<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Group Issues with AnyConnect and ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298273#M556825</link>
    <description>One other thing I was just thinking about...&lt;BR /&gt;&lt;BR /&gt;Is the Tunnel-Group lock feature necessary? It almost seems like the Lock feature is redundant when authenticating through ISE which has policies linked to specific AD Groups... &lt;BR /&gt;&lt;BR /&gt;*For example, "jdoe" is an AD user who is in the "vpnconsulting" AD Group only. So if jdoe attempted to login to VPN and selected the "Employee" group. Wouldn't his login attempt fail, since the Policy in ISE says that the user needs to be in the "vpnconsulting" AD group in order to use the Vendor Group Policy?&lt;BR /&gt;&lt;BR /&gt;And vice versa... jsmith is in the "VPNusers" AD group, and they attempt to login with the Vendor group through AnyConnect VPN. Wouldn't that also fail since they're not in the "vpnconsulting" group?&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
    <pubDate>Mon, 18 Dec 2017 22:23:29 GMT</pubDate>
    <dc:creator>Matthew Martin</dc:creator>
    <dc:date>2017-12-18T22:23:29Z</dc:date>
    <item>
      <title>VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298146#M556781</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ISE:&lt;/STRONG&gt; v2.0.0.306&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA5515 &lt;/STRONG&gt;&lt;EM&gt;9.4(1)&lt;/EM&gt;&lt;STRONG&gt; and ASA5510&lt;/STRONG&gt;&lt;EM&gt; 8.4(7)&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been having login issues with Cisco AnyConnect VPN, which we use with Cisco ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have 2 VPN user Groups setup in the ASA/ISE servers and in our Windows Domain Controller. One group is called Employee and the other is called Vendor. For the most part, users don't have any issues logging into the Employee group through AnyConnect. However, I seem to be unable to do so.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My user is in BOTH the Employee and Vendor Groups, but I seem to be only able to login via the Vendor group. I double checked the Windows DC and my user is listed under BOTH groups, so I'm not sure what the issue is.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I connect to the VPN and select the Employee Group to login, I enter my credentials and the login window disappears for a second and then comes back up as if I failed to login. If I look on the ISE Radius LiveLogs I can see it shows my user getting&amp;nbsp;&lt;EM&gt;"5200 Authentication succeeded",&lt;/EM&gt; along with the &lt;EM&gt;"Vendor"&lt;/EM&gt; authorization policy and &lt;EM&gt;"Vendor-Access"&lt;/EM&gt; auth profile, even though I selected the Employee Group, and it said it failed. The VPN &lt;EM&gt;Message History &lt;/EM&gt;on the AnyConnect client just shows &lt;U&gt;&lt;/U&gt;&lt;EM&gt;"User credentials entered"&lt;/EM&gt; and then nothing after that...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I select the &lt;EM&gt;"Vendor"&lt;/EM&gt; group during VPN login, I get logged in without issue, showing basically the same information in the ISE LiveLogs that I saw during the failed attempts to the &lt;EM&gt;Employee&lt;/EM&gt; group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any idea what could be going on here? I have been having this issue for as long as I can remember, and I've just been using the &lt;EM&gt;Vendor&lt;/EM&gt; group as a workaround.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;**EDIT**&lt;/STRONG&gt; I just tried removing my User from the Windows AD group for &lt;EM&gt;Vendors&lt;/EM&gt; so my only &lt;EM&gt;VPN Group&lt;/EM&gt; in my &lt;EM&gt;Member of&lt;/EM&gt; tab was for &lt;EM&gt;Employee&lt;/EM&gt;. After doing this I was able to log in to Employee. So I tried re-adding &lt;EM&gt;Vendor&lt;/EM&gt; back to my user, and the same issue occurs when I try to login to VPN with the &lt;EM&gt;Employee Group,&lt;/EM&gt; it fails, but &lt;EM&gt;Vendor &lt;/EM&gt;works fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in Advance,&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298146#M556781</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2020-02-21T18:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298213#M556789</link>
      <description>&lt;P&gt;How is the condition set up on ISE? I usually use this condition for VPN setups with Staff and Vendor access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If &lt;SPAN&gt;Cisco-VPN3000:CVPN3000/ASA/PIX7x-Tunnel-Group-Name= &amp;lt;Employee Tunnel Group&amp;gt; and AD:ExternalGroups = &amp;lt;Employee AD group&amp;gt; then Employee Authz Profile&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If&amp;nbsp;Cisco-VPN3000:CVPN3000/ASA/PIX7x-Tunnel-Group-Name= &amp;lt;Vendor Tunnel Group&amp;gt; and AD:ExternalGroups = &amp;lt;Vendor AD group&amp;gt; then Vendor Authz Profile&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Looks to me that you may ONLY be checking for AD group membership under the Authz conditions, causing you to be matched under Vendor Authz policy. Adding the VPN tunnel group as an additional condition should help in that case if both attributes are returned.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 20:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298213#M556789</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-12-18T20:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298224#M556795</link>
