<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi to All, It works also with in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172279#M359555</link>
    <description>&lt;P&gt;Hi to All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It works also with Linux Radius server ?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Oct 2015 10:26:41 GMT</pubDate>
    <dc:creator>ifabrizio</dc:creator>
    <dc:date>2015-10-09T10:26:41Z</dc:date>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignment without selecting any group-alias from tunnel-group-list .</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172260#M359533</link>
      <description>&lt;P&gt;Objective is that anyconnect user dont have to select Group-alias, so when a user enters its username and password it should go to its specific tunnel-group and group-policy. as i have removed this command in webvpn "no tunnel-group-list enable". doing this i can not login (user does not authenticate).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- My question is why its not happening ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution:&lt;/P&gt;&lt;P&gt;If i keep only one tunnel-group default and make multiple group-policies and assign each user with its specific group-policy than it works. means in user attribute i only issue following commands than it works but if i put "group-lock value test-tunnel" than it does not login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please explain why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; cache-fs limit 50&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-3.0.10055-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy test-gp internal&lt;/P&gt;&lt;P&gt;group-policy test-gp attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt; address-pools value test-pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username test password test&lt;/P&gt;&lt;P&gt;username test attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc&lt;/P&gt;&lt;P&gt; group-lock value test-tunnel&lt;/P&gt;&lt;P&gt; vpn-group-policy test-gp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group test-tunnel type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group test-tunnel general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy test-gp&lt;/P&gt;&lt;P&gt;tunnel-group test-tunnel webvpn-attributes&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; group-url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://192.168.168.2/test" target="_blank"&gt;https://192.168.168.2/test&lt;/A&gt;&lt;SPAN&gt; enable&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172260#M359533</guid>
      <dc:creator>john.ebrahim83</dc:creator>
      <dc:date>2019-03-12T01:19:14Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172261#M359534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you have the right solution. You only need to create 1 tunnel-group, and multiple group-policy. Under user attribute, you would then configure the vpn group policy that you would like the user assigned too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also authenticate users against AD and configure ldap attribute map to automatically map user to a specific group policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample config if you happen to have AD and will authenticate against AD:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808d1a7c.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808d1a7c.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Mar 2013 08:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172261#M359534</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-03-26T08:57:54Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172262#M359535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;but if i put "group-lock value test-tunnel" than it does not login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;If the &lt;EM&gt;test-tunnel&lt;/EM&gt; isn't your default tunnel group, then it happens because group-lock feature only binds user to the group, but doesn't assign that group to the user. I.e. with group-lock user will only be able to access throug that connection-profile, but if he or she at the same time falls into default group, wich is not the one the user locked to, the login will fail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Mar 2013 11:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172262#M359535</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-03-26T11:59:05Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172263#M359536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Let me check and get back to you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 00:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172263#M359536</guid>
      <dc:creator>amekulka</dc:creator>
      <dc:date>2013-03-27T00:26:45Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172264#M359537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Both answers are correct. Further, as Jennifer mentioned, authenticating against an AD v/s the local auth, as listed, would provide you the answer you are looking for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 23:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172264#M359537</guid>
      <dc:creator>amekulka</dc:creator>
