<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RAVPN: Choose group-policy based on AD group membership in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3707807#M1014316</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm replacing a customer's ASAs with FTDs and I've hit a couple of snags.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The customer is currently using clientless SSL VPN for contractors to access a small subset of internal services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Contractors authenticate their SSL VPN session to the ASA local user database whereas normal employees authenticate to active directory. Each user group has a&amp;nbsp;separate group policy and alias.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FTDs do not support local users or clientless VPN so I&amp;nbsp;have to use AnyConnect for the contractors and somehow assign different access policies depending on their AD group membership. I could be wrong, but I don't think FTD supports this natively?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't think the Firepower User Agent will achieve what I need either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I'm thinking the only solution is to use a RADIUS server like ISE or ACS or something and use that to send down an AV pair to the FTD to influence the chosen group policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any thoughts?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks in advance,&lt;/P&gt;
&lt;P&gt;Matt.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 13:58:24 GMT</pubDate>
    <dc:creator>matty-boy</dc:creator>
    <dc:date>2019-03-12T13:58:24Z</dc:date>
    <item>
      <title>RAVPN: Choose group-policy based on AD group membership</title>
      <link>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3707807#M1014316</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm replacing a customer's ASAs with FTDs and I've hit a couple of snags.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The customer is currently using clientless SSL VPN for contractors to access a small subset of internal services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Contractors authenticate their SSL VPN session to the ASA local user database whereas normal employees authenticate to active directory. Each user group has a&amp;nbsp;separate group policy and alias.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FTDs do not support local users or clientless VPN so I&amp;nbsp;have to use AnyConnect for the contractors and somehow assign different access policies depending on their AD group membership. I could be wrong, but I don't think FTD supports this natively?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't think the Firepower User Agent will achieve what I need either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I'm thinking the only solution is to use a RADIUS server like ISE or ACS or something and use that to send down an AV pair to the FTD to influence the chosen group policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any thoughts?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks in advance,&lt;/P&gt;
&lt;P&gt;Matt.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3707807#M1014316</guid>
      <dc:creator>matty-boy</dc:creator>
      <dc:date>2019-03-12T13:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN: Choose group-policy based on AD group membership</title>
      <link>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3707818#M1014317</link>
      <description>You are correct. To use LDAP group-membership info for group-policy assignment, you need the LDAP attribute map feature. This works on the ASA, but supported not the FTD yet. For FTD, you would have to use Radius server to set the group-policy name via the Radius Class attribute. If you are using AD, the easiest option would be to use the Network Policy Server functionality in the Windows server. The NPS settings would be the same as given in this doc for the ASA:

&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/117641-config-asa-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/117641-config-asa-00.html&lt;/A&gt;</description>
      <pubDate>Sun, 16 Sep 2018 21:48:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3707818#M1014317</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-09-16T21:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN: Choose group-policy based on AD group membership</title>
      <link>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3708339#M1014318</link>
      <description>&lt;P&gt;Hi Rahul,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for confirming my suspicions. I got&amp;nbsp;it working with a Cisco ACS server doing the RADIUS duties but I stumbled on another 'funny' though....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As long as "Allow Users to select connection profile while logging in" is checked and an Alias exists and is enabled under the connection profile it works fine. But if I disable or delete the alias or I uncheck the&amp;nbsp;"Allow Users to select connection profile while logging in" option, authentication fails? No evidence in the logs of the FTD talking to the ACS server at all. Weird.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;
&lt;P&gt;Matt.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 19:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3708339#M1014318</guid>
      <dc:creator>matty-boy</dc:creator>
      <dc:date>2018-09-17T19:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN: Choose group-policy based on AD group membership</title>
      <link>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3708376#M1014319</link>
      <description>&lt;P&gt;This could because of the tunnel-group the user ends up connecting to. If you have that option checked, the user sees the option to connect to all the tunnel-groups that have an alias set. IF you do not have this checked, the url "vpn.domain.com", usually takes you directly to the DefaultTunnelGroup. This may be why your authentication is failing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 20:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3708376#M1014319</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-09-17T20:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN: Choose group-policy based on AD group membership</title>
      <link>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3708408#M1014320</link>
      <description>&lt;P&gt;You were right! Again!&amp;nbsp;Adding an alias URL did the trick!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you Rahul! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 21:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ravpn-choose-group-policy-based-on-ad-group-membership/m-p/3708408#M1014320</guid>
      <dc:creator>matty-boy</dc:creator>
      <dc:date>2018-09-17T21:36:49Z</dc:date>
    </item>
  </channel>
</rss>

