<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AV Pairs for VPN Group binding with Radius and ASA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626478#M422031</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt; this works, but it's an half solution.&lt;/P&gt;&lt;P&gt;Because we would like to give away only one pcf that contains a valid group.&lt;/P&gt;&lt;P&gt; Then using only Radius authenticate the valid user using username and password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens now is:&lt;/P&gt;&lt;P&gt;I have a pcf containing vpngrpprova2 and the user roberto password pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using this and having as Radius reply Class=OU=gpvprova that group-lock to vpngrpprova the user is rejected because of the difference in tunnel-group (vpngroup in pcf != vpngroup in group-policy returned by Radius).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead we want the user authenticated because username and password are right and tunnel parameters are those of vpngrpprova tunnel-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that my explanation is clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matteo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ps: is it possible doing this request or something similar to for webvpn?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Jan 2007 16:12:17 GMT</pubDate>
    <dc:creator>dbteo</dc:creator>
    <dc:date>2007-01-18T16:12:17Z</dc:date>
    <item>
      <title>AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626466#M422019</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;what I want to do is to bind a specific vpn user with a specific vpn group using a Radius server for AAA and ASA as end point of the vpn.&lt;/P&gt;&lt;P&gt;Which is the correct AV pair to use in the communication?&lt;/P&gt;&lt;P&gt;Is there a list of all AV pairs usable with ASA and Radius?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All information are welcome (example, link manual and command, tips &amp;amp; tricks).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matteo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Radius is a FreeRadius v 1.1.2&lt;/P&gt;&lt;P&gt;ASA is a ASA5520 v 7.2(1) &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626466#M422019</guid>
      <dc:creator>dbteo</dc:creator>
      <dc:date>2019-03-10T21:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626467#M422020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For group binding we need to use the Class attribute, It is IETF attribute number 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The format is ou=&lt;GROUP name=""&gt;;&lt;/GROUP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 12:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626467#M422020</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-15T12:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626468#M422021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Vivek.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was just using that AV pair and what I had as result is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raiusd output -&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sending Access-Accept of id 234 to 192.168.0.253 port 1025&lt;/P&gt;&lt;P&gt;        Framed-IP-Address = 172.26.101.1&lt;/P&gt;&lt;P&gt;        Framed-IP-Netmask = 255.255.255.255&lt;/P&gt;&lt;P&gt;        Service-Type = Framed-User&lt;/P&gt;&lt;P&gt;        Class = 0x76706e67727070726f7661&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Class is set in the postgres db on a freebsd machine where FreeRadius is running, the real value of Class is OU=vpngrpprova and the vpnclient is presenting its self as vpngrpprova2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When authenticated and processed what I have is that the client is binded to vpngrpprova2 and not to vpngrpprova.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is the mistake?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matteo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 13:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626468#M422021</guid>
      <dc:creator>dbteo</dc:creator>
      <dc:date>2007-01-15T13:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626469#M422022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the missing ; is the culprit. The Class attribute is to be defined as :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OU=vpngrpprova;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how this goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 15:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626469#M422022</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-15T15:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626470#M422023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;this is the content of the postreges db for Radius:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSERT INTO radcheck VALUES (3, 'roberto', 'User-Password', '==', 'pass');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (19, 'roberto', 'Service-Type', '=', 'Framed-User');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (17, 'roberto', 'Framed-IP-Address', '=', '172.26.101.200');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (18, 'roberto', 'Framed-IP-Netmask', '=', '255.255.255.0');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (27, 'roberto', 'Class', '=', 'ou=vpngrpprova');&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 16:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626470#M422023</guid>
      <dc:creator>dbteo</dc:creator>
      <dc:date>2007-01-15T16:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626471#M422024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to change :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (27, 'roberto', 'Class', '=', 'ou=vpngrpprova');&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;into&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (27, 'roberto', 'Class', '=', 'ou=vpngrpprova;');&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 18:06:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626471#M422024</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-15T18:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626472#M422025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;change made but it still doesnt work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSERT INTO radcheck VALUES (3, 'roberto', 'User-Password', '==', 'pass');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (19, 'roberto', 'Service-Type', '=', 'Framed-User');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (17, 'roberto', 'Framed-IP-Address', '=', '172.26.101.200');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (18, 'roberto', 'Framed-IP-Netmask', '=', '255.255.255.0');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (27, 'roberto', 'Class', '=', 'ou=vpngrpprova;');&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What else?&lt;/P&gt;&lt;P&gt;Ask me all info you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matteo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 08:45:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626472#M422025</guid>
