<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Specific Multi-Match RADIUS/LDAP Questions in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583130#M539543</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IT looks like someone from the team or customer/partner has already posted the question, can you please verify so we are not duplicating effort? Also please encourage partners and customers to post here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the thread that was updated shortly before your post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/message/208860"&gt;Re: Can ISE/ASA/Anyconnect support multiple AD group membership?&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 02 Mar 2016 13:16:35 GMT</pubDate>
    <dc:creator>Jason Kunst</dc:creator>
    <dc:date>2016-03-02T13:16:35Z</dc:date>
    <item>
      <title>Specific Multi-Match RADIUS/LDAP Questions</title>
      <link>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583129#M539533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISE Gurus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a customer/partner that is interested in deploying a remote access VPN solution using ASA, ISE and Anyconnect. Customer wonders how the solution can support user permissions when the user is part of multiple AD group within the memberOf attribute. Ideal flow would be that the permissions of each group would be appended/cumulative so that the permissions of all groups they are a member of are enabled simultaneously. They have 40-50 groups with unique ACL/permissions on each group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now realize that we can use the Multi-Match AuthZ policy to append ACE entries based on membership to multiple groups however the Cisco Partner I'm working with has additional questions listed below.&lt;/P&gt;&lt;P&gt;____________________________________________________________________&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any size limitation of cisco av-pair ip:inacl?&lt;/P&gt;&lt;P&gt;How many ACEs could be fit into one radius packet since single Radius attribute can be up to 255 bytes long as explained in &lt;A class="jive-link-external-small" href="https://tools.cisco.com/bugsearch/bug/CSCum57190/?referring_site=bugquickviewclick" rel="nofollow" target="_blank"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #adadad;"&gt;CSCum57190? &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Could this av-pair be sent &lt;SPAN class="content"&gt;using as many RADIUS packets as required to transport the full ACL from ISE to ASA? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;What is the merging algorithm where there is overlapping ACEs from different groups?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;Will this cisco av-pair work with COA of &lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html" rel="nofollow" target="_blank"&gt;ASA Version 9.2.1 VPN Posture with ISE Configuration Example - Cisco&lt;/A&gt;&lt;/SPAN&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to use ISE and ASA to have flexibility like DAP for accumulating Network Type ACL, Web Type ACL, Port-forwarding List, and URL lists for different LDAP group?&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html#t3" rel="nofollow" target="_blank"&gt;ASA 8.x Dynamic Access Policies (DAP) Deployment Guide - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is for a timely deal, thanks for the help!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2016 01:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583129#M539533</guid>
      <dc:creator>bilclay</dc:creator>
      <dc:date>2016-03-02T01:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: Specific Multi-Match RADIUS/LDAP Questions</title>
      <link>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583130#M539543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IT looks like someone from the team or customer/partner has already posted the question, can you please verify so we are not duplicating effort? Also please encourage partners and customers to post here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the thread that was updated shortly before your post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/message/208860"&gt;Re: Can ISE/ASA/Anyconnect support multiple AD group membership?&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2016 13:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583130#M539543</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2016-03-02T13:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Specific Multi-Match RADIUS/LDAP Questions</title>
      <link>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583131#M539570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The main question was posed an answered however additional follow questions were asked therefore I created a new thread and included assumed answers from old thread. Would really appreciate answers to the additional questions here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2016 13:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583131#M539570</guid>
      <dc:creator>bilclay</dc:creator>
      <dc:date>2016-03-02T13:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Specific Multi-Match RADIUS/LDAP Questions</title>
      <link>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583132#M539641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the attention!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Granted, it might have been totally fine to use ISE/ASA with ISE posture assessment if we have luxury to design VPN and AD authorization related schema from scratch utilizing some of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d; font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;&lt;STRONG&gt;ASA authorization options:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt; IETF Class attribute&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Map to group policy where filter(ACL), VLAN restriction etc. defined&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt; IETF Filter-ID&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Map to ACL pre-defined on ASA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt; dACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACL defined on ISE and downloaded with radius to ASA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt; DAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Specifying ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt; Secure Group Tag (SGT)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt; Cisco AV pair ACL &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Higher priority than dACL by default, could be merged with &lt;/SPAN&gt;&lt;SPAN class="kwd" style="color: black; background: white; font-size: 9.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;STRONG&gt;merge-dacl&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="font-size: 9.0pt; font-family: 'Arial','sans-serif'; color: black; background: white;"&gt;{&lt;SPAN class="kwd"&gt;&lt;STRONG&gt;before-avpair&lt;/STRONG&gt;&lt;/SPAN&gt; | &lt;SPAN class="kwd"&gt;&lt;STRONG&gt;after-avpair&lt;/STRONG&gt;&lt;/SPAN&gt;} on radius server definition&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-indent: .5in;"&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-general-config/aaa-radius.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-general-config/aaa-radius.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when accumulating different kind of [network|web|port-forwarding|URL] access policies from different group is desired for RA VPN solution, IMHO, there are not many choices at this moment besides:&lt;/P&gt;&lt;P&gt;1) Tie ISE with ASA VPN deployment utilizing ISE posture module, &lt;A class="jive-link-external-small" href="https://tools.cisco.com/bugsearch/bug/CSCum57190/?referring_site=bugquickviewclick" rel="nofollow" target="_blank"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #adadad;"&gt;CSCum57190&lt;/SPAN&gt;&lt;/A&gt; will probably have to be addressed given that ISE cannot send radius messages &amp;gt; 4k&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCuf90492/?referring_site=bugquickviewredir" title="https://tools.cisco.com/bugsearch/bug/CSCuf90492/?referring_site=bugquickviewredir"&gt;https://tools.cisco.com/bugsearch/bug/CSCuf90492/?referring_site=bugquickviewredir&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Decouple ISE from ASA VPN deployment, use DAP/LDAP on ASA talking LDAP directly with identity store, and ASA posture module.&amp;nbsp; Will ASA posture module/hostscan to be supported in long term?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am open and eager to learn any new features or old tricks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2016 18:46:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/specific-multi-match-radius-ldap-questions/m-p/3583132#M539641</guid>
      <dc:creator>sding2006</dc:creator>
      <dc:date>2016-03-02T18:46:21Z</dc:date>
    </item>
  </channel>
</rss>