      <description>&lt;P&gt;Hey Rahul, thanks for the reply, much appreciated!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I attached a screenshot of the VPN Policy Sets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It just seems strange that when I try to login with the &lt;EM&gt;Employee &lt;/EM&gt;group that ISE is saying that I successfully authenticated with the Vendor group, even though I attempted to login with &lt;EM&gt;Employee &lt;/EM&gt;and AnyConnect is telling me the login failed... Bizarre.! And since ISE is not telling me my login attempt failed, its impossible to find out why that login failed, if that makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;From ISE Policy Sets&lt;/U&gt;:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;VPNusers&amp;nbsp; == &lt;/STRONG&gt; Employee Group&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;vpnconsulting&amp;nbsp; ==&amp;nbsp; &lt;/STRONG&gt;Vendor Group&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So you added the VPN-Tunnel-Group as a condition in your VPN Policy Sets?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks Again,&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 20:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298224#M556795</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-12-18T20:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298239#M556805</link>
      <description>&lt;P&gt;You may have it setup where the ASA has some Group-lock feature configured. Are you assigning an ASA group-policy in your Authz policies on ISE? If so, it could be that the ISE assigns Vendor Group-policy to you after authentication. And if the ASA has a group-lock feature saying that you can only receive Vendor Group-policy if you come in on Vendor Tunnel-group - it would explain the behavior that you are seeing. With respect to ISE, the authentication would look all good. But the ASA could be using the group-lock feature to restrict vendors from accessing employee groups and vice versa. A quick look at your ASA group-policies should confirm this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 20:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298239#M556805</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-12-18T20:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298246#M556813</link>
      <description>&lt;P&gt;I just checked in the ASA's Group Policies for the Employee and Vendor groups. I attached screenshots of those 2 windows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like the &lt;EM&gt;"Lock" &lt;/EM&gt;feature is enabled, I believe... I'm still kind of unclear on what exactly this feature does?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again for the reply, very much appreciated!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 21:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298246#M556813</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-12-18T21:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298266#M556819</link>
      <description>&lt;P&gt;Group lock is essentially used to tie (or lock) a group-policy to a tunnel-group. So if a AAA assigns a group-policy to a user after authentication, the user only can complete a successful connection if he/she connected to the ASA using the tunnel-group that is locked to the group-policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your case, the group-lock feature is used so that a vendor user cannot connect to an employee tunnel-group and vice versa. And that seems to be preventing you from connecting to the ASA. Since the ISE has the vendor policy above employee, you get matched there first (because you are also on vendor AD group). Then, when you are assigned the ASA vendor group-policy, the ASA drops you because you first connected to the employee tunnel-group on the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Group-lock is explained in the config example here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/ios-easy-vpn/117634-configure-asa-00.html#anc6" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/ios-easy-vpn/117634-configure-asa-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 22:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298266#M556819</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-12-18T22:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298269#M556822</link>
      <description>Oh ok, that makes sense...&lt;BR /&gt;&lt;BR /&gt;The reason I'm in both groups is because the Vendor Group does not do Posture checking. And since 99% of the time I use Linux as my default OS, and since my Linux OS does not have Windows Updates/Symantec AV, it would fail posture checking. So to workaround this I added my user to the Vendor group.&lt;BR /&gt;&lt;BR /&gt;So if I were to move the Vendor Policy Set below the Employee Policies in ISE, I would then be able to login with the Employee group. However, I wouldn't be able to get into the Vendor group anymore because it would match me to the Employee group and lock me into that group.&lt;BR /&gt;&lt;BR /&gt;Does that sound correct? Is there anyway around this without removing the Tunnel-Group lock feature?&lt;BR /&gt;&lt;BR /&gt;Thanks Again,&lt;BR /&gt;Matt</description>
      <pubDate>Mon, 18 Dec 2017 22:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298269#M556822</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-12-18T22:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298273#M556825</link>