      <dc:creator>dbteo</dc:creator>
      <dc:date>2007-01-16T08:45:54Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626473#M422026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe because the radius server is sending the class value in hex "Class =  0x76706e67727070726f7661"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the class value is case sensetive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 12:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626473#M422026</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-16T12:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626474#M422027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi vsantuka,&lt;/P&gt;&lt;P&gt; thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have just done some other check using this software NTRadPing of Dialways .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a part of the FreeRadius output:&lt;/P&gt;&lt;P&gt;Sending Access-Accept of id 2 to 172.16.5.10 port 2163&lt;/P&gt;&lt;P&gt;        Framed-IP-Address = 172.26.101.200&lt;/P&gt;&lt;P&gt;        Framed-IP-Netmask = 255.255.255.0&lt;/P&gt;&lt;P&gt;        Service-Type = Framed-User&lt;/P&gt;&lt;P&gt;        Class = 0x6f753d76706e67727070726f76613b&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what the client receives:&lt;/P&gt;&lt;P&gt;reply packet code=2 id=2 length=55&lt;/P&gt;&lt;P&gt;response: Access-Accept&lt;/P&gt;&lt;P&gt;Framed-IP-Address = 172.26.101.200&lt;/P&gt;&lt;P&gt;Framed-IP-Netmask = 255.255.255.0&lt;/P&gt;&lt;P&gt;Service-Type = Framed-User&lt;/P&gt;&lt;P&gt;Class=ou=vpngrpprova;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe something is wrong in the ASA config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matteo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 12:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626474#M422027</guid>
      <dc:creator>dbteo</dc:creator>
      <dc:date>2007-01-16T12:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626475#M422028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My bad. Forgot the most important thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to "Make sure OU is in capital letters and that there is a semicolon after the group name."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the semicolon but our "OU" is in lowercase.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 16:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626475#M422028</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-16T16:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626476#M422029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dont worry...but with OU in uppercase we are still experiencing the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the content of the db now:&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (27, 'roberto', 'Class', '=', 'OU=vpngrpprova;');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (19, 'roberto', 'Service-Type', '=', 'Framed-User');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (17, 'roberto', 'Framed-IP-Address', '=', '172.26.101.200');&lt;/P&gt;&lt;P&gt;INSERT INTO radreply VALUES (18, 'roberto', 'Framed-IP-Netmask', '=', '255.255.255.0');&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnelgroup name specified in the pcf is vpngrpprova2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And we are logged using vpngrpprova2 credential group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need other informations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matteo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 16:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626476#M422029</guid>
      <dc:creator>dbteo</dc:creator>
      <dc:date>2007-01-16T16:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626477#M422030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Duh ! Asa works differently - Not as concentrator etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Asa the Class attribute will just provide the group policy name and not the group name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The group policy on the Asa will then have the group to which the users needs to be bound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say you want to lock user rj123 into group RemoteGroup. Then on the&lt;/P&gt;&lt;P&gt;radius server define IETF attribute 25 Class "OU=RemotePolicy;" for this user. Here is the&lt;/P&gt;&lt;P&gt;config on the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy RemotePolicy internal&lt;/P&gt;&lt;P&gt;group-policy RemotePolicy attributes&lt;/P&gt;&lt;P&gt;dns-server value 10.1.1.1 10.2.2.2&lt;/P&gt;&lt;P&gt;group-lock value RemoteGroup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the OU set the group policy for this user and in the group policy&lt;/P&gt;&lt;P&gt;you lock the user into the tunnel-group that you want.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 18:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626477#M422030</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-16T18:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: AV Pairs for VPN Group binding with Radius and ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626478#M422031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt; this works, but it's an half solution.&lt;/P&gt;&lt;P&gt;Because we would like to give away only one pcf that contains a valid group.&lt;/P&gt;&lt;P&gt; Then using only Radius authenticate the valid user using username and password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens now is:&lt;/P&gt;&lt;P&gt;I have a pcf containing vpngrpprova2 and the user roberto password pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using this and having as Radius reply Class=OU=gpvprova that group-lock to vpngrpprova the user is rejected because of the difference in tunnel-group (vpngroup in pcf != vpngroup in group-policy returned by Radius).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead we want the user authenticated because username and password are right and tunnel parameters are those of vpngrpprova tunnel-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that my explanation is clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matteo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ps: is it possible doing this request or something similar to for webvpn?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2007 16:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/av-pairs-for-vpn-group-binding-with-radius-and-asa/m-p/626478#M422031</guid>
      <dc:creator>dbteo</dc:creator>
      <dc:date>2007-01-18T16:12:17Z</dc:date>
    </item>
  </channel>
</rss>