      <dc:date>2013-03-27T23:01:42Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172265#M359538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ameet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also same issue now, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I have different tunnel-groups, and different group-policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User obtains ip dedicated for it under the group-policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the login page user choose the LDAP OU group ( group-alias) and connects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I do not know how to restrict the user from one group to connect to another group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any solution for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Tural&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 11:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172265#M359538</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-22T11:24:39Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172266#M359539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Tural, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I work with Ameet and wanted to chime in.&amp;nbsp; If I understand you correctly you have multiple tunnel-groups/connection profiles each with its own group-policy.&amp;nbsp; You have IP pools assigned on the group-policys&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A good solution&amp;nbsp; is the option Jennifer pointed out above which is to use only a single tunnel-group/connection profile and utilize a ldap attribute map to dynamically assign the group-policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the same authentication method for each tunnel-group/connection profile there is nothing stopping a user from selecting the the tunnel group and authenticating then obviously being assigned the group-policy and eventually the IP which I am thinking is what you want to avoid because you may be using a different pool per group-policy and then restricting access based on that ip range ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 02:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172266#M359539</guid>
      <dc:creator>pcarco</dc:creator>
      <dc:date>2013-11-25T02:51:02Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172267#M359541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, pcarco,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly, you understood correcctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually it does not matter for me how many tunnel groups and group policies I have to configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing is that I have my users from different AD/LDAP OU could connect (without selecting the group on the anyconnect vpn drop-down) and obtains their own ip, and accordingly I could put acls agains those pools (if i will need) on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that it is very easy If I use ACS as a Radius Servers, But I do not have it. Just AD/LDAP and ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I understood from your coments, I have to create different authentication methods for each OU in order they would connect their own tunnel and group-policy ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Tural &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 06:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172267#M359541</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-25T06:42:34Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172268#M359543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tural,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my opinion since you are using AD/LDAP&amp;nbsp; for authentication for all users&amp;nbsp; that you do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) Configure the&amp;nbsp; default tunnel-group/connection profile to authenticate to your AD server.&lt;/P&gt;&lt;P&gt; (disable the other tunnel-groups for testing) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.) Configure the default tunnel-group/connection profile to use the default group policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.) Configure multiple group policies on the ASA for the users you want to segregate &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.) Create an LDAP attribute map&amp;nbsp; (see my CLI&amp;nbsp; example) &lt;/P&gt;&lt;P&gt;(ASDM) &lt;EM&gt;&lt;STRONG&gt;Configuration &amp;gt; Remote Access VPN &amp;gt; AAA/Local Users &amp;gt; LDAP Attribute Map&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;ASA-tme# sho run ldap attribute-map &lt;/P&gt;&lt;P&gt;ldap attribute-map Test_Map&amp;nbsp; &lt;STRONG&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; map that is associated with aaa-server&amp;gt;&amp;gt;&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy &lt;STRONG&gt;&amp;lt;&amp;lt;&lt;MAPS memberof="" attribute="" to="" an="" asa="" group-policy=""&gt;&amp;gt;&amp;gt;&lt;/MAPS&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf &lt;STRONG&gt;CN=engineering&lt;/STRONG&gt;,CN=Users,DC=Cisco,DC=tme,DC=com &lt;STRONG&gt;engineering-GP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf &lt;STRONG&gt;CN=marketing&lt;/STRONG&gt;,CN=Users,DC=Cisco,DC=tme,DC=com &lt;STRONG&gt;Marketing-GP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( users that are a member of the AD group 'engineering' will be mapped to ASA group policy 'engineering-GP' etc....) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5.) Configure your AAA-Server entry for your AD server to use your newly created LDAP Attribute Map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-tme# sho run aaa-server &lt;BR /&gt;aaa-server LDAP protocol ldap&lt;BR /&gt;aaa-server LDAP (Inside) host 172.16.1.20&lt;BR /&gt;ldap-base-dn DC=cisco,DC=tme,DC=com&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute SAMAccountName&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn CN=Administrator,CN=users,DC=cisco,DC=tme,DC=com&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map &lt;STRONG&gt;Test_Map&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; map associated to aaa-server&amp;gt;&amp;gt;&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The expected user experience would be that all users connect to the FQDN of your ASA and are no longer required to use the pull down or a group-url to choose a tunnel-group/connection profile.&amp;nbsp;&amp;nbsp; The users login to Active Directory and the ldap attribute map will put the users in the correct group-policy where you have configured the appropriate policy for the users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the CLI if you use&amp;nbsp;&amp;nbsp; 'debug ldap 255' during a users establishing a session you will be able to view the mapping taking place. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Paul &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 15:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172268#M359543</guid>
