<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA integration with Active Directory using LDAPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087768#M1112031</link>
    <description>&lt;P&gt;Debug http 255 &amp;lt;- share this when you use ldaps&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Thu, 02 May 2024 14:23:42 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-05-02T14:23:42Z</dc:date>
    <item>
      <title>ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087471#M1112013</link>
      <description>&lt;P&gt;Setting up a new ASA running 9.18 and trying to tie it into AD. This is replacing an existing ASA that was previously connected to AD using LDAPS. On rhe new ASA I can do test authentication without any issue if I use port 389, but once I switch to 636 it fails. On the old firewalls I can do the authentication using either 389 or 636.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure if I missed a step and can't seem to find documentation on using 636 anymore. I tried importing the root CA certificate ( which happens to be on a DC) but that didn't fixed it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any insight would be appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 10:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087471#M1112013</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T10:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087475#M1112014</link>
      <description>&lt;P&gt;if the configuration goodand you imported the certs also -&amp;nbsp; then run the debiug&lt;/P&gt;
&lt;P&gt;debug ldap and see what is wrong ?&lt;/P&gt;
&lt;P&gt;as you mentioned other ASA working, what Code is that ?&lt;/P&gt;
&lt;P&gt;check below thead also can help you :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/asa-5505-ca-certificate-for-ldaps/td-p/3376664" target="_blank"&gt;https://community.cisco.com/t5/network-security/asa-5505-ca-certificate-for-ldaps/td-p/3376664&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 10:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087475#M1112014</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-05-02T10:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087491#M1112017</link>
      <description>&lt;P&gt;Thanks for the quick response.&amp;nbsp; When I do a debug ldap 255 I get this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasav01(config)# test aaa-server authentication LDAP host 10.100.100.$&lt;BR /&gt;INFO: Attempting Authentication test to IP address (10.100.100.5) (timeout: 20 seconds)&lt;/P&gt;
&lt;P&gt;[-2147483639] Session Start&lt;BR /&gt;[-2147483639] New request Session, context 0x00007f07ec3991a8, reqType = Authentication&lt;BR /&gt;[-2147483639] Fiber started&lt;BR /&gt;[-2147483639] Creating LDAP context with uri=ldaps://10.100.100.5:636&lt;BR /&gt;[-2147483639] TLS Connection to LDAP server: ldaps://10.100.100.5:636, status = Failed&lt;BR /&gt;[-2147483639] Unable to read rootDSE. Can't contact LDAP server.&lt;BR /&gt;[-2147483639] Fiber exit Tx=0 bytes Rx=0 bytes, status=-3&lt;BR /&gt;[-2147483639] Session End&lt;BR /&gt;ERROR: Authentication Server not responding: AAA Server has been removed&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 11:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087491#M1112017</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T11:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087511#M1112019</link>
      <description>&lt;P&gt;&lt;STRONG&gt;as you mentioned other ASA working, what Code is that ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;if you do the same test and post the debug here from working one ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;[-2147483639] TLS Connection to LDAP server: ldaps://10.100.100.5:636, status = Failed&lt;/P&gt;
&lt;P&gt;in the path do you have any other Firewall , or any Windows firewall&lt;/P&gt;
&lt;P&gt;May be check on the Server and run some more packet catpture and see what is wrong ?&lt;/P&gt;
&lt;P&gt;I have seen some bug, that should not effecti this verison of code running :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCus71190" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCus71190&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 11:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087511#M1112019</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-05-02T11:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087735#M1112027</link>
      <description>&lt;P&gt;Here's a successful authentication from the original firewall:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;INFO: Attempting Authentication test to IP address (10.100.100.4) (timeout: 22 seconds)

[-2147483646] Session Start
[-2147483646] New request Session, context 0x00007fa56e336400, reqType = Authentication
[-2147483646] Fiber started
[-2147483646] Creating LDAP context with uri=ldaps://10.100.100.4:636
[-2147483646] Connect to LDAP server: ldaps://10.100.100.4:636, status = Successful
[-2147483646] supportedLDAPVersion: value = 3
[-2147483646] supportedLDAPVersion: value = 2
[-2147483646] Binding as My Admin
[-2147483646] Performing Simple authentication for My Admin to 10.100.100.4
[-2147483646] LDAP Search:
Base DN = [dc=root, dc=mydomain, dc=org]
Filter  = [sAMAccountName=myadmin]
Scope   = [SUBTREE]
[-2147483646] User DN = [CN=My Admin,CN=Users,DC=root,DC=mydomain,DC=org]
