<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AnyConnect and ACS5.1 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631277#M392929</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex, i'm struggling with a situation like this, would you please suggest me which radius attribute&amp;nbsp; i have to use to distinguish which webvpn profile is the user using in the service selection rule, or how did you accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance &lt;/P&gt;&lt;P&gt;Oscar.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 26 Aug 2012 16:33:13 GMT</pubDate>
    <dc:creator>ochalmers</dc:creator>
    <dc:date>2012-08-26T16:33:13Z</dc:date>
    <item>
      <title>AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631270#M392830</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;i'am having a problem with following setup. Cisco ASA 5520 with ACS 5.1. I'd like to have multiple SSL VPN Client Connection Profiles which is already working fine. Each Profile should use an idividual Service Selection Rule in the ACS.&lt;/P&gt;&lt;P&gt;I tried to use follwoing Attribute "CVPN3000/ASA/PIX7.x-SVC-Profile-Name" in the Service Selection Policy to define an individual service. But it's not working.&lt;/P&gt;&lt;P&gt;How can i make sure that this attribute is sent from the ASA to the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for you feedback&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alex&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631270#M392830</guid>
      <dc:creator>alex.dersch</dc:creator>
      <dc:date>2019-03-11T00:45:22Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631271#M392840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try "debug radius all" when you are doing the test and you should see a dump of the access-accept response and all the attributes that are sent back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there you can determine whether the ACS or the ASA is mis-behaving.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 16:13:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631271#M392840</guid>
      <dc:creator>Jay Young</dc:creator>
      <dc:date>2011-02-01T16:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631272#M392848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jay thanks for your reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i collect the debug on the firewal, it seems for me, that the ASA sends the attributes but the ACS doesn't understand them. &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/confused.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;any idea how to teach the ACS to understand the parameters?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RADIUS_REQUEST&lt;BR /&gt;radius.c: rad_mkpkt&lt;BR /&gt;rad_mkpkt: ip:source-ip=172.24.7.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RADIUS packet decode (authentication request)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-6-113004: AAA user authentication Successful : server =&amp;nbsp; 10.0.128.3 : user = dersa&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-6-113009: AAA retrieved default group policy (FroxWebPolicy) for user = dersa&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-6-113008: AAA transaction status ACCEPT : user = dersa&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-7-734003: DAP: User dersa, Addr 172.24.7.11: Session Attribute aaa.radius["1"]["1"] = dersa&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-7-734003: DAP: User dersa, Addr 172.24.7.11: Session Attribute aaa.radius["25"]["1"] = CACS:bsacs01/85987645/26&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-7-734003: DAP: User dersa, Addr 172.24.7.11: Session Attribute aaa.cisco.grouppolicy = FroxWebPolicy&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-7-734003: DAP: User dersa, Addr 172.24.7.11: Session Attribute aaa.cisco.username = dersa&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-7-734003: DAP: User dersa, Addr 172.24.7.11: Session Attribute aaa.cisco.tunnelgroup = FROX_SSLVPN&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-6-734001: DAP: User dersa, Addr 172.24.7.11, Connection Clientless: The following DAP records were selected for this connection: DfltAccessPolicy&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-6-716001: Group &lt;FROXWEBPOLICY&gt; User &lt;DERSA&gt; IP &amp;lt;172.24.7.11&amp;gt; WebVPN session started.&lt;BR /&gt;Feb 02 2011 04:32:36: %ASA-6-716038: Group &lt;FROXWEBPOLICY&gt; User &lt;DERSA&gt; IP &amp;lt;172.24.7.11&amp;gt; Authentication: successful, Session Type: WebVPN.&lt;BR /&gt;Raw packet data (length = 134).....&lt;BR /&gt;01 24 00 86 dc e5 ba 6b c8 61 86 47 74 9d 12 e3&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; .$.....k.a.Gt...&lt;BR /&gt;e0 99 5e 3f 01 07 64 65 72 73 61 02 12 96 1b c9&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; ..