<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Did you get it resolved? I in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689136#M55434</link>
    <description>&lt;P&gt;Did you get it resolved? I see the thread is marked as "answered" but still wanted to confirm. If you are still having issues please post screen shots of your policies.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 26 May 2015 17:56:06 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2015-05-26T17:56:06Z</dc:date>
    <item>
      <title>Setting up VPN group for ACS5.5</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689133#M55427</link>
      <description>&lt;P&gt;I am trying to a group in the ACS5.5 that allows users to be able to connect. I have created a network group called ASA-VPN and have it set for radius and tacacs. The ACS is linked to AD. I am lost on what to do next as far ass rules or attributes. I've dealt with ISE before but not the ACS.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689133#M55427</guid>
      <dc:creator>bmack2121</dc:creator>
      <dc:date>2019-03-11T05:45:02Z</dc:date>
    </item>
    <item>
      <title>Take a look at the following</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689134#M55430</link>
      <description>&lt;P&gt;Take a look at the following link as it outlines a step-by-step process:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/139141/remote-access-vpn-authentication-acs-5x-using-radius-protocol"&gt;https://supportforums.cisco.com/document/139141/remote-access-vpn-authentication-acs-5x-using-radius-protocol&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Let us know if you are still having issues.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Thank you for rating helpful posts!&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2015 17:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689134#M55430</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-22T17:53:40Z</dc:date>
    </item>
    <item>
      <title>I am still a little lost. The</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689135#M55432</link>
      <description>&lt;P&gt;I am still a little lost. The default network access policy has already been set up. I've defined my ASA in the Network and AAA client list. I've went to AD under External Identity and add the VPN Allowed geoup under directory Groups. Now I am stuck on what to do next as far as policy Elements and Access Policies.&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2015 15:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689135#M55432</guid>
      <dc:creator>bmack2121</dc:creator>
      <dc:date>2015-05-24T15:32:05Z</dc:date>
    </item>
    <item>
      <title>Did you get it resolved? I</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689136#M55434</link>
      <description>&lt;P&gt;Did you get it resolved? I see the thread is marked as "answered" but still wanted to confirm. If you are still having issues please post screen shots of your policies.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 17:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689136#M55434</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-26T17:56:06Z</dc:date>
    </item>
    <item>
      <title>I was trying to rate your</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689137#M55435</link>
      <description>&lt;P&gt;I was trying to rate your post 5/5 but I guess that marks it as answered. I can't do screen shots due to our policy but I will describe it the best I can.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Under Policy Elements &amp;gt; Auth &amp;amp; Permissions &amp;gt; Network Access &amp;gt; Authroization Profiles:&lt;/P&gt;&lt;P&gt;I created a profile (I didn't touch common tasks)&lt;/P&gt;&lt;P&gt;&amp;nbsp;a. RADIUS Attributes: I've added a class string value similar to what was in ACS4.x&lt;/P&gt;&lt;P&gt;2. Under Access Policies &amp;gt; Access Services &amp;gt; "VPN" &amp;gt; I checked Identity and Authorization&lt;/P&gt;&lt;P&gt;&amp;nbsp;a. Under Allowed Protocols I've selected them all except preffered EAP and marked Radius Access Request User name&lt;/P&gt;&lt;P&gt;3. Under Identity I chose AD_CERT&lt;/P&gt;&lt;P&gt;4. Under Authorization I created a policy called&amp;nbsp; "VPN Ac" &amp;gt; Compound condition from AD/VPN Access which results to VPN Access and login allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5. The network devices has been created as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 18:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689137#M55435</guid>
      <dc:creator>bmack2121</dc:creator>
      <dc:date>2015-05-26T18:46:02Z</dc:date>
    </item>
    <item>
      <title>From a high level it sounds</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689138#M55438</link>
      <description>&lt;P&gt;From a high level it sounds correct. What happens when a user tries to authenticate?&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 20:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689138#M55438</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-26T20:28:08Z</dc:date>
    </item>
    <item>
      <title>I haven't went live on this</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689139#M55441</link>
      <description>&lt;P&gt;I haven't went live on this ACS yet. Still using the old. I have to go in to the ASA and do a few more configurations then I will test it out tonight. Fingers Crossed!&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 20:33:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689139#M55441</guid>
      <dc:creator>bmack2121</dc:creator>
      <dc:date>2015-05-26T20:33:02Z</dc:date>
    </item>
    <item>
      <title>Ah ok, so one thing you could</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689140#M55444</link>
      <description>&lt;P&gt;Ah ok, so one thing you could do is create a new VPN tunnel group and tied that to the the ACS server(s) so you can test it that way.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 20:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689140#M55444</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-26T20:38:51Z</dc:date>
    </item>
    <item>
      <title>That may be safer but I am</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689141#M55447</link>
      <description>&lt;P&gt;That may be safer but I am truely lost on how to do that one. You mean create a tunnel group in the ASA then create it in the ACS correct?&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 20:55:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689141#M55447</guid>
      <dc:creator>bmack2121</dc:creator>
      <dc:date>2015-05-26T20:55:54Z</dc:date>
    </item>
    <item>
      <title>What I meant is:1. Create a</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689142#M55450</link>
      <description>&lt;P&gt;What I meant is:&lt;/P&gt;&lt;P&gt;1. Create a new AAA group in the ASAs that reference the new ACS servers&lt;/P&gt;&lt;P&gt;2. Create another VPN profile (tunnel-group) in the ASAs. For example, test-vpn&lt;/P&gt;&lt;P&gt;3. Tie the AAA (authentication and authorization) of the new test-vpn to the new AAA server group that has the new ASAs&lt;/P&gt;&lt;P&gt;4. Test connection&lt;/P&gt;&lt;P&gt;I hope this helps!&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2015 21:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689142#M55450</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-26T21:01:36Z</dc:date>
    </item>
    <item>
      <title>Now I can connect through my</title>
      <link>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689143#M55455</link>
      <description>&lt;P&gt;Now I can connect through my new ACS. It will show my username on the ACS when I log in via VPN and it will also show clientless, subject not found in identity store" with my same IP listed in red right above it. I must have a rule set wrong or something. &amp;nbsp; Any idea?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 18:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/setting-up-vpn-group-for-acs5-5/m-p/2689143#M55455</guid>
      <dc:creator>bmack2121</dc:creator>
      <dc:date>2015-06-16T18:33:35Z</dc:date>
    </item>
  </channel>
</rss>

