<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec Cisco client authentication based on AD group membersh in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280687#M348533</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your QUICK reply.  I was hoping to work on this over the weekend but had other obligations.  I prefer to do this stuff outside of regular business hours - so I'll be testing over the next few evenings.  I'll post back with results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JTM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Aug 2009 14:03:03 GMT</pubDate>
    <dc:creator>JohnMeggers</dc:creator>
    <dc:date>2009-08-31T14:03:03Z</dc:date>
    <item>
      <title>IPSec Cisco client authentication based on AD group membership</title>
      <link>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280685#M348531</link>
      <description>&lt;P&gt;Looking to fine tune Cisco IPSec client RA-VPN authentication on our ASA-5510.  Currently using NT Domain authentication.  It's been working fine for quite a while but is too broad a brush.  It authenticates anyone who is in the domain.  We need to only authenticate folks who are in a specific AD remote access security group.  I'm testing LDAP but am getting the same results.  I can get it to authenticate based on overall domain membership but can't seem to figure out how to check group membership.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've updated to ASA 8.2(1) and ASDM 6.2(1).  It seems to have more LDAP functionality but I'm not an LDAP expert.  I've posted an image of the LDAP server dialog from the ASDM.  I originally tried putting the Group DN in the Base DN field but kept getting a "can't find user" error when testing.  I also tried adding the group info in the "LDAP parameters for group search" field at the bottom.  But it doesn't seem to be looking there.  Note that the current value is the Group Base DN only.  I also tried putting "memberOf=" in front of that.  Still no luck.  The values shown in the image work for simple domain membership.  I'm just stumped with how to kick off the second step to check group membership.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have a sample config floating around?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280685#M348531</guid>
      <dc:creator>JohnMeggers</dc:creator>
      <dc:date>2019-03-10T23:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Cisco client authentication based on AD group membersh</title>
      <link>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280686#M348532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went through your detailed explanation and screen shot attached. Your config still need some changes....like scope and LDAP attribute map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is  a sample config that you may refer:::&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Configuration for restricting access to a particular windows group on AD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy noaccess internal&lt;/P&gt;&lt;P&gt;group-policy noaccess attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 1&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ldap attribute-map LDAP-MAP&lt;/P&gt;&lt;P&gt;  map-name  memberOf IETF-Radius-Class&lt;/P&gt;&lt;P&gt;  map-value memberOf &lt;DN of="" the="" vpn="" group=""&gt; &lt;GROUP policy="" name=""&gt;&lt;/GROUP&gt;&lt;/DN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LDAP-AD protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAP-AD host &lt;IP-OF-WINDOWS-AD&gt;&lt;/IP-OF-WINDOWS-AD&gt;&lt;/P&gt;&lt;P&gt; server-port 389&lt;/P&gt;&lt;P&gt; ldap-base-dn &lt;AD base="" dn=""&gt;&lt;/AD&gt;&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-dn &lt;LOGIN user="" dn=""&gt;&lt;/LOGIN&gt;&lt;/P&gt;&lt;P&gt; ldap-login-password &lt;PASSWORD for="" login="" user="" dn=""&gt;&lt;/PASSWORD&gt;&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map LDAP-MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy &lt;GROUP policy="" name=""&gt; internal&lt;/GROUP&gt;&lt;/P&gt;&lt;P&gt;group-policy &lt;GROUP policy="" name=""&gt; attributes&lt;/GROUP&gt;&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec ...&lt;/P&gt;&lt;P&gt; address-pools value &lt;ADDRESS pool="" name=""&gt;&lt;/ADDRESS&gt;&lt;/P&gt;&lt;P&gt; .....&lt;/P&gt;&lt;P&gt; .....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;TUNNEL group="" name=""&gt; type remote-access&lt;/TUNNEL&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;TUNNEL group="" name=""&gt; general-attributes&lt;/TUNNEL&gt;&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP-AD&lt;/P&gt;&lt;P&gt; default-group-policy noaccess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy noaccess attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this doesn't work for you then attach "Sh run" from the ASA in your next reply and debug ldap 255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;JK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Aug 2009 11:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280686#M348532</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2009-08-28T11:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Cisco client authentication based on AD group membersh</title>
      <link>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280687#M348533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your QUICK reply.  I was hoping to work on this over the weekend but had other obligations.  I prefer to do this stuff outside of regular business hours - so I'll be testing over the next few evenings.  I'll post back with results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JTM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Aug 2009 14:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280687#M348533</guid>
      <dc:creator>JohnMeggers</dc:creator>
      <dc:date>2009-08-31T14:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Cisco client authentication based on AD group membersh</title>
      <link>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280688#M348534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also like to setup the same configuration as John. I'm following your config and trying to create those settings in ASDM. However, when creating the ldap attribute-map, "IETF-Radius-Class" is not an option in the drop down box. Please advise?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS - I have attached a screenshot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Feb 2012 20:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ipsec-cisco-client-authentication-based-on-ad-group-membership/m-p/1280688#M348534</guid>
      <dc:creator>jar371</dc:creator>
      <dc:date>2012-02-15T20:41:37Z</dc:date>
    </item>
  </channel>
</rss>

