<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL VPN, ASA, RADIUS and connection profiles in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289494#M388455</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I want to have my MS IAS RADIUS check on the connection profile that a SSL VPN user selected: Users can only authenticate for profiles that match their group membership. But a single user can be allowed to connect to more than one connection profile, so forcing a user into a profile (with the CLASS attribute in the RADIUS Access-accept) does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user jdoe, member of RemoteUsers, can login on RemoteUsersProfile&lt;/P&gt;&lt;P&gt;user bigceo, member of RemoteUsers and of RemoteExecutives, can login on RemoteUsersProfile and on RemoteExecutiveProfile&lt;/P&gt;&lt;P&gt;user bofh, member of RemoteUsers and of RemoteAdmins, can login on RemoteUsersProfile and on RemoteAdminProfile&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the RADIUS needs to know on which connection profile a user wants to log into. Does anybody know where in the RADIUS request the ASA puts the selected connection profile? And how does that show up on an IAS server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 23:41:26 GMT</pubDate>
    <dc:creator>PETER EIJSBERG</dc:creator>
    <dc:date>2019-03-10T23:41:26Z</dc:date>
    <item>
      <title>SSL VPN, ASA, RADIUS and connection profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289494#M388455</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I want to have my MS IAS RADIUS check on the connection profile that a SSL VPN user selected: Users can only authenticate for profiles that match their group membership. But a single user can be allowed to connect to more than one connection profile, so forcing a user into a profile (with the CLASS attribute in the RADIUS Access-accept) does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user jdoe, member of RemoteUsers, can login on RemoteUsersProfile&lt;/P&gt;&lt;P&gt;user bigceo, member of RemoteUsers and of RemoteExecutives, can login on RemoteUsersProfile and on RemoteExecutiveProfile&lt;/P&gt;&lt;P&gt;user bofh, member of RemoteUsers and of RemoteAdmins, can login on RemoteUsersProfile and on RemoteAdminProfile&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the RADIUS needs to know on which connection profile a user wants to log into. Does anybody know where in the RADIUS request the ASA puts the selected connection profile? And how does that show up on an IAS server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289494#M388455</guid>
      <dc:creator>PETER EIJSBERG</dc:creator>
      <dc:date>2019-03-10T23:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN, ASA, RADIUS and connection profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289495#M388457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an interesting question. For a while I wondered about doing something similar to this. But I have not been able to find any indication that the ASA passes the chosen profile/group in the authentication request to Radius. If someone can show us that this can be done it would be helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Sep 2009 14:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289495#M388457</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2009-09-18T14:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN, ASA, RADIUS and connection profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289496#M388458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've sniffed the radius request coming from the ASA - there is nothing in there referring to a connection profile. I wonder if this is configurable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Sep 2009 16:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289496#M388458</guid>
      <dc:creator>PETER EIJSBERG</dc:creator>
      <dc:date>2009-09-18T16:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN, ASA, RADIUS and connection profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289497#M388462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, got an anwer from TAC: It is not possible. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Sep 2009 18:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289497#M388462</guid>
      <dc:creator>PETER EIJSBERG</dc:creator>
      <dc:date>2009-09-18T18:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN, ASA, RADIUS and connection profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289498#M388464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm struggling with *EXACTLY* the same issue. Having the connection profile in the RADIUS request would make perfect sense...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The best I (and Mike, my contact at Cisco) could come up with so far is to use DAP. From an AUTHENTICATION perspective, all of your users (bofh,jdoe,bigceo) can log on to any profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But then create DAP entries similar to:&lt;/P&gt;&lt;P&gt;- DAP1:&lt;/P&gt;&lt;P&gt;  match ALL of:&lt;/P&gt;&lt;P&gt;  connprofile RUProfile&lt;/P&gt;&lt;P&gt;  memberof RemoteUsers&lt;/P&gt;&lt;P&gt;- DAP2:&lt;/P&gt;&lt;P&gt;  match ALL of:&lt;/P&gt;&lt;P&gt;  connprofile REProfile&lt;/P&gt;&lt;P&gt;  memberof RemoteExecutives&lt;/P&gt;&lt;P&gt;- DAP3:&lt;/P&gt;&lt;P&gt;  match ALL of:&lt;/P&gt;&lt;P&gt;  connprofile RAProfile&lt;/P&gt;&lt;P&gt;  memberof RemoteAdmins&lt;/P&gt;&lt;P&gt;- DAP4:&lt;/P&gt;&lt;P&gt;  Terminate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way you can use DAP to enforce ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you come up with anything else. I'm dealing with the same issue here...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Sep 2009 20:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289498#M388464</guid>
      <dc:creator>fsmontenegro</dc:creator>
      <dc:date>2009-09-20T20:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN, ASA, RADIUS and connection profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289499#M388468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why not use LDAP authentication back to your active directory (I'm assuming you're using AD because you're using IAS)? Using LDAP authentication will allow you to restrict access via groups in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Sep 2009 17:23:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-vpn-asa-radius-and-connection-profiles/m-p/1289499#M388468</guid>
      <dc:creator>sbader48220</dc:creator>
      <dc:date>2009-09-21T17:23:23Z</dc:date>
    </item>
  </channel>
</rss>

