<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC and Remote Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-and-remote-access/m-p/5235482#M1118142</link>
    <description>&lt;P&gt;You add connection profiles (aka "tunnel-groups" in the running-config) within the remote access VPN policy for a given device (or HA pair).&lt;/P&gt;
&lt;P&gt;Once you do that, each can have unique group policies, AAA methods, profiles etc.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Dec 2024 14:29:18 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2024-12-11T14:29:18Z</dc:date>
    <item>
      <title>FMC and Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/fmc-and-remote-access/m-p/5235443#M1118134</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I have an ASA 5516-x that support two different connection profiles off a single device.&amp;nbsp; The remote user has the ability to select the different connection profiles via the Secure Client application.&amp;nbsp; This configuration works fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to implement this same type of configuration on my firepower that is connected to FMC.&amp;nbsp; When I build the two Remote Access profiles it will only let me target the device with one of the connection profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to build two connection profiles each having their own group policy and secure client profile configurations.&amp;nbsp; I want one of the connection profiles to do SAML and the other to do RADIUS.&amp;nbsp; The user would select the dropdown on the Secure Client just like they do today when using the ASA 5516-x.&lt;/P&gt;&lt;P&gt;Thanks for you time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 13:44:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-and-remote-access/m-p/5235443#M1118134</guid>
      <dc:creator>Simple40</dc:creator>
      <dc:date>2024-12-11T13:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: FMC and Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/fmc-and-remote-access/m-p/5235482#M1118142</link>
      <description>&lt;P&gt;You add connection profiles (aka "tunnel-groups" in the running-config) within the remote access VPN policy for a given device (or HA pair).&lt;/P&gt;
&lt;P&gt;Once you do that, each can have unique group policies, AAA methods, profiles etc.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 14:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-and-remote-access/m-p/5235482#M1118142</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-12-11T14:29:18Z</dc:date>
    </item>
  </channel>
</rss>

