<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA VPN Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874857#M408292</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've had it working just doesn't go by group.  I'll keep digging thanks for the reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Nov 2007 22:18:33 GMT</pubDate>
    <dc:creator>gates1150</dc:creator>
    <dc:date>2007-11-21T22:18:33Z</dc:date>
    <item>
      <title>ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874851#M408286</link>
      <description>&lt;P&gt;I'm setting up a new ASA with VPN access and am trying to decide which authentication method to use LDAP or RADIUS.  I was wondering if there were any pros or cons to either way.  I'm trying to control access by Active Directory Group.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874851#M408286</guid>
      <dc:creator>gates1150</dc:creator>
      <dc:date>2019-03-10T22:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874852#M408287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not sure about any advantages/disadvantages to either but since you are authenticating against AD it would be simple for you to set up IAS on your domain controller. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874852#M408287</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-06T18:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874853#M408288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From my own opinion, the advantage of using AD as the authentication server is that, passwords can expire after a number of days. Well, it still really depends on the password policy of your domain.  That is one of the disadvantage of using Cisco ACS, the password won't expire after few days or months.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2007 14:43:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874853#M408288</guid>
      <dc:creator>jpl861</dc:creator>
      <dc:date>2007-11-07T14:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874854#M408289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am working with AD and testing out both the IAS RADIUS and the LDAP for SSL VPN, and there are a few differences.&lt;/P&gt;&lt;P&gt;SSL VPN in clientless mode allows for password management, so the end-user can update their pw from the login page.&lt;/P&gt;&lt;P&gt;LDAP allows you to notify the user X number of days before the pw expires and allow them to change it (# of days is configurable; secure LDAP is required, but not hard to set up).&lt;/P&gt;&lt;P&gt;RADIUS, again per the documentation, can only notify the user, and allow them to change the password, when it expires.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also trying to configure framed-ip-addresses, so that as users log in via the SSL VPN Client (AnyConnect), they will always get the same IP address.  I can get the framed IP to work with RADIUS, but not LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LDAP also works very nicely with DAP in the SSL VPN, too, which allows you to add functionality to the profile assigned to a user a login based on AD group membership.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are a few of the differences that I have found, so far.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 21:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874854#M408289</guid>
      <dc:creator>lambiase</dc:creator>
      <dc:date>2007-11-21T21:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874855#M408290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you control access by group with LDAP?  I was able to get it to work but haven't gotten it working by AD group. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 21:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874855#M408290</guid>
      <dc:creator>gates1150</dc:creator>
      <dc:date>2007-11-21T21:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874856#M408291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This seems to be doable, but I have not done it here (I am running SSL VPN and using DAP, which certainly works with AD groups).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like you configure an LDAP attribute map to the IETF-Radius-Class, (and then map your AD groups to ASA groups if the group names do not already match).  See page 13-15 and Appendix E in the CLI Config Guide.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 22:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874856#M408291</guid>
      <dc:creator>lambiase</dc:creator>
      <dc:date>2007-11-21T22:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874857#M408292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've had it working just doesn't go by group.  I'll keep digging thanks for the reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 22:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874857#M408292</guid>
      <dc:creator>gates1150</dc:creator>
      <dc:date>2007-11-21T22:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874858#M408293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am in the same situation as you. I am currently using IAS on my Windows 2003 DC to authenticate remote users (IPSec VPN tunnel)via the Radius protocol. I was able to sucessfully authenticate users against Active Directory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, the real issue is that we have a lot of remote users and they need to be able to change their Domain Passwords if they expire, or get notifications when their passwords are about to expire.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was confused on what you posted: " RADIUS, again per the documentation, can only notify the user, and allow them to change the password, when it expires."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using the RADIUS protocol over an IPSec VPN tunnel, are remote users able to change their passwords? Or only get notified when the password expires ? Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2008 18:03:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874858#M408293</guid>
      <dc:creator>najeebsyed2</dc:creator>
      <dc:date>2008-01-07T18:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874859#M408294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Same here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am using IAS and PIX and need my users to be able to be notified and allowed to change there password in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 14:52:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874859#M408294</guid>
      <dc:creator>boschrexroth</dc:creator>
      <dc:date>2008-01-15T14:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874860#M408295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think you can do it with a PIX.  You have to be on an ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:00:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874860#M408295</guid>
      <dc:creator>gates1150</dc:creator>
      <dc:date>2008-01-15T15:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874861#M408296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check the documentation for the version of PIX you are running. I don't believe what you are trying to do is possible with a PIX.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874861#M408296</guid>
      <dc:creator>najeebsyed2</dc:creator>
      <dc:date>2008-01-15T15:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874862#M408297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you look in the ASDM under your connection profile for your Remote Access users.  Look under Advanced there's an option "Enable notification upon password expiration to allow user to change password". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's the only place I can see to try and make it work. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874862#M408297</guid>
      <dc:creator>gates1150</dc:creator>
      <dc:date>2008-01-15T15:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874863#M408298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have read posts that say that using RADIUS it is NOT possible to use the password managment feature. Is that true?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874863#M408298</guid>
      <dc:creator>najeebsyed2</dc:creator>
      <dc:date>2008-01-15T15:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874864#M408299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know I haven't tried to enable the feature.  Are you running the latest ASA version?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874864#M408299</guid>
      <dc:creator>gates1150</dc:creator>
      <dc:date>2008-01-15T15:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874865#M408300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My ASA is running 7.2(2). If you run across any documentation regarding password managment via Radius, please share. I've come across LDAP Authorization that allows this, but not RADIUS. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874865#M408300</guid>
      <dc:creator>najeebsyed2</dc:creator>
      <dc:date>2008-01-15T15:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874866#M408301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm on 8.02.  I'll pass it along if I find anything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874866#M408301</guid>
      <dc:creator>gates1150</dc:creator>
      <dc:date>2008-01-15T15:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874867#M408302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a bunch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 15:33:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874867#M408302</guid>
      <dc:creator>najeebsyed2</dc:creator>
      <dc:date>2008-01-15T15:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874868#M408303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Password-management will work with Radius and LDAP. When using radius you will not be notified a certain number of days before password expiration, but you will be notified when it expires and will be able to change it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 16:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874868#M408303</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-01-15T16:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874869#M408304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When my client connects to our PIX then he is prompted for his AD username and password.  If the password has expired it just keeps asking him for his password and then locks his account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What have I do wrong or maybe better how do you properly set this up on a radius server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 16:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874869#M408304</guid>
      <dc:creator>boschrexroth</dc:creator>
      <dc:date>2008-01-15T16:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874870#M408306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the command you are looking for. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;password-management &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/docs/security/asa/asa71/command/reference/p_711.html#wp1643267" target="_blank"&gt;http://cisco.com/en/US/docs/security/asa/asa71/command/reference/p_711.html#wp1643267&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once enabled on the firewall all you have to do is make sure you are allowing mschap v2 in your remote access policy on IAS server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the user connects to the vpn and their password has expired, it will prompt them to change their password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config)# tunnel-group group-name general-attributes &lt;/P&gt;&lt;P&gt;hostname(config-tunnel-general)# password-management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edit: There is also a checkbox in the remote access policy in IAS to "allow user to change password after it expires"...check it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 16:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-authentication/m-p/874870#M408306</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-01-15T16:15:58Z</dc:date>
    </item>
  </channel>
</rss>