      <dc:creator>pcarco</dc:creator>
      <dc:date>2013-11-25T15:02:17Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172269#M359545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for detailed explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already configured the way that you advised, but it did not work for me. Only works when I enable group-tunnel-list(drop down) and group-alias. As I mentioned we do not want that user see the groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;When I disable it, user connects only to defult tunne-groups/connections and group-policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I think my mistake is on the AD/LDAP side.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;My question is:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;In you commets, the &lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;CN=engineering and &lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;CN=marketing&lt;/STRONG&gt;&lt;/STRONG&gt; are the OUs created on the AD, or Security Groups&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thank you in advance for your help Paul&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Kindly Tural&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 19:00:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172269#M359545</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-25T19:00:41Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172270#M359546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are welcome.&amp;nbsp;&amp;nbsp; In my lab set up on my AD server&amp;nbsp; the group is defined under users and the group scope is global and group type is Security Group.&amp;nbsp;&amp;nbsp; Then my user account is a memberOF one of the groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see the groups that the ASA can glean from your ASA - add a dap policy and do the following.&amp;nbsp; You do not need this as part of your configuration just a tip to see the groups. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DAP screenshot below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/4/5/167549-dap-ad.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 19:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172270#M359546</guid>
      <dc:creator>pcarco</dc:creator>
      <dc:date>2013-11-25T19:29:50Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172271#M359547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, Paul, I will check it tomorrow, and I have more hopes now that it will work, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It becomes more clear to me now, I have to check the AD again, I hope it will work with this configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you ones again for willing to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is kind of you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will come back with the result tomorrow, Paul.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Tural&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 19:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172271#M359547</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-25T19:53:37Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172272#M359548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today I spent half of my day to it, the bad news is that it didnot work for me.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While configuring the DAP it says that I have to enable CSD, did you also enable it in your lab?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Tural&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/1/6/167611-CSD.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 19:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172272#M359548</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-26T19:08:14Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172273#M359549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have it enabled but you only need enabled if you are trying to create DAP policy using an attibute tied to the host scan criteria.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you debug ldap 255 during a session establishment to view what was going on ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;post the the output of&amp;nbsp; a&amp;nbsp; 'sho run aaa-server'&amp;nbsp; and ' sho run ldap attribute-map''&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 20:28:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172273#M359549</guid>
      <dc:creator>pcarco</dc:creator>
      <dc:date>2013-11-26T20:28:32Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172274#M359550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;What type of ldap-server do you use? With Microsoft Windows 2012 i got a problem, that only the administrator user will mapped to the correct group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With other users, there are no groups shown in the "debug ldap 255" and so also no mapping to the correct group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 23:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172274#M359550</guid>
      <dc:creator>pf</dc:creator>
