<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Where to set clinet netmask in ASA, MSAD, split-tunnel, static IP from LDAP environment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447655#M312806</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a problem to set the netmask für SVC (anyconnect) clients when using a static IP assignment from MSAD via LDAP.&lt;/P&gt;&lt;P&gt;The schemata within MS AD has no netmask attribute.&lt;/P&gt;&lt;P&gt;We assign a 10.x.x.x address in the MS AD Dial-Up tab.&lt;/P&gt;&lt;P&gt;This results in that the client uses 255.0.0.0 as the corresponding netmask which generates a dynamic route of 10.0.0.0/8 into the SVC tunnel.&lt;/P&gt;&lt;P&gt;In split-tunnel situation, this is not the desired result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to set the clients netmask to 255.255.254.0 or even 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can this be done?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map TCCustLDAPAttrMap&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; msRADIUSFramedIPAddress IETF-Radius-Framed-IP-Address&lt;/P&gt;&lt;P&gt;aaa-server RADIUS_LDAP2 host 10.238.60.44&lt;BR /&gt; server-port 636&lt;BR /&gt; ldap-base-dn dc=rz,dc=tc,dc=corp&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-login-password *&lt;BR /&gt; ldap-login-dn CN=S_ASA_Auth2,ou=S_Group,DC=rz,DC=tc,DC=corp&lt;BR /&gt; ldap-over-ssl enable&lt;BR /&gt; server-type openldap&lt;BR /&gt; ldap-attribute-map TCCustLDAPAttrMap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ca certificate map TCCertMap 20&lt;BR /&gt; subject-name attr ou eq ou_tc_sslvpn-1&lt;/P&gt;&lt;P&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; default-idle-timeout 3600&lt;BR /&gt; svc image disk0:/anyconnect-win-2.2.0140-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt; certificate-group-map TCCertMap 20 OU_TC_SSLVPN-1&lt;/P&gt;&lt;P&gt;group-policy OU_TC_SSLVPN-1-GrpPol internal&lt;BR /&gt;group-policy OU_TC_SSLVPN-1-GrpPol attributes&lt;BR /&gt; vpn-simultaneous-logins 500&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-filter value CustSslVpnAcl1&lt;BR /&gt; vpn-tunnel-protocol svc&lt;BR /&gt; ip-comp enable&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value ssl-vpn-acl&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc keepalive 60&lt;BR /&gt;&amp;nbsp; svc rekey method ssl&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc ask none default svc&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;/P&gt;&lt;P&gt;tunnel-group OU_TC_SSLVPN-1 type remote-access&lt;BR /&gt;tunnel-group OU_TC_SSLVPN-1 general-attributes&lt;BR /&gt; authorization-server-group RADIUS_LDAP2&lt;BR /&gt; default-group-policy OU_TC_SSLVPN-1-GrpPol&lt;BR /&gt; authorization-required&lt;BR /&gt; authorization-dn-attributes CN&lt;BR /&gt;tunnel-group OU_TC_SSLVPN-1 webvpn-attributes&lt;BR /&gt; authentication certificate&lt;BR /&gt;tunnel-group-map enable rules&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 00:13:49 GMT</pubDate>
    <dc:creator>christian.kupferschmid</dc:creator>
    <dc:date>2019-03-11T00:13:49Z</dc:date>
    <item>
      <title>Where to set clinet netmask in ASA, MSAD, split-tunnel, static IP from LDAP environment</title>
      <link>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447655#M312806</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a problem to set the netmask für SVC (anyconnect) clients when using a static IP assignment from MSAD via LDAP.&lt;/P&gt;&lt;P&gt;The schemata within MS AD has no netmask attribute.&lt;/P&gt;&lt;P&gt;We assign a 10.x.x.x address in the MS AD Dial-Up tab.&lt;/P&gt;&lt;P&gt;This results in that the client uses 255.0.0.0 as the corresponding netmask which generates a dynamic route of 10.0.0.0/8 into the SVC tunnel.&lt;/P&gt;&lt;P&gt;In split-tunnel situation, this is not the desired result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to set the clients netmask to 255.255.254.0 or even 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can this be done?