<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP Attribute Wildcard - IPSEC not WebVPN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040062#M419163</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup authentication using LDAP and it is working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to restrict only users that are member of a particular Security group (VPN Users) to be able to VPN in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created an LDAP attribute map (vpnmap) that checks if the user is a member of the required Security Group and if correct assigns a group policy (XXXvpntunnel) to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if a user is not a member of the group, the ldap attribute map does not assign the above group policy to it, but the user can still VPN in and when I do a check of the group policy being used via sh vpn-sessiondb detail remote, it shows me the same group policy XXXvpntunnel being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created another group policy called XXXvpntunneldeny with ipsec sessions set to 0, but how do I assign this group profile to users who are not a memberOf VPN Users, so that they cannot VPN in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also tested by adding SamAccountname in the attribute map and value "Administrator" and group-policy "xxxvpntunneldeny" and it stops Administrator from getting in via VPN, but I want to be able to use a wildcard to prevent all users not in the Security Group VPN Users from connecting via VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions on the best way to restrict users not part of the VPN Users group in AD from being able to VPN in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 23:10:43 GMT</pubDate>
    <dc:creator>boscom</dc:creator>
    <dc:date>2019-03-10T23:10:43Z</dc:date>
    <item>
      <title>LDAP Attribute Wildcard - IPSEC not WebVPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040062#M419163</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup authentication using LDAP and it is working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to restrict only users that are member of a particular Security group (VPN Users) to be able to VPN in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created an LDAP attribute map (vpnmap) that checks if the user is a member of the required Security Group and if correct assigns a group policy (XXXvpntunnel) to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if a user is not a member of the group, the ldap attribute map does not assign the above group policy to it, but the user can still VPN in and when I do a check of the group policy being used via sh vpn-sessiondb detail remote, it shows me the same group policy XXXvpntunnel being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created another group policy called XXXvpntunneldeny with ipsec sessions set to 0, but how do I assign this group profile to users who are not a memberOf VPN Users, so that they cannot VPN in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also tested by adding SamAccountname in the attribute map and value "Administrator" and group-policy "xxxvpntunneldeny" and it stops Administrator from getting in via VPN, but I want to be able to use a wildcard to prevent all users not in the Security Group VPN Users from connecting via VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions on the best way to restrict users not part of the VPN Users group in AD from being able to VPN in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040062#M419163</guid>
      <dc:creator>boscom</dc:creator>
      <dc:date>2019-03-10T23:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Attribute Wildcard - IPSEC not WebVPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040063#M419164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When a user authenticates to the security appliance, the security appliance, in turn, authenticates to the server and uses the LDAP protocol to retrieve the record for that user. The record consists of LDAP attributes associated with fields displayed on the user interface of the server. Each attribute retrieved includes a value that was entered by the admin who updates the user records. &lt;/P&gt;&lt;P&gt;Refer the following url for more information on Active Directory Policies Using LDAP Attribute Maps:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/selected_topics/enforce_AD.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/selected_topics/enforce_AD.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/extsvr.html#wp1583169" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/extsvr.html#wp1583169&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2008 18:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040063#M419164</guid>
      <dc:creator>hadbou</dc:creator>
      <dc:date>2008-11-15T18:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Attribute Wildcard - IPSEC not WebVPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040064#M419165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;in their AD account settings set their dial in permissions to not allowed.&lt;/P&gt;&lt;P&gt;then under your ldap attribute map, add something like:&lt;/P&gt;&lt;P&gt;  map-value msNPAllowDialin "FALSE" NOACCESS&lt;/P&gt;&lt;P&gt;and then:&lt;/P&gt;&lt;P&gt;group-policy NOACCESS internal&lt;/P&gt;&lt;P&gt;group-policy NOACCESS attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or use your own group-policy name.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Nov 2008 14:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040064#M419165</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-11-18T14:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Attribute Wildcard - IPSEC not WebVPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040065#M419166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hadbou.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply and the links. The first one is quite detailed and I will use it to refine what I have done as indicated below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created a new AD group called VPN Deny and added users that I do not have VPN access to this group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then check the memberOf "VPN Deny" attribute and assign them to a group-policy that has vpn-simulataneous logins as 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will work on checking alternate attribute values as per the link you sent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Nov 2008 23:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040065#M419166</guid>
      <dc:creator>boscom</dc:creator>
      <dc:date>2008-11-18T23:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Attribute Wildcard - IPSEC not WebVPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040066#M419167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply, srue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried this but for some reason, but it was not checking for this attribute. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had debug ldap 255 running but could not see any matches to msNPAllowDialin. Maybe I did not configure the attribute map correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created a new AD group called VPN Deny and added users that I do not have VPN access to this group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then check the memberOf "VPN Deny" attribute and assign them to a group-policy that has vpn-simulataneous logins as 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only problem with this, is all users that need to be prevented from using VPN access needs to added to the VPN Denu User group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hadbou has sent me a couple of links, the first of which is more detailed on LDAP attribute mapping, which I will go through and try a better solution including mapping to msNPAllowDialin and see whcih works best.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Nov 2008 23:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040066#M419167</guid>
      <dc:creator>boscom</dc:creator>
      <dc:date>2008-11-18T23:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Attribute Wildcard - IPSEC not WebVPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040067#M419168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here's a good link &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change the default group-policy to vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;apply a specific vpn-simultaneous-logins to the new group-policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy POLICY attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i was able to get this working.&lt;/P&gt;&lt;P&gt;forget about mapping to the dialin permissions.  not needed here.&lt;/P&gt;&lt;P&gt;if someone doesn't get mapped to one of your manually created group-policies, only the default group policy applies, and they can't log in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2008 16:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040067#M419168</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-11-19T16:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Attribute Wildcard - IPSEC not WebVPN</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040068#M419169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was the issue I was having in the first place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;People not getting mapped to xxxvpntunnel via the ldap attribute map, we still able to login using xxxvpntunnel group policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I set the default policy to vpn-simultaneous-logins 0, I could not get in even if the ldap attribute mapped me to xxxvpntunnel.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;I think I have got the group and default policies all interconnected. Will clear the config and re-start and am sure it will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2008 03:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-attribute-wildcard-ipsec-not-webvpn/m-p/1040068#M419169</guid>
      <dc:creator>boscom</dc:creator>
      <dc:date>2008-11-20T03:42:58Z</dc:date>
    </item>
  </channel>
</rss>

