<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The LDAP connection and in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509430#M89321</link>
    <description>&lt;P&gt;The LDAP connection and binding is working well,&lt;/P&gt;&lt;P&gt;but the issue is, that right now any LDAP user is allowed to authenticate via VPN (ipsec remote vpn using cisco vpn client)&lt;/P&gt;&lt;P&gt;which is a problem for me, so how do I permit only a specific LDAP group members to authenticate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(If the answer was already provided in your post and I didn't get it, I apologize, please break it down simply for me to understand if possible)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Jul 2014 11:21:40 GMT</pubDate>
    <dc:creator>Haim Zohar</dc:creator>
    <dc:date>2014-07-29T11:21:40Z</dc:date>
    <item>
      <title>ldap authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509426#M89317</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I'm using cisco asa 5512-x asdm&lt;/P&gt;&lt;P&gt;asa version 9.1(2)&lt;/P&gt;&lt;P&gt;asdm version 7.2(1)&lt;/P&gt;&lt;P&gt;I configured my ldap server and tested it, connection is ok.&lt;/P&gt;&lt;P&gt;but I'm not sure how to configure my ipsec remote vpn, to authenticate users who belong to active directory "VPN" group only, and deny all else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a dynamic access group on asdm, is that enough?&lt;/P&gt;&lt;P&gt;please try to explain it to me simply since I'm not all of that good with cisco cli, if it's possible to explain in asdm way, that would be preferred.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509426#M89317</guid>
      <dc:creator>Haim Zohar</dc:creator>
      <dc:date>2019-03-11T04:53:54Z</dc:date>
    </item>
    <item>
      <title>Hi Henry GreenIf you already</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509427#M89318</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A about="/users/haim00002" class="username" datatype="" href="https://supportforums.cisco.com/users/haim00002" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;Henry Green&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If you already have working your LDAP and the REMOTE VPN &amp;nbsp;the next step is to use the LDAP to authenticate the VPN remote users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to add the next config to your tunnel group:&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#tunnel-group testgroup general-attributes&lt;BR /&gt;ciscoasa(config-tunnel-general)#authentication-server-group LDAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also check this useful link:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/139241/remote-access-vpn-asa-authentication-using-ldap-server"&gt;https://supportforums.cisco.com/document/139241/remote-access-vpn-asa-authentication-using-ldap-server&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Hope this helps -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2014 16:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509427#M89318</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-07-28T16:43:31Z</dc:date>
    </item>
    <item>
      <title>Hi Rvarelac, Thank you for</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509428#M89319</link>
      <description>&lt;P&gt;Hi Rvarelac,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply,&lt;/P&gt;&lt;P&gt;but my question is, how do I narrow the LDAP scope just to a specific ldap group?&lt;/P&gt;&lt;P&gt;I have an ldap group called "VPN", I want them and them alone to be able to authenticate via remote VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any advices?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 07:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509428#M89319</guid>
      <dc:creator>Haim Zohar</dc:creator>
      <dc:date>2014-07-29T07:14:44Z</dc:date>
    </item>
    <item>
      <title>the ASA checks with an LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509429#M89320</link>
      <description>&lt;P&gt;the ASA checks with an LDAP server in order to verify the identity of users that it authenticates. This process does not work like a traditional Remote Authentication Dial-In User Service (RADIUS) or Terminal Access Controller Access-Control System Plus (TACACS+) exhange. These steps explain, at a high level, how the ASA uses an LDAP server in order to check user credentials.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Verify the links for configuration:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/98625-asa-ldap-authentication.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/98625-asa-ldap-authentication.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html&lt;/A&gt;&lt;/P&gt;&lt;OL type="1"&gt;&lt;LI&gt;&lt;P&gt;The user initiates a connection to the ASA.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The ASA is configured to authenticate that user with the Microsoft Active Directory (AD)/LDAP server.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The ASA binds to the LDAP server with the credentials configured on the ASA (admin in this case), and looks up the provided username. The &lt;B&gt;admin&lt;/B&gt; user also obtains the appropriate credentials to list contents within Active Directory. Refer to &lt;A href="http://support.microsoft.com/?id=320528" target="_blank"&gt;http://support.microsoft.com/?id=320528&lt;/A&gt; &lt;IMG alt="leavingcisco.com" height="9" src="http://www.cisco.com/swa/i/icon_popup_short.gif" width="19" /&gt; for more information about how to grant LDAP query privileges.&lt;/P&gt;&lt;P&gt;&lt;B&gt;Note:&lt;/B&gt; The Microsoft website at &lt;A href="http://support.microsoft.com/?id=320528" target="_blank"&gt;http://support.microsoft.com/?id=320528&lt;/A&gt; &lt;IMG alt="leavingcisco.com" height="9" src="http://www.cisco.com/swa/i/icon_popup_short.gif" width="19" /&gt; is managed by a third party provider. Cisco is not responsible for its content.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If the username is found, the ASA attempts to bind to the LDAP server with the credentials that the user provided at login.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If the second bind is successful, authentication succeeds and the the ASA processes the attributes of the user.&lt;/P&gt;&lt;P&gt;&lt;B&gt;Note:&amp;nbsp;&lt;/B&gt;In this example the attributes are not used for anything. Refer to &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html"&gt;ASA/PIX: Mapping VPN Clients to VPN Group Policies Through LDAP Configuration Example&lt;/A&gt; in order to see an example of how the ASA can process LDAP attributes.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 29 Jul 2014 10:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509429#M89320</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2014-07-29T10:09:02Z</dc:date>
    </item>
    <item>
      <title>The LDAP connection and</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509430#M89321</link>
      <description>&lt;P&gt;The LDAP connection and binding is working well,&lt;/P&gt;&lt;P&gt;but the issue is, that right now any LDAP user is allowed to authenticate via VPN (ipsec remote vpn using cisco vpn client)&lt;/P&gt;&lt;P&gt;which is a problem for me, so how do I permit only a specific LDAP group members to authenticate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(If the answer was already provided in your post and I didn't get it, I apologize, please break it down simply for me to understand if possible)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 11:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509430#M89321</guid>
      <dc:creator>Haim Zohar</dc:creator>
      <dc:date>2014-07-29T11:21:40Z</dc:date>
    </item>
    <item>
      <title>Hi  Please check the</title>
      <link>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509431#M89322</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please check the following link that has an example:&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/98634-asa-ldap-group-pol.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!!&lt;/P&gt;&lt;P&gt;Minakshi(Do rate the helpful posts)&lt;/P&gt;</description>
      <pubDate>Fri, 08 Aug 2014 05:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ldap-authentication/m-p/2509431#M89322</guid>
      <dc:creator>minkumar</dc:creator>
      <dc:date>2014-08-08T05:48:09Z</dc:date>
    </item>
  </channel>
</rss>