      <description>One other thing I was just thinking about...&lt;BR /&gt;&lt;BR /&gt;Is the Tunnel-Group lock feature necessary? It almost seems like the Lock feature is redundant when authenticating through ISE which has policies linked to specific AD Groups... &lt;BR /&gt;&lt;BR /&gt;*For example, "jdoe" is an AD user who is in the "vpnconsulting" AD Group only. So if jdoe attempted to login to VPN and selected the "Employee" group. Wouldn't his login attempt fail, since the Policy in ISE says that the user needs to be in the "vpnconsulting" AD group in order to use the Vendor Group Policy?&lt;BR /&gt;&lt;BR /&gt;And vice versa... jsmith is in the "VPNusers" AD group, and they attempt to login with the Vendor group through AnyConnect VPN. Wouldn't that also fail since they're not in the "vpnconsulting" group?&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
      <pubDate>Mon, 18 Dec 2017 22:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298273#M556825</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-12-18T22:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298641#M556827</link>
      <description>&lt;P&gt;Yes. Moving the Vendor Policy below the employee Policy on ISE should be able to get you into the employee Group on the ASA. But this will affect access when your user account wants to get into the Vendor tunnel-group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can add an additional parameter "&lt;SPAN&gt;Cisco-&lt;/SPAN&gt;&lt;WBR /&gt;&lt;SPAN&gt;VPN3000:&lt;/SPAN&gt;&lt;EM&gt;CVPN3000&lt;/EM&gt;&lt;SPAN&gt;/ASA/PIX7.x-&lt;/SPAN&gt;&lt;EM&gt;Tunnel&lt;/EM&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;EM&gt;Group&lt;/EM&gt;&lt;SPAN&gt;-Name"&amp;nbsp;&lt;/SPAN&gt;as a match condition as I had mentioned in my first post. This way, without changing any order, if you came in on Employee TG on the ASA, only the Employee Policy on ISE can match. Same goes for Vendor. You would not have to worry about order of the policies on ISE.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 14:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298641#M556827</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-12-19T14:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298648#M556830</link>
      <description>Yes, you are correct. But I think this was designed with ASA local user DB in mind. You can only assign a group-policy for the user on the ASA local DB. So say you have 2 users there and you want to restrict them to their own individual Tunnel-groups, then user specific group-policy attribute and group-lock is the way to go.</description>
      <pubDate>Tue, 19 Dec 2017 14:26:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298648#M556830</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-12-19T14:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298736#M556833</link>
      <description>Hey Rahul, thanks again for the reply!&lt;BR /&gt;&lt;BR /&gt;Ok, that's what I got when I was reading about the Group Policy/Tunnel Group locking feature, that it applied more towards users configured on the ASA locally.&lt;BR /&gt;&lt;BR /&gt;I guess I'll try removing the lock feature on the ASA and see what results I get.&lt;BR /&gt;&lt;BR /&gt;Thanks again for the explanations, much appreciated!&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
      <pubDate>Tue, 19 Dec 2017 16:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298736#M556833</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-12-19T16:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298738#M556835</link>
      <description>Sorry, I just re-read one of your posts from yesterday about adding the extra condition in ISE to match the "Cisco-VPN3000:CVPN3000/ASA/PIX7.x-Tunnel-Group-Name" condtion.&lt;BR /&gt;&lt;BR /&gt;I guess I'll try that first before I attempt to remove the Lock feature. I'll post back with results...&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
      <pubDate>Tue, 19 Dec 2017 16:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298738#M556835</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-12-19T16:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Group Issues with AnyConnect and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298786#M556836</link>
      <description>&lt;P&gt;Excellent. I added the attribute you suggested, &lt;EM&gt;*i.e. Cisco-VPN3000:CVPN3000/ASA/PIX7x-Tunnel-Group-Name--[146]&lt;/EM&gt;, and set it to &lt;EM&gt;&lt;STRONG&gt;Equal &lt;/STRONG&gt;"vendor"&lt;/EM&gt; for the Vendor VPN policy set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then, I also added that same attribute check in each of the &lt;EM&gt;Unknown, Non-Compliant &lt;/EM&gt;and&lt;EM&gt; Compliant &lt;/EM&gt;Policy Sets for Employee and set it so it must be &lt;EM&gt;&lt;STRONG&gt;Equal &lt;/STRONG&gt;&lt;/EM&gt;to&amp;nbsp; the &lt;EM&gt;"employee"&lt;/EM&gt; Tunnel-Group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In doing this, a user, like myself, can be in both the Vendor group and the Employee group and still be able to use each one to login to VPN. And, since I didn't remove the &lt;EM&gt;Tunnel Group Lock&lt;/EM&gt; feature from the ASA, the user will also get locked into the group that they selected for that VPN login session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again for the help Rahul!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 17:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-group-issues-with-anyconnect-and-ise/m-p/3298786#M556836</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2017-12-19T17:12:29Z</dc:date>
    </item>
  </channel>
</rss>

