<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA anyconnect LDAP/BAse DN and client profiles in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726594#M1095278</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;that was the last piece of the puzzle, you're right it seems that after mapping the correct group policy, it inherits along with that&amp;nbsp;&lt;SPAN&gt;vpn-simultaneous-logins&amp;nbsp; "0" from the default policy-group (NO ACCESS)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Attribute mapping works like a charm now, I'll create now more groups and perform more tests.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Nov 2022 13:01:25 GMT</pubDate>
    <dc:creator>AyoubC</dc:creator>
    <dc:date>2022-11-23T13:01:25Z</dc:date>
    <item>
      <title>ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4724271#M1095165</link>
      <description>&lt;P&gt;Hello Sec GURUs,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two different questions please:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1- Im using Anyconnect with LDAP server (AD) to feetch the user ad creds, everything work fine as long as i'm point think LDAP server DC=companyname, DC=domaine, DC=com. Once I adjust the BASE DN to narrow down the OU group(CN=engineering, OU=remoteusers, DC=companyname, DC=domaine, DC=com) the and anyconnect users failed to connect, I'm I missing another parameter, Please guide me on how I can do that,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2- Is there a way to use ClientProfile to control the following,&amp;nbsp; make the Anyconnect "disconnect"Button grayed out after a user connect, also I want to restrict the user machine to access to internet before until the user connect his VPN AnyConnect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;THANKS!!!&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2022 09:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4724271#M1095165</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-19T09:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4724272#M1095166</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189721"&gt;@AyoubC&lt;/a&gt; check your ldap configuration, certain ldap attributes are case sensitive. Provide the output of the ldap configuration if you want it checked. &lt;A href="https://integratingit.wordpress.com/2020/04/03/asa-remote-access-vpn-using-ldap/" target="_self"&gt;Here is a guide&lt;/A&gt; to configure LDAP authentication on ASA.&lt;/P&gt;
&lt;P&gt;You can use Always on VPN, it establishes a VPN session automatically after the user logs in and upon detection of an untrusted network. The VPN session remains open until the user logs out of the computer, or the session timer or idle session timer (specified in the ASA group policy) expires. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/configure-vpn.html#topic_BD02A53E0A714E23A56850698C830A6C" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/configure-vpn.html#topic_BD02A53E0A714E23A56850698C830A6C&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You could look at a management tunnel, which is established pre-user login. This ensures connectivity to the corporate network whenever the client system is powered up, not just when a VPN connection is established by the user. &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/215442-configure-anyconnect-management-vpn-tunn.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/215442-configure-anyconnect-management-vpn-tunn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2022 10:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4724272#M1095166</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-19T10:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4724903#M1095183</link>
      <description>&lt;P&gt;I m going to test, and keep you posted !&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 09:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4724903#M1095183</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-21T09:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725493#M1095206</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Spent some time today, the always-on setup was pretty straightforward,&amp;nbsp;&lt;/P&gt;&lt;P&gt;for the LDAP search in a specific group, went crazy, below output for one of my auth attempt&lt;/P&gt;&lt;P&gt;[4647] Session Start&lt;BR /&gt;[4647] New request Session, context 0x00007f74740ee020, reqType = Authentication&lt;BR /&gt;[4647] Fiber started&lt;BR /&gt;[4647] Creating LDAP context with uri=ldap://&amp;lt;AD IP&amp;gt;:389&lt;BR /&gt;[4647] Connect to LDAP server: ldap://&amp;lt;AD IP&amp;gt;:389, status = Successful&lt;BR /&gt;[4647] defaultNamingContext: value =DC=&amp;lt;MyDomaine&amp;gt;,DC=com&lt;BR /&gt;[4647] supportedLDAPVersion: value = 3&lt;BR /&gt;[4647] supportedLDAPVersion: value = 2&lt;BR /&gt;[4647] supportedSASLMechanisms: value = GSSAPI&lt;BR /&gt;[4647] supportedSASLMechanisms: value = GSS-SPNEGO&lt;BR /&gt;[4647] supportedSASLMechanisms: value = EXTERNAL&lt;BR /&gt;[4647] supportedSASLMechanisms: value = DIGEST-MD5&lt;BR /&gt;[4647] Binding as s-Anyconnect&lt;BR /&gt;[4647] Performing Simple authentication for s-Anyconnect to 172.16.201.115&lt;BR /&gt;[4647] LDAP Search:&lt;BR /&gt;Base DN = [OU=VPNusers,DC=departement,DC=Mydomain,DC=com]&lt;BR /&gt;Filter = [sAMAccountName=test03]&lt;BR /&gt;Scope = [SUBTREE]&lt;BR /&gt;[4647] &lt;EM&gt;&lt;STRONG&gt;Search result parsing returned failure status&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;[4647] Talking to Active Directory server &amp;lt;AD IP&amp;gt;&lt;BR /&gt;[4647] Reading password policy for test03, dn:&lt;BR /&gt;[4647] Binding as s-Anyconnect&lt;BR /&gt;[4647] Performing Simple authentication for s-Anyconnect to &amp;lt;AD IP&amp;gt;&lt;BR /&gt;[4647] Fiber exit Tx=639 bytes Rx=776 bytes, status=-1&lt;BR /&gt;[4647] Session End&lt;/P&gt;&lt;P&gt;Anyconnect app shows a simple login failed, but I don't know what I missed here, do I need a LDAP attribute map to search on a deep level in the AD ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 23:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725493#M1095206</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-21T23:44:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725683#M1095212</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189721"&gt;@AyoubC&lt;/a&gt; can you please provide your LDAP AAA specific configuration and I'll have a look.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 09:17:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725683#M1095212</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-22T09:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725834#M1095215</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here you go ! below the LDAP server config,&amp;nbsp;&lt;/P&gt;&lt;P&gt;with the below configuration, everything works fine, once I try to narrow down the reseach in the AD (add more OU/CN to the Base DN) the concerned users can't connect (not that I copy past the Base DN from AD itself/under attri editor).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AyoubC_0-1669116619967.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/168754i84A1E1FE4B80A75A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AyoubC_0-1669116619967.png" alt="AyoubC_0-1669116619967.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank you Rob!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 11:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725834#M1095215</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-22T11:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725841#M1095216</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189721"&gt;@AyoubC&lt;/a&gt; can you enable &lt;STRONG&gt;debug ldap 255&lt;/STRONG&gt; login as a user to test and provide me the full output of the debug (it should provide more output than what was provided before).&lt;/P&gt;
&lt;P&gt;You can of course use the base DN as the root of the domain and use hte attribute map to allow specific AD groups to narrow down authentications.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 11:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725841#M1095216</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-22T11:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725902#M1095224</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Already done, attached output this time from my lab environment, as you can see, narrowing down/attrib-map seems to not take effect, anyone can access as long as we point ASA to the root base dn,&amp;nbsp;&lt;/P&gt;&lt;P&gt;what do you think ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 16:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725902#M1095224</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-23T16:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725915#M1095225</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189721"&gt;@AyoubC&lt;/a&gt; If you configured the ASA as per the first &lt;A href="https://integratingit.wordpress.com/2020/04/03/asa-remote-access-vpn-using-ldap/" target="_self"&gt;link&lt;/A&gt; I provided above, any user not a member of the LDAP group specified in the attribute map would be assigned the NOACCESS group-policy rather than the group-policy specified in the attribute map, this NOACCESS group-policy does not allow connections (&lt;SPAN&gt;vpn-simultaneous-logins 0). &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have you configured that?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;More information on NOACCESS group-policy &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 13:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4725915#M1095225</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-22T13:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726102#M1095247</link>
      <description>&lt;P&gt;Going to test that right now,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 18:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726102#M1095247</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-22T18:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726108#M1095248</link>
      <description>&lt;PRE&gt;"CN=VPN_grp,OU=vpn-users,OU=Morocco Team,DC=htmioffice,DC=com"&lt;/PRE&gt;&lt;P&gt;first why there LDAP memberof enclose with " " ???&lt;BR /&gt;second the LDAP mapping must write with upper-case letter O&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;member&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;O&lt;/STRONG&gt;&lt;/FONT&gt;f&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;notice:- the LDAP return must write as it send from AD to ASA.}&lt;BR /&gt;make double check the config&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 19:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726108#M1095248</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-22T19:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726177#M1095251</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;- thanks for pointing out some issues that I corrected, such as the member&lt;STRONG&gt;O&lt;/STRONG&gt;f - now I can see that ASA able to map a policy group value in debug CLI,&amp;nbsp;&lt;/P&gt;&lt;P&gt;for the&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;" "&amp;nbsp;, CLI won't access your Base dn long entry without&amp;nbsp;&amp;nbsp;" "&amp;nbsp; - I don't this this is an issue,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;good catch on the NOACCESS policygroup, I created that as well and apply it as a default for my Tunnel group, and this time all get denied, I feel like the the ASA was able to determine/map the right group policy for the users but it can't enforce it,&amp;nbsp;&lt;/P&gt;&lt;P&gt;see attached&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 16:05:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726177#M1095251</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-23T16:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726183#M1095252</link>