      <dc:date>2013-11-26T23:55:45Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172275#M359551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my configuration, could you please check and let me know What is my mistake here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My user coneects only to the defult tunnel/connection profile&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also see debug output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;dsquery group domainroot -name Tural*&lt;/P&gt;&lt;P&gt;"CN=Tural,OU=test,OU=Corporat,DC=xxxx,DC=com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;dsquery group domainroot -name Rasim*&lt;/P&gt;&lt;P&gt;"CN=Rasim,OU=test1,OU=Corporat,DC=xxxx,DC=com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;dsquery user -name test*&lt;/P&gt;&lt;P&gt;"CN=test,OU=test,OU=Corporat,DC=xxxx,DC=com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;======================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record Tural&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt; action terminate&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record Rasim&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map CISCOMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf Rasim CN=Rasim,OU=test1,OU=Corporat,DC=xxxx,DC=com&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf Tural CN=Tural,OU=test,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LDAP_AUTHENT protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAP_AUTHENT (inside) host x.x.x.x&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=xxxx,dc=com&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn cn=admin,cn=Users,dc=xxxx,dc=com&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map CISCOMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=========================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP_AUTHENT&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; authentication-server-group (inside) LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; authorization-server-group LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; authorization-server-group (inside) LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; authorization-required&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group test1 type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group test1 general-attributes&lt;/P&gt;&lt;P&gt; address-pool VIP-POOL1&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; authorization-server-group LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; default-group-policy Rasim&lt;/P&gt;&lt;P&gt; authorization-required&lt;/P&gt;&lt;P&gt; authentication-attr-from-server secondary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group test type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group test general-attributes&lt;/P&gt;&lt;P&gt; address-pool VIP-POOL&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; authorization-server-group LDAP_AUTHENT&lt;/P&gt;&lt;P&gt; default-group-policy Tural&lt;/P&gt;&lt;P&gt; authorization-required&lt;/P&gt;&lt;P&gt; authentication-attr-from-server secondary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value xxxxxxx&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VIP-SPLIT&lt;/P&gt;&lt;P&gt; default-domain value xxxx.com&lt;/P&gt;&lt;P&gt; split-dns value xxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Rasim internal&lt;/P&gt;&lt;P&gt;group-policy Rasim attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value xxxxxx&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT&lt;/P&gt;&lt;P&gt; default-domain value xxx&lt;/P&gt;&lt;P&gt; split-dns value 10.241.17.63&lt;/P&gt;&lt;P&gt; address-pools value VIP-POOL1&lt;/P&gt;&lt;P&gt;default-domain value xxxx.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Tural internal&lt;/P&gt;&lt;P&gt;group-policy Tural attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value xxxxx&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT&lt;/P&gt;&lt;P&gt; default-domain value xxxx.com&lt;/P&gt;&lt;P&gt; split-dns value xxxxx&lt;/P&gt;&lt;P&gt; address-pools value VIP-POOL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;====================================================&lt;/P&gt;&lt;P&gt;[536] Session Start&lt;/P&gt;&lt;P&gt;[536] New request Session, context 0x00007ffd8fe92cb8, reqType = Authentication&lt;/P&gt;&lt;P&gt;[536] Fiber started&lt;/P&gt;&lt;P&gt;[536] Creating LDAP context with uri=ldap://10.241.17.64:389&lt;/P&gt;&lt;P&gt;[536] Connect to LDAP server: ldap://10.241.17.64:389, status = Successful&lt;/P&gt;&lt;P&gt;[536] supportedLDAPVersion: value = 3&lt;/P&gt;&lt;P&gt;[536] supportedLDAPVersion: value = 2&lt;/P&gt;&lt;P&gt;[536] Binding as admin&lt;/P&gt;&lt;P&gt;[536] Performing Simple authentication for admin to 10.241.17.64&lt;/P&gt;&lt;P&gt;[536] LDAP Search:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [DC=xxxxx,DC=com]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=test1]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;/P&gt;&lt;P&gt;[536] User DN = [CN=test1,OU=test1,OU=Corporat,DC=xxxxx,DC=com]&lt;/P&gt;&lt;P&gt;[536] Talking to Active Directory server 10.241.17.64&lt;/P&gt;&lt;P&gt;[536] Reading password policy for test1, dn:CN=test1,OU=test1,OU=Corporat,DC=xxx,DC=xxx&lt;/P&gt;&lt;P&gt;[536] Read bad password count 0&lt;/P&gt;&lt;P&gt;[536] Binding as test1&lt;/P&gt;&lt;P&gt;[536] Performing Simple authentication for test1 to 10.241.17.64&lt;/P&gt;&lt;P&gt;[536] Processing LDAP response for user test1&lt;/P&gt;&lt;P&gt;[536] Message (test1):&lt;/P&gt;&lt;P&gt;[536] Authentication successful for test1 to 10.241.17.64&lt;/P&gt;&lt;P&gt;[536] Retrieved User Attributes:&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; cn: value = test1&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; givenName: value = test1&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=test1,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; whenCreated: value = 20131126115004.0Z&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; whenChanged: value = 20131126122310.0Z&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; displayName: value = test1&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; uSNCreated: value = 9235760040&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; memberOf: value = CN=Rasim,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to IETF-Radius-Class: value = CN=Rasim,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=Rasim,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; uSNChanged: value = 9236081181&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; name: value = test1&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; objectGUID: value = 5....