<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vpn authentication and authorization using pix 7.2 and acs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632699#M421380</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to push attributes like client firewall, Split Tunneling Policy etc using attributes available under the RADIUS (VPN 3000/asa/pix 7.x+)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find all attributes under Interface configuration-&amp;gt;RADIUS (Cisco VPN 3000/ASA/PIX 7.x+)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So instead of using cisco av-pair (026/009/001) you need to use pre defined attributes like 026/3076/001.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 10 Mar 2007 15:04:12 GMT</pubDate>
    <dc:creator>Vivek Santuka</dc:creator>
    <dc:date>2007-03-10T15:04:12Z</dc:date>
    <item>
      <title>vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632692#M421364</link>
      <description>&lt;P&gt;hi , i am using a pix 7.2 and acs 3.2.. i want to perform remote access vpn authentication n authorization thrgh aaa using radius..i am abl to use it when i am using local group policy on pix, but i am nt able to do it using acs. i was trying to use cisco avpair to send the parameters but its nt happening.some body please tell me the steps to proceed .&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632692#M421364</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2019-03-10T22:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632693#M421365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What attributes are you trying to push ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does the aaa server get any hits when trying to authenticate ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 13:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632693#M421365</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-03-10T13:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632694#M421367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi vivek, i am successfully able to authenticate thrgh acs, and clients are also geting the ip address from the acs ip pool defined.. the problem is i was trying to push mode cfg attributes like ipsec:firewall=0, ipsec:pfs=1 etc.. thrgh cisco avpair radius attributes..but its nt happening&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 13:52:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632694#M421367</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-03-10T13:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632695#M421371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you put in your config here ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 13:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632695#M421371</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-03-10T13:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632696#M421375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi below is the desired config related to aaa on pix..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.16.10.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server Radius protocol radius&lt;/P&gt;&lt;P&gt;aaa-server Radius (inside) host 192.168.10.10&lt;/P&gt;&lt;P&gt;key xxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group ciscovpn type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group ciscovpn general-attributes&lt;/P&gt;&lt;P&gt; authentication-server-group Radius&lt;/P&gt;&lt;P&gt; authentication-server-group (inside) Radius&lt;/P&gt;&lt;P&gt; authorization-server-group Radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group ciscovpn ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 14:03:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632696#M421375</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-03-10T14:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632697#M421378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you haven't given any group-policy config, I am assuming you haven't configured any external group policy on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the following link :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6121/products_configuration_guide_chapter09186a00806a81e3.html#wp1133706" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6121/products_configuration_guide_chapter09186a00806a81e3.html#wp1133706&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have configured an external group on PIX, you can push required attributes from the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 14:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632697#M421378</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-03-10T14:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632698#M421379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi vivek , i had also tried that i had made one external group with name guest_group and a password of guest.. i mapped it into my tunnel-group. now in acs vpn users belong to guest_group only, in that i defined these cisco av pair attributes: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup Password = "guest", Service-Type = Outbound&lt;/P&gt;&lt;P&gt;ipsec:firewall=1&lt;/P&gt;&lt;P&gt;ipsec:include-local-lan=1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 14:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632698#M421379</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-03-10T14:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632699#M421380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to push attributes like client firewall, Split Tunneling Policy etc using attributes available under the RADIUS (VPN 3000/asa/pix 7.x+)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find all attributes under Interface configuration-&amp;gt;RADIUS (Cisco VPN 3000/ASA/PIX 7.x+)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So instead of using cisco av-pair (026/009/001) you need to use pre defined attributes like 026/3076/001.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 15:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632699#M421380</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-03-10T15:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632700#M421383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah thanks , for ur reply i found in the guide that for older versions of acs other than 4.0 , we have to push vpn conc attributes.. this is not applied for acs 4.0..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2007 15:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632700#M421383</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-03-10T15:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632701#M421386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am facing almost the same problem.&lt;/P&gt;&lt;P&gt;I need to authenticate my remote clients to ASA through ACS.&lt;/P&gt;&lt;P&gt;remote vpn is working fine using the local username, but authentication through ACS is not working with me.&lt;/P&gt;&lt;P&gt;I have added my asa as an aaa client in the ACS.&lt;/P&gt;&lt;P&gt;and my configs in the asa :&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server vpn host x.x.x.x&lt;/P&gt;&lt;P&gt; key ****&lt;/P&gt;&lt;P&gt;tunnel-group RemoteTunnel general-attributes&lt;/P&gt;&lt;P&gt;  authentication-server-group (inside) Radius&lt;/P&gt;&lt;P&gt;  authorization-server-group Radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any dieas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 07:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632701#M421386</guid>
      <dc:creator>loverprince</dc:creator>
      <dc:date>2007-03-12T07:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632702#M421389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi u have to attach external group policy to the tunnel group for doing the external acs authentication .. and the grp name shld be the username on the acs , bcz acs sees it as a username being to be the authenticated...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 08:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632702#M421389</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-03-12T08:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632703#M421391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you send an example?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 08:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632703#M421391</guid>
      <dc:creator>loverprince</dc:creator>
      <dc:date>2007-03-12T08:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632704#M421394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;External authentication does not require an external group. External group is required when you want to push group policies from the Radius Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can have an internal group forward auth request to the Radius server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to change your config as follows :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol radius&lt;/P&gt;&lt;P&gt;aaa-server vpn host x.x.x.x &lt;/P&gt;&lt;P&gt;tunnel-group RemoteTunnel general-attributes&lt;/P&gt;&lt;P&gt;authentication-server-group vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that you have added the ASA as a aaa client in ACS and set it to authenticate using RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 13:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632704#M421394</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-03-12T13:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632705#M421395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah he is right,,,for external authentication we need only to attach aaa server to the tunnel group..if we want to push some attributes to the client then we need to to do the above.. srry i thght that u want to have authorization also..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Mar 2007 04:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632705#M421395</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-03-13T04:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632706#M421396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please go on about the authorization on the pix.  I have a group ACS group DEB that I mapped to an NT group DEB.  I can authenticate to a pix using through VPN, if I am assigned that NT group, but I can also authenticate if I am not part of the DEB group using the same DEB.pcf.  I was hoping that the group mapping would be my solution, but that is not the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Elaborate a tad on the authorization setup on a pix please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 14:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632706#M421396</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2007-03-16T14:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632707#M421397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group mapping would really not be the answer for your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you will have to do is configure NARs on all groups of ACS which do not need access to the pix. On the NAR deny access to the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 15:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632707#M421397</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-03-16T15:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632708#M421398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And setting up the NAR will allow me to use group mapping as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am told that Dynamic ACLs are the way I need to go because if the person who is not on the NT Group logs into the VPN and is part of the default group, then they will be authenticated to the Pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think group mapping via NT and ACS are hosed and authorization in radius is not working as described.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dwane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 15:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632708#M421398</guid>
      <dc:creator>dpatkins</dc:creator>
      <dc:date>2007-03-16T15:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: vpn authentication and authorization using pix 7.2 and acs</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632709#M421399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dynamic ACLs will allow the user to get in but at max you can stop him from going anywhere after logging in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAR will deny the user access to the vpn all together.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS is working as designed. We need to configure authorization as req. and that is what you can do using ACLs or NARs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 15:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-authentication-and-authorization-using-pix-7-2-and-acs/m-p/632709#M421399</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-03-16T15:34:49Z</dc:date>
    </item>
  </channel>
</rss>

