<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I did try that (see in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464973#M268263</link>
    <description>&lt;P&gt;I did try that (see screenshot) but it still isn't being applied correclty. User can still connect &amp;amp; ping local servers. I have a feeling for some reason LDAP is passing the memberof correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Mar 2014 14:10:25 GMT</pubDate>
    <dc:creator>itsupport</dc:creator>
    <dc:date>2014-03-18T14:10:25Z</dc:date>
    <item>
      <title>Dynamic access policy ACL not beeing applied to user</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464971#M268259</link>
      <description>&lt;P&gt;Trying to setup dynamic access policy to restrict some users from being able to get on VPN. Our default policy allows everybody on VPN, we just need to exclude a small number of contractors. I created an AD group called NoVPN &amp;amp; put a new test user into it (testnovpn)&lt;/P&gt;&lt;P&gt;I'll created a new dynamic access policy &amp;amp; set the ldap.MemberOf = NoVpn (which is an Active Directory group) &amp;amp; to then terminate.&lt;/P&gt;&lt;P&gt;But this user can still connect to VPN. Config looks like following &amp;amp; the ASA is able to query for LDAP groups just fine if I click edit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/screen_shot_2014-03-17_at_4.33.05_pm.png" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;Debug attached, I don't see any reference to the LDAP group?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;# debug dap trace&lt;/P&gt;&lt;P class="p1"&gt;debug dap trace enabled at level 1&lt;/P&gt;&lt;P class="p1"&gt;# debug ldap 255&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;debug ldap&amp;nbsp; enabled at level 255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["7"]["1"]="1"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa.radius["7"]["1"], value = "1"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["6"]["1"]="2"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa.radius["6"]["1"], value = "2"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["25"]["1"] contains binary data&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["8209"]["1"] contains binary data&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["8208"]["1"] contains binary data&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["8218"]["1"]=""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa.radius["8218"]["1"], value = ""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["grouppolicy"]="DfltGrpPolicy"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["grouppolicy"], value = "DfltGrpPolicy"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["username"]="testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["username"], value = "testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["username1"]="testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["username1"], value = "testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["username2"]=""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["username2"], value = ""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["tunnelgroup"]="companyemployee"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["tunnelgroup"], value = "companyemployee"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["sceprequired"]="false"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["sceprequired"], value = "false"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:endpoint["application"]["clienttype"]="AnyConnect"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = endpoint["application"]["clienttype"], value = "AnyConnect"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_install_endpoint_data_to_lua:endpoint.anyconnect.clientversion="3.1.04063"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = endpoint.anyconnect.clientversion, value = "3.1.04063"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_install_endpoint_data_to_lua:endpoint.anyconnect.platform="mac-intel"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = endpoint.anyconnect.platform, value = "mac-intel"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: Username: testnovpn, Selected DAPs:&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_process_selected_daps: selected 0 records&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: Username: testnovpn, dap_aggregate_attr: rec_count = 1&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: Username: testnovpn, Selected DAPs: DfltAccessPolicy&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["7"]["1"]="1"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa.radius["7"]["1"], value = "1"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["6"]["1"]="2"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa.radius["6"]["1"], value = "2"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["25"]["1"] contains binary data&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["8209"]["1"] contains binary data&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["8208"]["1"] contains binary data&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa.radius["8218"]["1"]=""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa.radius["8218"]["1"], value = ""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["grouppolicy"]="DfltGrpPolicy"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["grouppolicy"], value = "DfltGrpPolicy"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["username"]="testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["username"], value = "testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["username1"]="testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["username1"], value = "testnovpn"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["username2"]=""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["username2"], value = ""&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["tunnelgroup"]="companyemployee"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["tunnelgroup"], value = "companyemployee"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:aaa["cisco"]["sceprequired"]="false"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = aaa["cisco"]["sceprequired"], value = "false"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_add_to_lua_tree:endpoint["application"]["clienttype"]="AnyConnect"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = endpoint["application"]["clienttype"], value = "AnyConnect"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_install_endpoint_data_to_lua:endpoint.anyconnect.clientversion="3.1.04063"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = endpoint.anyconnect.clientversion, value = "3.1.04063"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_install_endpoint_data_to_lua:endpoint.anyconnect.platform="mac-intel"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: name = endpoint.anyconnect.platform, value = "mac-intel"&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: Username: testnovpn, Selected DAPs:&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: dap_process_selected_daps: selected 0 records&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: Username: testnovpn, dap_aggregate_attr: rec_count = 1&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: Username: testnovpn, Selected DAPs: DfltAccessPolicy&lt;/P&gt;&lt;P class="p1"&gt;DAP_TRACE: Username: testnovpn, DAP_close: 7FFF37FDCE30&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464971#M268259</guid>
      <dc:creator>itsupport</dc:creator>
      <dc:date>2019-03-12T03:57:23Z</dc:date>
    </item>
    <item>
      <title>What do you have under the</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464972#M268260</link>
      <description>&lt;P&gt;What do you have under the Network ACL Filters (client) tab? &amp;nbsp;Did you create an deny any any ACL under the ACL Manager and then Add that to this profile under the Network ACL Filters tab?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 01:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464972#M268260</guid>
      <dc:creator>brianhill88</dc:creator>
      <dc:date>2014-03-18T01:08:25Z</dc:date>
    </item>
    <item>
      <title>I did try that (see</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464973#M268263</link>
      <description>&lt;P&gt;I did try that (see screenshot) but it still isn't being applied correclty. User can still connect &amp;amp; ping local servers. I have a feeling for some reason LDAP is passing the memberof correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 14:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464973#M268263</guid>
      <dc:creator>itsupport</dc:creator>
      <dc:date>2014-03-18T14:10:25Z</dc:date>
    </item>
    <item>
      <title>When you go to dynamic access</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464974#M268267</link>
      <description>&lt;P&gt;When you go to dynamic access policies in ASDM is your NoVPN ACL at the top of the list (highest ACL priority)? &amp;nbsp;These get processed in order and if your user is in both groups the first will be taken and the rest ignored.&lt;/P&gt;&lt;P&gt;Also, is your default policy at that bottom of this list deny access?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2014 15:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-policy-acl-not-beeing-applied-to-user/m-p/2464974#M268267</guid>
      <dc:creator>brianhill88</dc:creator>
      <dc:date>2014-03-20T15:58:10Z</dc:date>
    </item>
  </channel>
</rss>