\.B....d..a&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; userAccountControl: value = 512&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; badPasswordTime: value = 0&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; lastLogon: value = 0&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; pwdLastSet: value = 130299402043656468&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; objectSid: value = ............V..W.../....."..&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; logonCount: value = 0&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; sAMAccountName: value = test1&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[536]&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:test1@megafontj.tj"&gt;test1@megafontj.tj&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 16010101000000.0Z&lt;/P&gt;&lt;P&gt;[536]&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 130299421909985288&lt;/P&gt;&lt;P&gt;[536] Fiber exit Tx=549 bytes Rx=2505 bytes, status=1&lt;/P&gt;&lt;P&gt;[536] Session End&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[537] Session Start&lt;/P&gt;&lt;P&gt;[537] New request Session, context 0x00007ffd8fe92cb8, reqType = Other&lt;/P&gt;&lt;P&gt;[537] Fiber started&lt;/P&gt;&lt;P&gt;[537] Creating LDAP context with uri=ldap://10.241.17.64:389&lt;/P&gt;&lt;P&gt;[537] Connect to LDAP server: ldap://10.241.17.64:389, status = Successful&lt;/P&gt;&lt;P&gt;[537] supportedLDAPVersion: value = 3&lt;/P&gt;&lt;P&gt;[537] supportedLDAPVersion: value = 2&lt;/P&gt;&lt;P&gt;[537] Binding as admin&lt;/P&gt;&lt;P&gt;[537] Performing Simple authentication for admin to 10.241.17.64&lt;/P&gt;&lt;P&gt;[537] LDAP Search:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [DC=xxxxx,DC=com]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=test1]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;/P&gt;&lt;P&gt;[537] User DN = [CN=test1,OU=test1,OU=Corporat,DC=xxxxx,DC=com]&lt;/P&gt;&lt;P&gt;[537] Talking to Active Directory server 10.241.17.64&lt;/P&gt;&lt;P&gt;[537] Reading password policy for test1, dn:CN=test1,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[537] Read bad password count 0&lt;/P&gt;&lt;P&gt;[537] LDAP Search:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Base DN = [DC=xxxxx,DC=com]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Filter&amp;nbsp; = [sAMAccountName=test1]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scope&amp;nbsp;&amp;nbsp; = [SUBTREE]&lt;/P&gt;&lt;P&gt;[537] Retrieved User Attributes:&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; objectClass: value = top&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; objectClass: value = person&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; objectClass: value = organizationalPerson&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; objectClass: value = user&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; cn: value = test1&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; givenName: value = test1&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; distinguishedName: value = CN=test1,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; instanceType: value = 4&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; whenCreated: value = 20131126115004.0Z&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; whenChanged: value = 20131126122310.0Z&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; displayName: value = test1&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; uSNCreated: value = 9235760040&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; memberOf: value = CN=Rasim,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to IETF-Radius-Class: value = CN=Rasim,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mapped to LDAP-Class: value = CN=Rasim,OU=test1,OU=Corporat,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; uSNChanged: value = 9236081181&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; name: value = test1&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; objectGUID: value = 5....\.B....d..a&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; userAccountControl: value = 512&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; badPwdCount: value = 0&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; codePage: value = 0&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; countryCode: value = 0&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; badPasswordTime: value = 0&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; lastLogoff: value = 0&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; lastLogon: value = 0&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; pwdLastSet: value = 130299402043656468&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; primaryGroupID: value = 513&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; objectSid: value = ............V..W.../....."..