<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA, different groups, different roles, same equipment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-different-groups-different-roles-same-equipment/m-p/574324#M427763</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this. In the vpn group create an IP based NAR that doesnt permit anything. This will get applied to any TACACS+ device admin type authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the admin users group, create a cli/dnis NAR that doesnt allow anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally, IP NARs get applied to TACACS+ and DNIS/CLI to RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In theory a T+ login from a vpn user will get filtered and a RADIUS login from an admin user will get filtered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The possible stumbling point is how ACS applies the NAR to RADIUS VPN authentications. It uses some tortuous logic, but generally:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if ip address in authen rq ---&amp;gt; apply ip filter&lt;/P&gt;&lt;P&gt;if no ip address ----&amp;gt; apply dnis/cli filter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fingers x'd the vpn auths dont include framed-ip-address!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont think even ACS v4.0 helps a huge amount, because network access profiles (NAP) are RADIUS only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darran&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Feb 2006 14:53:56 GMT</pubDate>
    <dc:creator>darpotter</dc:creator>
    <dc:date>2006-02-15T14:53:56Z</dc:date>
    <item>
      <title>AAA, different groups, different roles, same equipment</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-different-groups-different-roles-same-equipment/m-p/574323#M427758</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a tricky authentication case to submit:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My users are on Active Directory in two groups&lt;/P&gt;&lt;P&gt;- VPN Users&lt;/P&gt;&lt;P&gt;- Network admins&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The groups are mirrored (binded) in the ACS, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PIX configured as a VPN server. Both the VPN users and the network admins are authenticated by ACS (Radius for VPN, and TACACS+ or Radius for admins).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only want my network admins to be able to log on my PIX, and only my VPN users to be able to connect by VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to you segregate those two groups so they only have access to whats permitted for them. NAR doesn't work because only the PIX does the requests....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now, as configured above, both groups can do everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for you help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Antoine&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-different-groups-different-roles-same-equipment/m-p/574323#M427758</guid>
      <dc:creator>amaitre</dc:creator>
      <dc:date>2019-03-10T21:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: AAA, different groups, different roles, same equipment</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-different-groups-different-roles-same-equipment/m-p/574324#M427763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this. In the vpn group create an IP based NAR that doesnt permit anything. This will get applied to any TACACS+ device admin type authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the admin users group, create a cli/dnis NAR that doesnt allow anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally, IP NARs get applied to TACACS+ and DNIS/CLI to RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In theory a T+ login from a vpn user will get filtered and a RADIUS login from an admin user will get filtered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The possible stumbling point is how ACS applies the NAR to RADIUS VPN authentications. It uses some tortuous logic, but generally:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if ip address in authen rq ---&amp;gt; apply ip filter&lt;/P&gt;&lt;P&gt;if no ip address ----&amp;gt; apply dnis/cli filter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fingers x'd the vpn auths dont include framed-ip-address!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont think even ACS v4.0 helps a huge amount, because network access profiles (NAP) are RADIUS only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darran&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Feb 2006 14:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-different-groups-different-roles-same-equipment/m-p/574324#M427763</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2006-02-15T14:53:56Z</dc:date>
    </item>
  </channel>
</rss>