[-2147483646] Talking to Active Directory server 10.100.100.4
[-2147483646] Reading password policy for myadmin, dn:CN=My Admin,CN=Users,DC=root,DC=mydomain,DC=org
[-2147483646] Read bad password count 0
[-2147483646] Binding as myadmin
[-2147483646] Performing Simple authentication for myadmin to 10.100.100.4
[-2147483646] Processing LDAP response for user myadmin
[-2147483646] Message (myadmin): 
[-2147483646] Authentication successful for myadmin to 10.100.100.4
[-2147483646] Retrieved User Attributes:
[-2147483646] objectClass: value = top
[-2147483646] objectClass: value = person
[-2147483646] objectClass: value = organizationalPerson
[-2147483646] objectClass: value = user
[-2147483646] cn: value = My Admin
[-2147483646] sn: value = Auth
[-2147483646] description: value = Used for ASA VPN and Wireless Authentication - DO NOT DELETE
[-2147483646] givenName: value = Cisco
[-2147483646] distinguishedName: value = CN=My Admin,CN=Users,DC=root,DC=mydomain,DC=org
[-2147483646] instanceType: value = 4
[-2147483646] whenCreated: value = 20141220225932.0Z
[-2147483646] whenChanged: value = 20240430135447.0Z
[-2147483646] displayName: value = My Admin
[-2147483646] uSNCreated: value = 20223
[-2147483646] memberOf: value = CN=Domain Admins,CN=Users,DC=root,DC=mydomain,DC=org
[-2147483646] uSNChanged: value = 8295504
[-2147483646] name: value = My Admin
[-2147483646] objectGUID: value = o..../.A./g...qb
[-2147483646] userAccountControl: value = 66048
[-2147483646] badPwdCount: value = 0
[-2147483646] codePage: value = 0
[-2147483646] countryCode: value = 0
[-2147483646] badPasswordTime: value = 133591008782225124
[-2147483646] lastLogon: value = 133591008978803743
[-2147483646] pwdLastSet: value = 130635899729387577
[-2147483646] primaryGroupID: value = 513
[-2147483646] objectSid: value = .............f...L.?f)Jq....
[-2147483646] adminCount: value = 1
[-2147483646] accountExpires: value = 9223372036854775807
[-2147483646] logonCount: value = 1
[-2147483646] sAMAccountName: value = myadmin
[-2147483646] sAMAccountType: value = 805306368
[-2147483646] userPrincipalName: value = myadmin@root.mydomain.org
[-2147483646] objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=root,DC=mydomain,DC=org
[-2147483646] dSCorePropagationData: value = 20220105234128.0Z
[-2147483646] dSCorePropagationData: value = 20210402000553.0Z
[-2147483646] dSCorePropagationData: value = 20210401211313.0Z
[-2147483646] dSCorePropagationData: value = 16010101000000.0Z
[-2147483646] mS-DS-ConsistencyGuid: value = o..../.A./g...qb
[-2147483646] lastLogonTimestamp: value = 133589588874166367
[-2147483646] Fiber exit Tx=565 bytes Rx=2960 bytes, status=1
[-2147483646] Session End
INFO: Authentication Successful

FW1# und
&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 02 May 2024 14:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087735#M1112027</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T14:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087745#M1112029</link>
      <description>&lt;P&gt;Just simple note we talk about ldaps or ldap&lt;/P&gt;
&lt;P&gt;Ldap need ssl between asa and AD' and ldap is run over ssl&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ldap not need ssl&lt;/P&gt;
&lt;P&gt;So first thing&amp;nbsp; we need to check ssl&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 14:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087745#M1112029</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-02T14:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087752#M1112030</link>
      <description>&lt;P&gt;Not sure I follow.&amp;nbsp; LDAP from ASA to AD is working fine.&amp;nbsp; When I try to switch to LDAPS (using "server-port 636" and "ldap-over-ssl enable") it fails.&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 14:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087752#M1112030</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T14:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087768#M1112031</link>
      <description>&lt;P&gt;Debug http 255 &amp;lt;- share this when you use ldaps&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 14:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087768#M1112031</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-02T14:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087845#M1112038</link>
      <description>&lt;P&gt;&lt;STRONG&gt;as you mentioned other ASA working, what Code is that ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;what is the IP address of the ASA working, what is the new ASA IP address ?&lt;/P&gt;
&lt;P&gt;the one success -&amp;nbsp; .4&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;uri=ldaps://10.100.100.4:636&lt;/LI-CODE&gt;
&lt;P&gt;the one failing&amp;nbsp; .5&amp;nbsp; (can you configiure .4 and test on new ASA ?&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;uri=ldaps://10.100.100.5:636&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 15:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087845#M1112038</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-05-02T15:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087885#M1112042</link>
      <description>&lt;P&gt;I had the same issue when testing against 10.100.100.4 on the new ASA.&amp;nbsp; When I enabled http debug as well I get this:&lt;/P&gt;