&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; accountExpires: value = 9223372036854775807&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; logonCount: value = 0&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; sAMAccountName: value = test1&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; sAMAccountType: value = 805306368&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[537]&amp;nbsp;&amp;nbsp; userPrincipalName: value = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:test1@megafontj.tj"&gt;test1@megafontj.tj&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; objectCategory: value = CN=Person,CN=Schema,CN=Configuration,DC=xxxxx,DC=com&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; dSCorePropagationData: value = 16010101000000.0Z&lt;/P&gt;&lt;P&gt;[537]&amp;nbsp;&amp;nbsp; lastLogonTimestamp: value = 130299421909985288&lt;/P&gt;&lt;P&gt;[537] Fiber exit Tx=547 bytes Rx=4109 bytes, status=1&lt;/P&gt;&lt;P&gt;[537] Session End&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Tural&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 06:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172275#M359551</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-27T06:55:36Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172276#M359552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using Microsoft 2008, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes my problem is that user is mapped to the default policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 users created : test and test1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But they are not mapped to their own tunnel/connection profile, istead they are mapped to the defualt and obtains ip from the defualt pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Tural&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 07:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172276#M359552</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-27T07:26:00Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172277#M359553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tural&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should only use one tunnel-group and do the mapping to the group-policy and not tunnel-groups:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map sslvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=G_SSLVPN,OU=Service,OU=Groups,OU=Oberbipp,DC=hueslernest,DC=local ssl_admin&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server ldapquerysrv1 protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server ldapquerysrv1 (inside) host 192.168.20.80&lt;/P&gt;&lt;P&gt; server-port 389&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=hueslernest,dc=local&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password M3lanieO3sch!&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=svc_ciscoldap,OU=Service,OU=Users,OU=Oberbipp,DC=hueslernest,DC=local&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map sslvpn&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map sslvpn&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;BR /&gt;&amp;nbsp; map-value memberOf CN=G_SSLVPN,OU=Service,OU=Groups,OU=xxx,DC=xxx,DC=local ssl_admin&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server ldapquerysrv1 protocol ldap&lt;BR /&gt;aaa-server ldapquerysrv1 (inside) host 192.168.20.80&lt;BR /&gt; server-port 389&lt;BR /&gt; ldap-base-dn dc=xxx,dc=local&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password xxxxxx&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=svc_ciscoldap,OU=Service,OU=Users,OU=XXX,DC=xxxx,DC=local&lt;BR /&gt; server-type microsoft&lt;BR /&gt; ldap-attribute-map sslvpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool ssl-clientpool&lt;/P&gt;&lt;P&gt; authentication-server-group (outside) ldapquerysrv1 LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy ssl_noaccess&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; address-pool ssl-clientpool&lt;BR /&gt; authentication-server-group (outside) ldapquerysrv1 LOCAL&lt;BR /&gt; default-group-policy ssl_noaccess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy ssl_admin internal&lt;/P&gt;&lt;P&gt;group-policy ssl_admin attributes&lt;/P&gt;&lt;P&gt; dns-server value x.x.x.x&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 25&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 60&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split_tunnel_ssl&lt;/P&gt;&lt;P&gt; default-domain value xxx&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect keep-installer installed&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ssl rekey time 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ssl rekey method ssl&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles value xxx type user&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;group-policy ssl_admin internal&lt;/P&gt;&lt;P&gt;&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;group-policy ssl_noaccess internal&lt;/P&gt;&lt;P&gt;group-policy ssl_noaccess attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 09:45:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172277#M359553</guid>
      <dc:creator>pf</dc:creator>
      <dc:date>2013-11-27T09:45:04Z</dc:date>
    </item>
    <item>
      <title>Anyconnect user automatic group-policy and tunnel-group assignme</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172278#M359554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I want that different users from different ou could obtain ip from their own ip pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not the same pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IT and HR employees must have diferent pools assigned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will this work with only one tunnel and group-policy ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Tural&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 10:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172278#M359554</guid>
      <dc:creator>TuralLachinov</dc:creator>
      <dc:date>2013-11-27T10:24:43Z</dc:date>
    </item>
    <item>
      <title>Hi to All, It works also with</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172279#M359555</link>
      <description>&lt;P&gt;Hi to All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It works also with Linux Radius server ?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2015 10:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-user-automatic-group-policy-and-tunnel-group/m-p/2172279#M359555</guid>
      <dc:creator>ifabrizio</dc:creator>
      <dc:date>2015-10-09T10:26:41Z</dc:date>
    </item>
  </channel>
</rss>

