<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Controlling VPN access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939961#M396392</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for the instructions. I am a complete CLI newbie but I see if I am going to be doing any advanced config or getting help from the forums I am going to have to learn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So while I am not exactly sure how to implement this yet I am going to go through slowly and figure it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 15 Jun 2008 15:41:19 GMT</pubDate>
    <dc:creator>marty.finn</dc:creator>
    <dc:date>2008-06-15T15:41:19Z</dc:date>
    <item>
      <title>Controlling VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939957#M396388</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;We have a Cisco ASA 5510 and ACS 4.1 configured and the users can VPN into ASA and are authenticated by the ACS which is mapped to Active Directory and all works well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now need to know how to configure VPN access to allow certain groups to have access only to certain IPs or IP ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please any help or links appreciated.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939957#M396388</guid>
      <dc:creator>marty.finn</dc:creator>
      <dc:date>2019-03-10T22:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939958#M396389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use the command "vpn-filter value YOUR-ACL-NAME" under your group-policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create the Access-list with the ip/ports you want them to access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy TEST internal&lt;/P&gt;&lt;P&gt;group-policy TEST attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.1.1.60&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value TEST_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value TEST.com&lt;/P&gt;&lt;P&gt; vpn-filter value TEST_ACL&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list TEST-ACL  extended permit ip 10.1.1.0 255.255.255.0 10.1.3.3 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow access to any TCP ou UDP ports on host 10.1.3.3 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 19:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939958#M396389</guid>
      <dc:creator>dominic.bilodeau</dc:creator>
      <dc:date>2008-06-11T19:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939959#M396390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You.&lt;/P&gt;&lt;P&gt;I was able to set access through different tunnel groups on the ASA.  This will require different configs in the Cisco VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to have a single tunnel group and then somehow set ACL that are tied to different groups in Active Directory?  That way all Cisco VPN clients are configured the same way but based on AD group would define access control?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 21:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939959#M396390</guid>
      <dc:creator>marty.finn</dc:creator>
      <dc:date>2008-06-11T21:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939960#M396391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it's possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using one tunnel-group and many group-policy that matches some Windows Group in AD.  So all I have to do is assign a particular windows user to a group to give him/her VPN access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First: Specify a ldap-attribute-map under your aaa-server section. Also, you will need a user account with at least domain user rights in your domain (in my example the user is VPN-LDAP-User)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server VPN_AUTHOR protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server VPN_AUTHOR (inside) host YOUR-LDAP-SERVER-IP&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=your_domain,DC=com&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password (VPN-LDAP-User's password in AD)&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=VPN-LDAP-User,CN=Users,DC=your_domain,DC=com server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map Map_Groups_VPN&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; Secondly:  Map The AD group to a group Policy on your Pix/ASA&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; ldap attribute-map Map_Groups_VPN&lt;/P&gt;&lt;P&gt;  map-name  memberOf cVPN3000-IETF-Radius-Class&lt;/P&gt;&lt;P&gt;  map-value memberOf CN=VPNGroupA,OU=VPN_Acces,OU=SECURITY,DC=your_domain,DC=com GroupA&lt;/P&gt;&lt;P&gt;  map-value memberOf CN=VPNGroupB,OU=VPN_Acces,OU=SECURITY,DC=your_domain,DC=com GroupB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example,if user john is member of Windows Group "VPNGroupA", he will be mapped to group-policy GroupA on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you create the GroupA policy similar to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy GroupA internal&lt;/P&gt;&lt;P&gt;group-policy GroupA attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.11 192.168.0.6&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;  split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; default-domain value your_domain.com&lt;/P&gt;&lt;P&gt; address-pools value Pool_Groupa&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Please rate if this helps.  It's hard to find good how-to for this so I'm glad to give you the detailed steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NB: Use "Debug ldap 255" to see how your LDAP query and mapping goes and seek for errors."&lt;/P&gt;&lt;P&gt;Also, make sure you have no spaces in your OU name under AD, because the ASA will not accept your map-value command (I had to figure it out after 2 hours of troubleshooting because I used "VPN Access" originallly)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 00:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939960#M396391</guid>
      <dc:creator>dominic.bilodeau</dc:creator>
      <dc:date>2008-06-12T00:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939961#M396392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for the instructions. I am a complete CLI newbie but I see if I am going to be doing any advanced config or getting help from the forums I am going to have to learn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So while I am not exactly sure how to implement this yet I am going to go through slowly and figure it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jun 2008 15:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939961#M396392</guid>
      <dc:creator>marty.finn</dc:creator>
      <dc:date>2008-06-15T15:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939962#M396393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I would appreciate to receive some configuration steps on ACS to fulfill the following requirement and hope you can help me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS Groups&lt;/P&gt;&lt;P&gt;Netadmin - need telnet/ssh/vpn/wireless&lt;/P&gt;&lt;P&gt;wireless - only wireless authentication&lt;/P&gt;&lt;P&gt;vpn - only vpn authenticaiton&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to map the above ACS groups to one/or many AD groups and restric access as stated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also please note that one user can be belongs to all three groups in ACS/AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Oct 2009 20:44:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939962#M396393</guid>
      <dc:creator>pemasirid</dc:creator>
      <dc:date>2009-10-24T20:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Controlling VPN access</title>
      <link>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939963#M396394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have been looking for some time to find exactly these instructions. They worked for me the very first time!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Nov 2009 20:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/controlling-vpn-access/m-p/939963#M396394</guid>
      <dc:creator>jerry.ely</dc:creator>
      <dc:date>2009-11-07T20:18:59Z</dc:date>
    </item>
  </channel>
</rss>