      <description>&lt;PRE&gt;default-group-policy NOACCESS&lt;/PRE&gt;&lt;P&gt;only remove this line from tunnel-group&lt;BR /&gt;and all I think will be OK.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 23:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726183#M1095252</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-22T23:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726378#M1095266</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; the NOACCESS default-group-policy needs to be referenced under the tunnel-group, it's the attribute map which assigns a user to the group-policy "GroupPolicy_HTMI-VPN" this overrides the default group policy for users who are allowed access and denies the users who are not a member of this group.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189721"&gt;@AyoubC&lt;/a&gt; the output confirms the users was mapped to the correct group policy (via the attribute map) - if the user is still getting denied it's probably because you've not explictly defined the number of "&lt;SPAN&gt;vpn-simultaneous-logins" for the group policy - "GroupPolicy_HTMI-VPN", therefore it would inherit this value from the default group policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Example:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;group-policy GroupPolicy_HTMI-VPN attributes&lt;BR /&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;vpn-simultaneous-logins 3&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 08:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726378#M1095266</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-23T08:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726381#M1095268</link>
      <description>&lt;P&gt;Thanks for clarifying&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 08:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726381#M1095268</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-23T08:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726594#M1095278</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;that was the last piece of the puzzle, you're right it seems that after mapping the correct group policy, it inherits along with that&amp;nbsp;&lt;SPAN&gt;vpn-simultaneous-logins&amp;nbsp; "0" from the default policy-group (NO ACCESS)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Attribute mapping works like a charm now, I'll create now more groups and perform more tests.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 13:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726594#M1095278</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-23T13:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726608#M1095280</link>
      <description>&lt;P&gt;Glad your issue is solve&lt;BR /&gt;and you are so so welcome,&lt;BR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; thanks again for clarifying the default group-policy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 13:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726608#M1095280</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-23T13:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726618#M1095283</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;One more question, I'm a fun of ASDM, and I m wondering where I can find "&lt;SPAN&gt;vpn-simultaneous-logins&amp;nbsp; &lt;/SPAN&gt;" or it's a CLI command only. ?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 14:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726618#M1095283</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-23T14:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726625#M1095284</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189721"&gt;@AyoubC&lt;/a&gt; it's a setting defined under the group-policy and is configurable via ASDM. Here is an example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="300-735-Part-04-Q03-026.jpg" style="width: 536px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/168836i00B8B30165C31E2B/image-size/large?v=v2&amp;amp;px=999" role="button" title="300-735-Part-04-Q03-026.jpg" alt="300-735-Part-04-Q03-026.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 14:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726625#M1095284</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-23T14:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA anyconnect LDAP/BAse DN and client profiles</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726721#M1095289</link>
      <description>&lt;P&gt;Sounds great !&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 16:15:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-ldap-base-dn-and-client-profiles/m-p/4726721#M1095289</guid>
      <dc:creator>AyoubC</dc:creator>
      <dc:date>2022-11-23T16:15:34Z</dc:date>
    </item>
  </channel>
</rss>

