<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect Authentication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4522748#M1085984</link>
    <description>&lt;P&gt;You can do this with LDAP attribute mapping on Cisco Firewalls:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But depending on what type of Radius server you are using you should be able to pass back attributes as well. Several methods to do this depending upon your topology.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Guide is here:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Dec 2021 14:07:24 GMT</pubDate>
    <dc:creator>nconroy</dc:creator>
    <dc:date>2021-12-22T14:07:24Z</dc:date>
    <item>
      <title>Anyconnect Authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4521858#M1085949</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently using a Radius server to authenticate users using Anyconnect. The Radius server is tied to MS AD\Domain Users &amp;amp; \Domain Computers. So, any user who has an AD account can login using their AD creds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an assignment to create a new connection profile so that specific end-users can authenticate against specific AD group called "SG_NtwkSupport"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I go about configuring a Connection profile/Global Policy where it points/links to the Radius server where that Radius server in linked to the AD\SG_NtwkSupport group?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;~zK&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 00:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4521858#M1085949</guid>
      <dc:creator>zekebash</dc:creator>
      <dc:date>2021-12-21T00:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4521892#M1085952</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;below will give good guide&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001474" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0001474&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 03:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4521892#M1085952</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2021-12-21T03:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4521894#M1085953</link>
      <description>&lt;P&gt;We do this most commonly with an LDAP Attribute map.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/108000-dap-deploy-guide.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However it can also be done in a pure RADIUS environment. Generally speaking, the VPN headend has a default group policy that allows zero connections. Once a user authenticates (and assuming they are in the group that the RADIUS server checks for) the RADIUS server returns an Authorization result overriding the default group policy and directing the VPN headend to assign a group policy that allows connections.&lt;/P&gt;
&lt;P&gt;Depending on what RADIUS server you are using, there may be some step by step guides you can reference. Cisco ISE and Microsoft NPS are the most common ones in this scenario.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 03:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4521894#M1085953</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-21T03:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4522748#M1085984</link>
      <description>&lt;P&gt;You can do this with LDAP attribute mapping on Cisco Firewalls:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But depending on what type of Radius server you are using you should be able to pass back attributes as well. Several methods to do this depending upon your topology.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Guide is here:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 14:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication/m-p/4522748#M1085984</guid>
      <dc:creator>nconroy</dc:creator>
      <dc:date>2021-12-22T14:07:24Z</dc:date>
    </item>
  </channel>
</rss>