&lt;P&gt;ciscoasav01# test aaa-server authentication LDAP host 10.100.100.5 userna$&lt;BR /&gt;Password: HTTP: Periodic admin session check (idle-timeout = 1200, session-timeout = 0)&lt;BR /&gt;****************&lt;BR /&gt;INFO: Attempting Authentication test to IP address (10.100.100.5) (timeout: 20 seconds)&lt;/P&gt;
&lt;P&gt;[-2147483626] Session Start&lt;BR /&gt;[-2147483626] New request Session, context 0x00007f1eb01da658, reqType = Authentication&lt;BR /&gt;[-2147483626] Fiber started&lt;BR /&gt;[-2147483626] Creating LDAP context with uri=ldaps://10.100.100.5:636&lt;BR /&gt;[-2147483626] TLS Connection to LDAP server: ldaps://10.100.100.5:636, status = Failed&lt;BR /&gt;[-2147483626] Unable to read rootDSE. Can't contact LDAP server.&lt;BR /&gt;[-2147483626] Fiber exit Tx=0 bytes Rx=0 bytes, status=-3&lt;BR /&gt;[-2147483626] Session End&lt;BR /&gt;ERROR: Authentication Server not responding: AAA Server has been removed&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 16:18:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087885#M1112042</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T16:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087899#M1112044</link>
      <description>&lt;P&gt;i still see 10.100.100.5 - can you configure 10.100.100.4 and psot the debug&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 16:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087899#M1112044</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-05-02T16:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087911#M1112047</link>
      <description>&lt;P&gt;I pulled 100.4 out for now, but here is the debug I pulled while testing against it last night:&lt;/P&gt;
&lt;P&gt;ciscoasav01(config)# debug ldap 255&lt;BR /&gt;debug ldap enabled at level 255&lt;/P&gt;
&lt;P&gt;ciscoasav01(config)# debug ldap 255 &lt;BR /&gt;ciscoasav01(config)# test aaa-server authentication LDAP host 10.220.100.4 username ittest password mypassword&lt;BR /&gt;INFO: Attempting Authentication test to IP address (10.220.100.4) (timeout: 20 seconds)&lt;/P&gt;
&lt;P&gt;[-2147483641] Session Start&lt;BR /&gt;[-2147483641] New request Session, context 0x00007f07ec3991a8, reqType = Authentication&lt;BR /&gt;[-2147483641] Fiber started&lt;BR /&gt;[-2147483641] Creating LDAP context with uri=ldaps://10.220.100.4:636&lt;BR /&gt;[-2147483641] TLS Connection to LDAP server: ldaps://10.220.100.4:636, status = Failed&lt;BR /&gt;[-2147483641] Unable to read rootDSE. Can't contact LDAP server.&lt;BR /&gt;[-2147483641] Fiber exit Tx=0 bytes Rx=0 bytes, status=-3&lt;BR /&gt;[-2147483641] Session End&lt;BR /&gt;ERROR: Authentication Server not responding: AAA Server has been removed&lt;/P&gt;
&lt;P&gt;ciscoasav01(config)#&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 16:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087911#M1112047</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T16:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087922#M1112048</link>
      <description>&lt;P&gt;friend again the SSL need cert. and root CA to work, it not simply use password&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 16:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087922#M1112048</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-02T16:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087924#M1112050</link>
      <description>&lt;P&gt;I have the root CA imported into the ASA CA certificates.&amp;nbsp; The DC (100.4) is also the Certificate Authority.&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 16:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087924#M1112050</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T16:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087933#M1112052</link>
      <description>&lt;P&gt;but Root CA cert not use via auth you need I think one more cert&lt;/P&gt;
&lt;P&gt;check work ASA see how many Cert it have&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 17:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087933#M1112052</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-02T17:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087970#M1112053</link>
      <description>&lt;P&gt;On the working unit I don't see the certificate for the internal CA; actually the only certificates are see are 3rd party CAs from well-known sources and the identity certificates for the firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 17:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087970#M1112053</guid>
      <dc:creator>mumbles202</dc:creator>
      <dc:date>2024-05-02T17:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA integration with Active Directory using LDAPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087976#M1112054</link>
      <description>&lt;P&gt;this answer your Q&lt;/P&gt;
&lt;P&gt;the Server use Identity Cert Issue by 3rd party CA and work ASA use it to connect to Server via SSL.&lt;BR /&gt;make double check in server see which Cert. it use and issue of this cert.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Goodluck friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 17:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-integration-with-active-directory-using-ldaps/m-p/5087976#M1112054</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-02T17:45:05Z</dc:date>
    </item>
  </channel>
</rss>

