<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Win 2003 + ASA 8.x authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/win-2003-asa-8-x-authentication/m-p/1099568#M380650</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've already read this. Do you notice the little "against Active Directory" thing in the title? My problem is that I have to do this against the local SAM database:)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Aug 2008 18:30:57 GMT</pubDate>
    <dc:creator>thegrave2000</dc:creator>
    <dc:date>2008-08-01T18:30:57Z</dc:date>
    <item>
      <title>Win 2003 + ASA 8.x authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/win-2003-asa-8-x-authentication/m-p/1099566#M380588</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a client that has a Win 2003 R2 server without AD installed. I have an ASA 5505 which is going to terminate the L2TP over IPSec tunnels (Win XP SP2 or later clients...hopefully). My question is what options do I have for authentication against the local SAM database? I read tons of documents and it seems that LDAP and Kerberos authentication require AD, NTLM can be used only with Web VPN for SSO (besides that it's deprecated in Win 2003 as far as I know) so the only option I've got is running IAS (part of the default packages coming with Win 2003 R2, not an additional soft, right?) and utilizing the local SAM, is that right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a pretty nice article right here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://articles.techrepublic.com.com/5100-10878_11-6180954.html" target="_blank"&gt;http://articles.techrepublic.com.com/5100-10878_11-6180954.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing that bothers me is "The following groups are in this condition" window. What properties should a Win 2003 user group have so that it's eligible for use by the IAS service for authentication purposes? Also - has anyone deployed this setup, are there any non-obvious obstacles/problems that occur? I'm a little bit scared as my Win 2003 administration skills are not pretty good and don't wanna mess up something I cannot fix later.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/win-2003-asa-8-x-authentication/m-p/1099566#M380588</guid>
      <dc:creator>thegrave2000</dc:creator>
      <dc:date>2019-03-10T23:00:34Z</dc:date>
    </item>
    <item>
      <title>Re: Win 2003 + ASA 8.x authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/win-2003-asa-8-x-authentication/m-p/1099567#M380623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;check the following link will be useful&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806de37e.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806de37e.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please rate if helpful&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 14:24:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/win-2003-asa-8-x-authentication/m-p/1099567#M380623</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-01T14:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: Win 2003 + ASA 8.x authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/win-2003-asa-8-x-authentication/m-p/1099568#M380650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've already read this. Do you notice the little "against Active Directory" thing in the title? My problem is that I have to do this against the local SAM database:)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 18:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/win-2003-asa-8-x-authentication/m-p/1099568#M380650</guid>
      <dc:creator>thegrave2000</dc:creator>
      <dc:date>2008-08-01T18:30:57Z</dc:date>
    </item>
  </channel>
</rss>