^?..dersa.....&lt;BR /&gt;05 0c 75 86 97 05 46 f2 9a ed f3 08 7a 05 06 00&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; ..u...F.....z...&lt;BR /&gt;01 90 00 1e 0d 31 37 32 2e 31 36 2e 32 2e 32 35&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; .....172.16.2.25&lt;BR /&gt;1f 0d 31 37 32 2e 32 34 2e 37 2e 31 31 3d 06 00&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; ..172.24.7.11=..&lt;BR /&gt;00 00 05 42 0d 31 37 32 2e 32 34 2e 37 2e 31 31&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; ...B.172.24.7.11&lt;BR /&gt;04 06 0a 00 80 02 1a 20 00 00 00 09 01 1a 69 70&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; ....... ......ip&lt;BR /&gt;3a 73 6f 75 72 63 65 2d 69 70 3d 31 37 32 2e 32&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; :source-ip=172.2&lt;BR /&gt;34 2e 37 2e 31 31&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 4.7.11&lt;/DERSA&gt;&lt;/FROXWEBPOLICY&gt;&lt;/DERSA&gt;&lt;/FROXWEBPOLICY&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Parsed packet data.....&lt;BR /&gt;Radius: Code = 1 (0x01)&lt;BR /&gt;Radius: Identifier = 36 (0x24)&lt;BR /&gt;Radius: Length = 134 (0x0086)&lt;BR /&gt;Radius: Vector: DCE5BA6BC8618647749D12E3E0995E3F&lt;BR /&gt;Radius: Type = 1 (0x01) User-Name&lt;BR /&gt;Radius: Length = 7 (0x07)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;64 65 72 73 61&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; dersa&lt;BR /&gt;Radius: Type = 2 (0x02) User-Password&lt;BR /&gt;Radius: Length = 18 (0x12)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;96 1b c9 05 0c 75 86 97 05 46 f2 9a ed f3 08 7a&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; .....u...F.....z&lt;BR /&gt;Radius: Type = 5 (0x05) NAS-Port&lt;BR /&gt;Radius: Length = 6 (0x06)&lt;BR /&gt;Radius: Value (Hex) = 0x19000&lt;BR /&gt;Radius: Type = 30 (0x1E) Called-Station-Id&lt;BR /&gt;Radius: Length = 13 (0x0D)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;31 37 32 2e 31 36 2e 32 2e 32 35&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 172.16.2.25&lt;BR /&gt;Radius: Type = 31 (0x1F) Calling-Station-Id&lt;BR /&gt;Radius: Length = 13 (0x0D)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;31 37 32 2e 32 34 2e 37 2e 31 31&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 172.24.7.11&lt;BR /&gt;Radius: Type = 61 (0x3D) NAS-Port-Type&lt;BR /&gt;Radius: Length = 6 (0x06)&lt;BR /&gt;Radius: Value (Hex) = 0x5&lt;BR /&gt;Radius: Type = 66 (0x42) Tunnel-Client-Endpoint&lt;BR /&gt;Radius: Length = 13 (0x0D)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;31 37 32 2e 32 34 2e 37 2e 31 31&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 172.24.7.11&lt;BR /&gt;Radius: Type = 4 (0x04) NAS-IP-Address&lt;BR /&gt;Radius: Length = 6 (0x06)&lt;BR /&gt;Radius: Value (IP Address) = 10.0.128.2 (0x0A008002)&lt;BR /&gt;Radius: Type = 26 (0x1A) Vendor-Specific&lt;BR /&gt;Radius: Length = 32 (0x20)&lt;BR /&gt;Radius: Vendor ID = 9 (0x00000009)&lt;BR /&gt;Radius: Type = 1 (0x01) Cisco-AV-pair&lt;BR /&gt;Radius: Length = 26 (0x1A)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;69 70 3a 73 6f 75 72 63 65 2d 69 70 3d 31 37 32&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; ip:source-ip=172&lt;BR /&gt;2e 32 34 2e 37 2e 31 31&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; .24.7.11&lt;BR /&gt;send pkt 10.0.128.3/1645&lt;BR /&gt;rip 0x739f97d8 state 7 id 36&lt;BR /&gt;rad_vrfy() : response message verified&lt;BR /&gt;rip 0x739fed28&lt;BR /&gt; : chall_state ''&lt;BR /&gt; : state 0x7&lt;BR /&gt; : timer 0x0&lt;BR /&gt; : reqauth:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc e5 ba 6b c8 61 86 47 74 9d 12 e3 e0 99 5e 3f&lt;BR /&gt; : info 0x44&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session_id 0x44&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; request_id 0x24&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user 'dersa'&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; response '***'&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; app 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reason 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; skey 'B3048*a1'&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sip 10.0.128.3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RADIUS packet decode (response)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;BR /&gt;Raw packet data (length = 53).....&lt;BR /&gt;02 24 00 35 c2 9e 8f 3e 6c 0b 86 38 2d 43 01 e2&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; .$.5...&amp;gt;l..8-C..&lt;BR /&gt;15 1c 51 c2 01 07 64 65 72 73 61 19 1a 43 41 43&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; ..Q...dersa..CAC&lt;BR /&gt;53 3a 62 73 61 63 73 30 31 2f 38 35 39 38 37 36&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; S:bsacs01/859876&lt;BR /&gt;34 35 2f 32 36&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 45/26&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Parsed packet data.....