<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Assign VPN Group Policy via Radius and Microsoft NPS server in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/1254476#M373386</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this works just fine with Microsoft NPS.&amp;nbsp; In a nutshell, you tell NPS to return the radius attribute 25 (It's called "Class") and assign it the value of &lt;EM&gt;ou=MyVPNGroupPolicy&lt;/EM&gt;&amp;nbsp; where MyVPNGroupPolicy is the name of your group policy in the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to say this option is under the standard radius attributes on one of the last configuration screens of the wizard.&amp;nbsp; You do NOT need to configure this using an LDAP setup, you can continue to use NPS, just like you did IAS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Jul 2010 02:58:51 GMT</pubDate>
    <dc:creator>Peter Noble</dc:creator>
    <dc:date>2010-07-15T02:58:51Z</dc:date>
    <item>
      <title>Assign VPN Group Policy via Radius and Microsoft NPS server</title>
      <link>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/1254474#M373312</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using Microsoft Network Policy server (formerly known as IAS server) for Radius Authentication.  Is there a way to configure NPS so it will assign a VPN Group Policy on the ASA?  Basically, I'd like to create multiple VPN group policies for different types of users and assign them via AD groups so when the user logs in to the VPN they get the Policy designed for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Brandon&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/1254474#M373312</guid>
      <dc:creator>branfarm1</dc:creator>
      <dc:date>2019-03-10T23:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Assign VPN Group Policy via Radius and Microsoft NPS server</title>
      <link>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/1254475#M373359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See the below config example:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808d1a7c.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808d1a7c.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jun 2009 08:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/1254475#M373359</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-06-30T08:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Assign VPN Group Policy via Radius and Microsoft NPS server</title>
      <link>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/1254476#M373386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this works just fine with Microsoft NPS.&amp;nbsp; In a nutshell, you tell NPS to return the radius attribute 25 (It's called "Class") and assign it the value of &lt;EM&gt;ou=MyVPNGroupPolicy&lt;/EM&gt;&amp;nbsp; where MyVPNGroupPolicy is the name of your group policy in the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to say this option is under the standard radius attributes on one of the last configuration screens of the wizard.&amp;nbsp; You do NOT need to configure this using an LDAP setup, you can continue to use NPS, just like you did IAS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 02:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/1254476#M373386</guid>
      <dc:creator>Peter Noble</dc:creator>
      <dc:date>2010-07-15T02:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Assign VPN Group Policy via Radius and Microsoft NPS server</title>
      <link>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/4119853#M561739</link>
      <description>&lt;P&gt;I did like you said with multiple group policy name in an ASA 5512. But my problem is that any user from AD can log in any group even if they are not in the group in AD. Please help&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 12:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/assign-vpn-group-policy-via-radius-and-microsoft-nps-server/m-p/4119853#M561739</guid>
      <dc:creator>yvesneptune</dc:creator>
      <dc:date>2020-07-16T12:19:41Z</dc:date>
    </item>
  </channel>
</rss>

