<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Applying Dynamic Access Policies using Radius Attributes in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/applying-dynamic-access-policies-using-radius-attributes/m-p/2684270#M54723</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to define a DAP using Radius attributes but the policy is not being correctly assigned. I've tried using attribute value 25 and 145 based off the following documentation.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/aaa-radius.html#32985" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/aaa-radius.html#32985&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Users connect via an Anyconnect Client, then based of their AD groups (via Radius server) they are assigned to Group Policy. Instead of creating several different Group Policies and multiple NPS network policies I'd like to use DAP to define more granular access.&lt;/P&gt;&lt;P&gt;Has anybody successfully done this as what Radius attribute did you use?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 05:55:02 GMT</pubDate>
    <dc:creator>croninbarry</dc:creator>
    <dc:date>2019-03-11T05:55:02Z</dc:date>
    <item>
      <title>Applying Dynamic Access Policies using Radius Attributes</title>
      <link>https://community.cisco.com/t5/network-access-control/applying-dynamic-access-policies-using-radius-attributes/m-p/2684270#M54723</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to define a DAP using Radius attributes but the policy is not being correctly assigned. I've tried using attribute value 25 and 145 based off the following documentation.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/aaa-radius.html#32985" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/aaa-radius.html#32985&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Users connect via an Anyconnect Client, then based of their AD groups (via Radius server) they are assigned to Group Policy. Instead of creating several different Group Policies and multiple NPS network policies I'd like to use DAP to define more granular access.&lt;/P&gt;&lt;P&gt;Has anybody successfully done this as what Radius attribute did you use?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/applying-dynamic-access-policies-using-radius-attributes/m-p/2684270#M54723</guid>
      <dc:creator>croninbarry</dc:creator>
      <dc:date>2019-03-11T05:55:02Z</dc:date>
    </item>
    <item>
      <title>Those radius attributes are</title>
      <link>https://community.cisco.com/t5/network-access-control/applying-dynamic-access-policies-using-radius-attributes/m-p/2684271#M54726</link>
      <description>&lt;P&gt;Those radius attributes are as you have seen already, used to assign Group Policy not DAPs. I have not tried it, but does it not work, if you send the class 25 attribute from NPS, as the AD group name, and then use a DAP to match that AAA value ?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 15:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/applying-dynamic-access-policies-using-radius-attributes/m-p/2684271#M54726</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-07-17T15:53:15Z</dc:date>
    </item>
    <item>
      <title>I tried (i think) what you</title>
      <link>https://community.cisco.com/t5/network-access-control/applying-dynamic-access-policies-using-radius-attributes/m-p/2684272#M54731</link>
      <description>&lt;P&gt;I tried (i think) what you are speaking about here without much success. At the moment the only way I can add a group policy to a DAP is by specifying it from the drop down list. I figure there must be some way of doing it as the radius option is available.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 16:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/applying-dynamic-access-policies-using-radius-attributes/m-p/2684272#M54731</guid>
      <dc:creator>croninbarry</dc:creator>
      <dc:date>2015-07-17T16:25:40Z</dc:date>
    </item>
  </channel>
</rss>