&lt;BR /&gt;Radius: Code = 2 (0x02)&lt;BR /&gt;Radius: Identifier = 36 (0x24)&lt;BR /&gt;Radius: Length = 53 (0x0035)&lt;BR /&gt;Radius: Vector: C29E8F3E6C0B86382D4301E2151C51C2&lt;BR /&gt;Radius: Type = 1 (0x01) User-Name&lt;BR /&gt;Radius: Length = 7 (0x07)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;64 65 72 73 61&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; dersa&lt;BR /&gt;Radius: Type = 25 (0x19) Class&lt;BR /&gt;Radius: Length = 26 (0x1A)&lt;BR /&gt;Radius: Value (String) =&lt;BR /&gt;43 41 43 53 3a 62 73 61 63 73 30 31 2f 38 35 39&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; CACS:bsacs01/859&lt;BR /&gt;38 37 36 34 35 2f 32 36&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 87645/26&lt;BR /&gt;rad_procpkt: ACCEPT&lt;BR /&gt;RADIUS_ACCESS_ACCEPT: normal termination&lt;BR /&gt;RADIUS_DELETE&lt;BR /&gt;remove_req 0x739f97d8 session 0x44 id 36&lt;BR /&gt;free_rip 0x739f97d8&lt;BR /&gt;radius: send queue empty&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 03:52:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631272#M392848</guid>
      <dc:creator>alex.dersch</dc:creator>
      <dc:date>2011-02-02T03:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631273#M392867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may want to move this thread over to AAA region in the security section to see if anyone else has an idea to configure the ACS device (sorry not my speciality).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 14:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631273#M392867</guid>
      <dc:creator>Jay Young</dc:creator>
      <dc:date>2011-02-02T14:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631274#M392881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i moved it, thanks for efforts. i checked the the ACS logs, there are no VSA reaching the ACS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 15:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631274#M392881</guid>
      <dc:creator>alex.dersch</dc:creator>
      <dc:date>2011-02-02T15:05:06Z</dc:date>
    </item>
    <item>
      <title>AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631275#M392893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you paste the link where you moved it to?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2012 07:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631275#M392893</guid>
      <dc:creator>Micheal Swart</dc:creator>
      <dc:date>2012-03-09T07:17:50Z</dc:date>
    </item>
    <item>
      <title>AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631276#M392909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ooh Micheal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this was a year ago, i believe i didn't move it. But I got it to run as needed. Do you have a particular question maybe I can help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;alex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2012 10:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631276#M392909</guid>
      <dc:creator>alex.dersch</dc:creator>
      <dc:date>2012-03-09T10:17:07Z</dc:date>
    </item>
    <item>
      <title>AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631277#M392929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex, i'm struggling with a situation like this, would you please suggest me which radius attribute&amp;nbsp; i have to use to distinguish which webvpn profile is the user using in the service selection rule, or how did you accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance &lt;/P&gt;&lt;P&gt;Oscar.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Aug 2012 16:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631277#M392929</guid>
      <dc:creator>ochalmers</dc:creator>
      <dc:date>2012-08-26T16:33:13Z</dc:date>
    </item>
    <item>
      <title>AnyConnect and ACS5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631278#M392944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oscar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if this will help, but it seems the radius attribute is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"CVPN3000/ASA/PIX7.x-SVC-Profile-Name" or "SVC-Profiles"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which translates to radius attribute number 128 and vendor ID 3076. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html#wp1802187"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html#wp1802187&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 19:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-acs5-1/m-p/1631278#M392944</guid>
      <dc:creator>Jay Young</dc:creator>
      <dc:date>2012-09-05T19:05:37Z</dc:date>
    </item>
  </channel>
</rss>

