2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm working with "Framed IP Address" (attribute &lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; which is being sent, but the matching is not very elegant for what I want to do.&amp;nbsp; Since I cannot match using CIDR or a range, it seems I have to write multiple mapping rules and use e.g, "starts with" matching.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Nov 2011 21:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775697#M310251</guid>
      <dc:creator>dgoodenberger</dc:creator>
      <dc:date>2011-11-17T21:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAC VPN SSO Help</title>
      <link>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775698#M310297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ended up with the following matching based on Framed IP Address, which mostly does what I want:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: sans-serif; font-size: 10pt;"&gt;(0,8 contains 192.168.47) maps to Role1&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: sans-serif; font-size: 10pt;"&gt;(NOT (0,8 contains 192.168.47)) maps to Role2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: sans-serif; font-size: 10pt;"&gt;The second express was key, since I have a fairly large range of VPN pool IPs for that Role, and the negation saved me from having to write a bunch of rules for different segments of the IP ranges.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: sans-serif; font-size: 10pt;"&gt;The only downside was that the pool I was going to use for Role1 was smaller than a /24, but I didn't see a way to easily match that, so I just increased the pool size to facilitate matching.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: sans-serif; font-size: 10pt;"&gt;Enhancement request for Cisco: please add more flexible matching, e.g., regex, to NAC role mapping!&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Nov 2011 22:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/nac-vpn-sso-help/m-p/1775698#M310297</guid>
      <dc:creator>dgoodenberger</dc:creator>
      <dc:date>2011-11-17T22:01:50Z</dc:date>
    </item>
  </channel>
</rss>

