<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Way to differentiate Services using a single group of Radius servers on an ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3822135#M31239</link>
    <description>Does creating 2 policies combining the different AD Group + TunnelGroup not give you the desired result? If the user is not connected to the "Internal-Users" AD Group and connected to the "Interal-Users" Tunnel Group then it would not match that rule and move to the next.</description>
    <pubDate>Tue, 19 Mar 2019 15:05:27 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-03-19T15:05:27Z</dc:date>
    <item>
      <title>Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820313#M31180</link>
      <description>&lt;P&gt;Here is the setup.&amp;nbsp; I have a single ASA, and single Microsoft NPS server acting as the Radius server.&amp;nbsp; I would like to have two VPN group profiles on my NPS server, one for each of my two user groups. In the past, I have resorted to using two NPS/Radius servers.&amp;nbsp; On the ASA, I define two Radius server groups and use a different Radius group for each of my two VPN group profiles.&amp;nbsp; Then each NPS/Radius server has different parameters for my two groups.&amp;nbsp; I would like to be able to do this with one NPS/Radius server, but have never found a way to do that.&amp;nbsp; I need to be able to send the Radius login attempts to the Radius server so that I can identify the two different groups on the NPS/Radius server.&amp;nbsp; On a router, I have used two different loopback interfaces, and used a different one for the source of each Radius group, then I can used the client-IP to determine which Network policy to apply, but that isn't an option on an ASA as far as I can tell.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there someway on an ASA, to create two Radius server groups, each using the same Radius server, but pass a parameter to the Radius server so it can differentiate between the two different requests? Something like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;aaa-server RADIUS-1 protocol radius &lt;BR /&gt;aaa-server RADIUS-1 (inside) host 10.1.1.32 &lt;BR /&gt;key h8ha789sdf&lt;BR /&gt;aaa-server RADIUS-1 VSA 26 string Group1&lt;BR /&gt;! &lt;BR /&gt;aaa-server RADIUS-2 protocol radius &lt;BR /&gt;aaa-server RADIUS-2 (inside) host 10.1.1.32 &lt;BR /&gt;key h8ha789sdf&lt;BR /&gt;aaa-server RADIUS-2 VSA 26 string Group2 &lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 16:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820313#M31180</guid>
      <dc:creator>derek.small</dc:creator>
      <dc:date>2019-03-15T16:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820315#M31196</link>
      <description>&lt;P&gt;Hi, can you clarify your requirement please.&lt;BR /&gt;&lt;BR /&gt;What value/parameter are you expecting to see?&lt;BR /&gt;Why can't the RADIUS server already distinguish the different requests?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 17:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820315#M31196</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-15T17:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820488#M31212</link>
      <description>&lt;P&gt;I need to have two different VPN group profiles, and I need each group profile to be treated differently by the NPS server.&amp;nbsp; The only response I can give to your question about why Radius can't distinguish between the different requests is, that is what I'm asking, how can I present the requests to the Radius server so it CAN distinguish between the two different requests. I need a way to let the NPS server distinguish between an authentication request to one VPN group versus the other VPN group.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2019 00:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820488#M31212</guid>
      <dc:creator>derek.small</dc:creator>
      <dc:date>2019-03-16T00:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820595#M31220</link>
      <description>I assume you are referring to Tunnel Groups?&lt;BR /&gt;On the RADIUS server you can determine the Tunnel Group using "Cisco-VPN3000=CVPN3000/ASA/PIX7x-Tunnel-Group-Name" and write a rule to match against the Tunnel Group the user is connecting from.</description>
      <pubDate>Sat, 16 Mar 2019 11:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3820595#M31220</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-16T11:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3821629#M31229</link>
      <description>&lt;P&gt;I think I can make that work.&amp;nbsp; Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2019 23:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3821629#M31229</guid>
      <dc:creator>derek.small</dc:creator>
      <dc:date>2019-03-18T23:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3822123#M31235</link>
      <description>&lt;P&gt;I spoke too soon.&amp;nbsp; It looks like this is passing the VPN group (or tunnel group) name back to the ASA from the NPS server.&amp;nbsp; I need to have two different Network Policies on the NPS server, and have one of them used when a user logs into one VPN group on the ASA, and the other NPS Network policy used when a user logs into the other VPN group on the ASA.&lt;/P&gt;
&lt;P&gt;So to back up a step...&lt;/P&gt;
&lt;P&gt;I want to have two AD groups for remote access.&amp;nbsp; One we'll call "Internal-Users", and a second AD group, we'll call "Vendor-Users".&amp;nbsp; The first group should connect using a VPN-group called "Internal-Users", and the second group should connect using a VPN-group called "Vendor-Users".&amp;nbsp; The "Internal-Users" group would be allowed to access a certain list of resources on the network, and the "Vendor-Users" would be allowed to access a different list of resources.&lt;/P&gt;
&lt;P&gt;In the past I've done this by using two different Radius servers, and each Radius server has an NPS policy which matches a different AD group, but I shouldn't have to have a different set of Radius servers for each VPN group.&amp;nbsp; Why can't I just include something so the Radius/NPS server can distinguish between the two different logins and match one of two different Network Policies on the same Radius/NPS server.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 14:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3822123#M31235</guid>
      <dc:creator>derek.small</dc:creator>
      <dc:date>2019-03-19T14:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3822135#M31239</link>
      <description>Does creating 2 policies combining the different AD Group + TunnelGroup not give you the desired result? If the user is not connected to the "Internal-Users" AD Group and connected to the "Interal-Users" Tunnel Group then it would not match that rule and move to the next.</description>
      <pubDate>Tue, 19 Mar 2019 15:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3822135#M31239</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-19T15:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Way to differentiate Services using a single group of Radius servers on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3822294#M31242</link>
      <description>&lt;P&gt;Sorry found out test user was in a nested AD group which was matching the first NPS Network Policy.&amp;nbsp; Once we got the test accounts set up correctly, this worked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 18:59:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/way-to-differentiate-services-using-a-single-group-of-radius/m-p/3822294#M31242</guid>
      <dc:creator>derek.small</dc:creator>
      <dc:date>2019-03-19T18:59:49Z</dc:date>
    </item>
  </channel>
</rss>

