<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA - logging via radius with group name passed. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643590#M421773</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to pass this in webvpn, not ipsec tunnel. Do You know if this is possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Feb 2007 14:36:05 GMT</pubDate>
    <dc:creator>marcin.mazurek</dc:creator>
    <dc:date>2007-02-12T14:36:05Z</dc:date>
    <item>
      <title>ASA - logging via radius with group name passed.</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643588#M421768</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to setup ASA5520 with Radius to authenticate users with group&lt;/P&gt;&lt;P&gt;privileges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Useing Radius with ASA to authenticate users is quite simple. When I try&lt;/P&gt;&lt;P&gt;to pass from asa tunnel-group name (with group-policy and attributes&lt;/P&gt;&lt;P&gt;attached) there is a problem that ASA dosn't pass any group name to&lt;/P&gt;&lt;P&gt;radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to overcome it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I want to do is to apply different policies to username depending&lt;/P&gt;&lt;P&gt;with what tunnel-group name he logs in to webvpn. I assume one user may&lt;/P&gt;&lt;P&gt;be member of different groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643588#M421768</guid>
      <dc:creator>marcin.mazurek</dc:creator>
      <dc:date>2019-03-10T21:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - logging via radius with group name passed.</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643589#M421771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue is the tunnel group name must be the IP address of the remote peer.&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt; tunnel-group 172.20.77.10 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 172.20.77.10 ipsec-attributes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 14:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643589#M421771</guid>
      <dc:creator>fmeetz</dc:creator>
      <dc:date>2007-02-12T14:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - logging via radius with group name passed.</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643590#M421773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to pass this in webvpn, not ipsec tunnel. Do You know if this is possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 14:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643590#M421773</guid>
      <dc:creator>marcin.mazurek</dc:creator>
      <dc:date>2007-02-12T14:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - logging via radius with group name passed.</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643591#M421776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Differentiate your privileges and restrictions based off of group-policy, not the tunnel-group. Keep your default WebVPN tunnel-group, and do not specify a default group policy for this tunnel-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create separate group-policies that differentiate what links different groups of users should be presented with. If you're using ACS, link your Cisco Secure Groups to groups in Active Directory (or other method of directory services). The Cisco Secure Groups should then be configured to pass specific RADIUS attributes, such as the "Class" attribute #25. ACS will then tell the ASA to place the user (from Active Directory) into a specific group-policy, which you can then limit URL's shown with the url-list command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long winded, I know...any questions, please ask.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2007 14:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643591#M421776</guid>
      <dc:creator>astroman</dc:creator>
      <dc:date>2007-05-22T14:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - logging via radius with group name passed.</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643592#M421778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran into a problem with ASA 7.0(6) because with that version you cannot specify an IP address pool in the group policy (only in the tunnel group). So, if the default tunnel-group does not have an IP pool assign to it, the client cannot get an IP address. With Version 7.2(2), you can assign an IP pool in both the Group Policy and the Tunnel-Group so you can assign a specific IP pool based on the attribute 25 received from the radius server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2007 15:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643592#M421778</guid>
      <dc:creator>ydemissie</dc:creator>
      <dc:date>2007-06-06T15:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - logging via radius with group name passed.</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643593#M421780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;astroman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You advice is really helpful! but I have a doubt on "Keep your default WebVPN tunnel-group, and do not specify a default group policy for this tunnel-group"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We shall define a group policy for a tunnel group. If we do not specify the default group policy for the default WebVPN tunnel group, is it harmless to specify one of the user-defined group policies? Or will it better to create a dummy group policies for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 03:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643593#M421780</guid>
      <dc:creator>xnym</dc:creator>
      <dc:date>2007-06-08T03:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - logging via radius with group name passed.</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643594#M421781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize if I was unclear...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you'll have to keep the default webvpn group policy when the default webvpn tunnel-group is built. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some other recommendations as far as keeping the default webvpn group locked down tightly via ACS, that I'll post about in a little while.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other questions, please let us know...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 09:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-logging-via-radius-with-group-name-passed/m-p/643594#M421781</guid>
      <dc:creator>astroman</dc:creator>
      <dc:date>2007-06-08T09:28:15Z</dc:date>
    </item>
  </channel>
</rss>