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map TCCustLDAPAttrMap&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; msRADIUSFramedIPAddress IETF-Radius-Framed-IP-Address&lt;/P&gt;&lt;P&gt;aaa-server RADIUS_LDAP2 host 10.238.60.44&lt;BR /&gt; server-port 636&lt;BR /&gt; ldap-base-dn dc=rz,dc=tc,dc=corp&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-login-password *&lt;BR /&gt; ldap-login-dn CN=S_ASA_Auth2,ou=S_Group,DC=rz,DC=tc,DC=corp&lt;BR /&gt; ldap-over-ssl enable&lt;BR /&gt; server-type openldap&lt;BR /&gt; ldap-attribute-map TCCustLDAPAttrMap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ca certificate map TCCertMap 20&lt;BR /&gt; subject-name attr ou eq ou_tc_sslvpn-1&lt;/P&gt;&lt;P&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; default-idle-timeout 3600&lt;BR /&gt; svc image disk0:/anyconnect-win-2.2.0140-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt; certificate-group-map TCCertMap 20 OU_TC_SSLVPN-1&lt;/P&gt;&lt;P&gt;group-policy OU_TC_SSLVPN-1-GrpPol internal&lt;BR /&gt;group-policy OU_TC_SSLVPN-1-GrpPol attributes&lt;BR /&gt; vpn-simultaneous-logins 500&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-filter value CustSslVpnAcl1&lt;BR /&gt; vpn-tunnel-protocol svc&lt;BR /&gt; ip-comp enable&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value ssl-vpn-acl&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc keepalive 60&lt;BR /&gt;&amp;nbsp; svc rekey method ssl&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc ask none default svc&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;/P&gt;&lt;P&gt;tunnel-group OU_TC_SSLVPN-1 type remote-access&lt;BR /&gt;tunnel-group OU_TC_SSLVPN-1 general-attributes&lt;BR /&gt; authorization-server-group RADIUS_LDAP2&lt;BR /&gt; default-group-policy OU_TC_SSLVPN-1-GrpPol&lt;BR /&gt; authorization-required&lt;BR /&gt; authorization-dn-attributes CN&lt;BR /&gt;tunnel-group OU_TC_SSLVPN-1 webvpn-attributes&lt;BR /&gt; authentication certificate&lt;BR /&gt;tunnel-group-map enable rules&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447655#M312806</guid>
      <dc:creator>christian.kupferschmid</dc:creator>
      <dc:date>2019-03-11T00:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Where to set clinet netmask in ASA, MSAD, split-tunnel, stat</title>
      <link>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447656#M312807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've had this problem with the subnet mask assigning like you do, but found this thread and especialy this post&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://cisco-support.hosted.jivesoftware.com/message/3061163#3061163"&gt;https://cisco-support.hosted.jivesoftware.com/message/3061163#3061163&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and it worked for me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps you too &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jul 2010 19:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447656#M312807</guid>
      <dc:creator>Michael Dombek</dc:creator>
      <dc:date>2010-07-02T19:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: Where to set clinet netmask in ASA, MSAD, split-tunnel, stat</title>
      <link>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447657#M312808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx a lot Michael.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map TCCustLDAPAttrMap&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; msRADIUSCallbackNumber IETF-Radius-Framed-IP-Netmask&lt;BR /&gt;&amp;nbsp; map-value msRADIUSCallbackNumber 23 4294966784&lt;BR /&gt;&amp;nbsp; map-value msRADIUSCallbackNumber 32 4294967295&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I use the Callback Field on the dial-in Tab on the User Properties to enter the bit lengt of the mask and mapp it to IETF-Radius-Framed-IP-Netmask.&lt;/P&gt;&lt;P&gt;Seems to work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thanks for the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards, chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jul 2010 19:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447657#M312808</guid>
      <dc:creator>christian.kupferschmid</dc:creator>
      <dc:date>2010-07-02T19:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: Where to set clinet netmask in ASA, MSAD, split-tunnel, stat</title>
      <link>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447658#M312809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Happy to here that it worked for you too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate the original post from &lt;BR /&gt;fdouble08 and halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers Michael&lt;/P&gt;&lt;P&gt;&lt;SPAN class="jive-author-avatar-container"&gt; &lt;SPAN class="jive-cisco-user-points"&gt;&lt;IMG alt=" " src="https://cisco-support.hosted.jivesoftware.com/resources/images/status/nostar.gif" title=" " /&gt; &lt;/SPAN&gt; &lt;A class="jiveTT-hover-user" href="https://cisco-support.hosted.jivesoftware.com/people/fdouble08" onmouseout="" onmouseover=""&gt; &lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jul 2010 20:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/where-to-set-clinet-netmask-in-asa-msad-split-tunnel-static-ip/m-p/1447658#M312809</guid>
      <dc:creator>Michael Dombek</dc:creator>
      <dc:date>2010-07-02T20:00:07Z</dc:date>
    </item>
  </channel>
</rss>

