<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny VPN access for specified groups in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701943#M422085</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you need to deny access request coming some of your NAS, you can use NAR( Network Access Restrictions) at ACS. NAR alows you to define which user should connect to which NAS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to deny access request for some of the vpn group at ASA, you can basicly select an different Authentication server for that group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Jan 2007 07:58:39 GMT</pubDate>
    <dc:creator>dogany</dc:creator>
    <dc:date>2007-01-10T07:58:39Z</dc:date>
    <item>
      <title>Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701941#M422083</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ACS and I use this authentication center for multiple devices. My issue is to deny VPN access for some groups, and allow for other. Clients are connected to ASA, maybe the solution can be an cisco-av-pair attribute or something else.&lt;/P&gt;&lt;P&gt;Please do some suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bye&lt;/P&gt;&lt;P&gt;FCS&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701941#M422083</guid>
      <dc:creator>farkascsgy</dc:creator>
      <dc:date>2019-03-10T21:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701942#M422084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can define a Network Access Restriction (NAR) to deny access to ASA for the group which should not have access to VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More on NARs at :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/g.htm#wp478900" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/g.htm#wp478900&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jan 2007 22:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701942#M422084</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-09T22:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701943#M422085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you need to deny access request coming some of your NAS, you can use NAR( Network Access Restrictions) at ACS. NAR alows you to define which user should connect to which NAS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to deny access request for some of the vpn group at ASA, you can basicly select an different Authentication server for that group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2007 07:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701943#M422085</guid>
      <dc:creator>dogany</dc:creator>
      <dc:date>2007-01-10T07:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701944#M422086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry but I couldn't catch the solution still now.&lt;/P&gt;&lt;P&gt;On my ASA I have GROUP1 and GROUP2 VPN groups for remote VPN connections. In my ACS I define two groups GROUP1-USER and GROUP2-USER, what I want to reach that GROUP1-USER will be able to access GROUP1 profile etc. And I want to do this limitation on ACS (using External database: Windows group mapping).&lt;/P&gt;&lt;P&gt;If you can please send me some usefule link or better if you can a short configuration guide for this limitation anyway the authentication works well from ACS using External Database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;FCS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 09:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701944#M422086</guid>
      <dc:creator>farkascsgy</dc:creator>
      <dc:date>2007-01-16T09:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701945#M422087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You want to restrict GROUP1-USER's users to GROUP1 on ASA and GROUP2-USER's users to GROUP2 on ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes, then on GROUP1-USER on ACS select RADIUS IEFT attribute 25 - CLass and set it to ou=GROUP1;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Likewise On GROUP2-USER set class to ou=GROUP2;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 12:01:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701945#M422087</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-16T12:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701946#M422088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, it sounds good. Do I need some extra config on ASA? Like authorization or something if yes can you explain?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;FCS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 12:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701946#M422088</guid>
      <dc:creator>farkascsgy</dc:creator>
      <dc:date>2007-01-16T12:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701947#M422089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No we will not require any thing apart from the authentication command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure OU is in capital letters and that there is a semicolon after the group name in ACS class attribute.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 16:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701947#M422089</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-16T16:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701948#M422090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't work for me.&lt;/P&gt;&lt;P&gt;aaa-server ACS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server ACS host x.x.x.x&lt;/P&gt;&lt;P&gt; key keykeykeykey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group TG general-attributes&lt;/P&gt;&lt;P&gt; address-pool TG-Pool&lt;/P&gt;&lt;P&gt; authentication-server-group ACS&lt;/P&gt;&lt;P&gt; default-group-policy TG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And in the ACS the ASA is set as RADIUS (Cisco VPN 3000/ASA/PIX 7.x+), but I tried with RADIUS IETF too. The Class attributes is OU=VPNGROUP;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anway the VPN works well. What can be the problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use External Datbase Mapping in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Bye&lt;/P&gt;&lt;P&gt;FCS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jan 2007 09:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701948#M422090</guid>
      <dc:creator>farkascsgy</dc:creator>
      <dc:date>2007-01-17T09:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Deny VPN access for specified groups</title>
      <link>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701949#M422091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Asa works differently - Not as concentrator etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Asa the Class attribute will just provide the group policy name and not the group name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The group policy on the Asa will then have the group to which the users needs to be bound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say you want to lock user rj123 into group RemoteGroup. Then on the&lt;/P&gt;&lt;P&gt;radius server define IETF attribute 25 Class "OU=RemotePolicy;" for this user. Here is the&lt;/P&gt;&lt;P&gt;config on the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy RemotePolicy internal&lt;/P&gt;&lt;P&gt;group-policy RemotePolicy attributes&lt;/P&gt;&lt;P&gt;dns-server value 10.1.1.1 10.2.2.2&lt;/P&gt;&lt;P&gt;group-lock value RemoteGroup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the OU set the group policy for this user and in the group policy&lt;/P&gt;&lt;P&gt;you lock the user into the tunnel-group that you want.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2007 11:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/deny-vpn-access-for-specified-groups/m-p/701949#M422091</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-01-18T11:56:44Z</dc:date>
    </item>
  </channel>
</rss>

