<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic multiple remote vpn groups, multiple active directory groups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/multiple-remote-vpn-groups-multiple-active-directory-groups/m-p/1209346#M395335</link>
    <description>&lt;P&gt;We are running PIX 7.2 on a PIX 525. Is is possible to somehow make sure users can only log into one vpn group based on their AD security group. We are currently using IAS to authenticate users but any user that has VPN rights in the AD can log into any remote VPN group on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I want to define several security groups in the AD and only users in security group "manager" can use the remote tunnel group "manger", etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 23:17:08 GMT</pubDate>
    <dc:creator>dylan.ebner</dc:creator>
    <dc:date>2019-03-10T23:17:08Z</dc:date>
    <item>
      <title>multiple remote vpn groups, multiple active directory groups</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-remote-vpn-groups-multiple-active-directory-groups/m-p/1209346#M395335</link>
      <description>&lt;P&gt;We are running PIX 7.2 on a PIX 525. Is is possible to somehow make sure users can only log into one vpn group based on their AD security group. We are currently using IAS to authenticate users but any user that has VPN rights in the AD can log into any remote VPN group on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I want to define several security groups in the AD and only users in security group "manager" can use the remote tunnel group "manger", etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-remote-vpn-groups-multiple-active-directory-groups/m-p/1209346#M395335</guid>
      <dc:creator>dylan.ebner</dc:creator>
      <dc:date>2019-03-10T23:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: multiple remote vpn groups, multiple active directory groups</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-remote-vpn-groups-multiple-active-directory-groups/m-p/1209347#M395336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think it is possible.In the  example given in the below URL, users who are allowed â&amp;#128;&amp;#156;dial-inâ&amp;#128;&amp;#157; access in the AD/LDAP server are mapped to the â&amp;#128;&amp;#156;ALLOWACCESSâ&amp;#128;&amp;#157; group policy, and the users who are not allowed â&amp;#128;&amp;#156;dial-inâ&amp;#128;&amp;#157; access are assigned to the â&amp;#128;&amp;#156;NOACCESSâ&amp;#128;&amp;#157; group policy on the ASA. The â&amp;#128;&amp;#156;NOACCESSâ&amp;#128;&amp;#157; group policy has the number of allowed VPN sessions set to 0, which causes the user connection to fail.You may refer this example configuration for your network.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jan 2009 16:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-remote-vpn-groups-multiple-active-directory-groups/m-p/1209347#M395336</guid>
      <dc:creator>vmoopeung</dc:creator>
      <dc:date>2009-01-22T16:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: multiple remote vpn groups, multiple active directory groups</title>
      <link>https://community.cisco.com/t5/network-access-control/multiple-remote-vpn-groups-multiple-active-directory-groups/m-p/1209348#M395337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is how it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say that you have three different groups on AD for NetworkAdmin, RouterAdmin,&lt;/P&gt;&lt;P&gt;Wireless.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go to external user database ==Database Group Mappings==Windows NT/2000==select the domain&lt;/P&gt;&lt;P&gt;to which you are authenticating==Add mapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Select the AD group NetworkAdmin and map it to ciscosecure group 1 select the AD group RouterAdmin and map it to ciscosecure group 2&lt;/P&gt;&lt;P&gt;select the AD group Wireless and map it to ciscosecure group 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group mappings work in the order in which they are defined, first configured mapping is&lt;/P&gt;&lt;P&gt;looked upon first then second, third and so on. If a user is in AD group NetworkAdmin and&lt;/P&gt;&lt;P&gt;that is mapped to ACS group 1 and it is first configured mapping it will be looked for&lt;/P&gt;&lt;P&gt;FIRST (If a user exists in NetworkAdmin group it will always be mapped to ciscosecure&lt;/P&gt;&lt;P&gt;group 1 and NO further Mappings for this user is checked and user is authenticated or&lt;/P&gt;&lt;P&gt;rejected)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario: if you have a user called cisco, in NetworkAdmin group, cisco1 in RouterAdmin&lt;/P&gt;&lt;P&gt;group, and cisco2 in Wireless. They will always be dynamically mapped to ACS group 1, 2&lt;/P&gt;&lt;P&gt;and 3 respectively as per above mappings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the mappings on the passed authentications for users as to what group are&lt;/P&gt;&lt;P&gt;they getting mapped to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SCENARIO:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if you want a NetworkAdmin user to authenticate to NetworkAdmin devices and not&lt;/P&gt;&lt;P&gt;wireless or RouterAdmin devices you would need to apply NARs to group 1 because&lt;/P&gt;&lt;P&gt;NetworkAdmin users are connecting to that group. Which you will permit Access on group&lt;/P&gt;&lt;P&gt;basis to a particular NetworkAdmin NDG or individual NetworkAdmin NAS device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are applying NARs for Wireless or VPN devices.. you would need to configure both IP&lt;/P&gt;&lt;P&gt;based AND CLI/DNIS based together because NARs were originally designed for cisco IOS for&lt;/P&gt;&lt;P&gt;routers and switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMPORTANT: If a user successfully authenticates to AD database once, its username is cached on the ACS database (NOT password) the only way to remove the previously cached username is to go to usersetup find that user and delete it manually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS will not support the following configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*An active directory user that is a member of 3 AD groups (group A, B and C) *Those 3&lt;/P&gt;&lt;P&gt;groups are mapped within ACS as follows Group1-&amp;gt;A,Group2-&amp;gt;B and Group3-&amp;gt;C.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*The user is in all 3 groups however he will always be authenticated by group 1 because&lt;/P&gt;&lt;P&gt;that is the first group he appears in, even if there is a NAR configured assigning&lt;/P&gt;&lt;P&gt;specific AAA clients to the group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However there if your mappings are in below order...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT Groups ACS groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A,B,C =============&amp;gt; Group 1&lt;/P&gt;&lt;P&gt;A =============&amp;gt; Group 2&lt;/P&gt;&lt;P&gt;B =============&amp;gt; Group 3&lt;/P&gt;&lt;P&gt;C =============&amp;gt; Group 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can create a DIFFERENT rule for the users in A,B,C by configuring the NARs in group1.&lt;/P&gt;&lt;P&gt;This rule WILL apply for the use ONLY if he is present in ALL three groups (A,B and C).&lt;/P&gt;&lt;P&gt;You can create a rule for users in group A (Group 2)&lt;/P&gt;&lt;P&gt;You can create a rule for users in group B (Group 3)&lt;/P&gt;&lt;P&gt;You can create a rule for users in group C (Group 4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here I also enclose the links connected to group mapping in the user guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group mapping order:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/qg.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/qg.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;#wp940485&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jan 2009 17:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/multiple-remote-vpn-groups-multiple-active-directory-groups/m-p/1209348#M395337</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-01-22T17:12:24Z</dc:date>
    </item>
  </channel>
</rss>

