<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA- SSL / Clientless SSL VPN with NPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998158#M439522</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;If you were to remove the "group-lock" command on a username that needs to belong to multiple tunnel-groups, does this work for you? By the way, just to understand better, why does a user need to belong in multiple tunnel-groups? Please do highlight and enlight?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I asked is because the function of the "group-lock: command is to tie the username down to a fixed set of parameters that's define in the group-policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Jul 2012 19:08:04 GMT</pubDate>
    <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
    <dc:date>2012-07-20T19:08:04Z</dc:date>
    <item>
      <title>ASA- SSL / Clientless SSL VPN with NPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998157#M439521</link>
      <description>&lt;P&gt;On ASA we utilize the group-lock to make sure that a user is logging into the correct tunnel group and match that against the OU attribute the user exists in on the radius server.&amp;nbsp; The issue we have is that some of our users need to belong to multiple groups. Since Radius servers do a top down match on the request, the OU returned is the first group the user belongs to which means each user is stuck in one login option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to get the ASA to end the group-lock value in the OU of the radius request so the server can validate if the user is a member of that group.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998157#M439521</guid>
      <dc:creator>MATHEW KALLELIL</dc:creator>
      <dc:date>2019-03-11T23:30:29Z</dc:date>
    </item>
    <item>
      <title>ASA- SSL / Clientless SSL VPN with NPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998158#M439522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;If you were to remove the "group-lock" command on a username that needs to belong to multiple tunnel-groups, does this work for you? By the way, just to understand better, why does a user need to belong in multiple tunnel-groups? Please do highlight and enlight?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I asked is because the function of the "group-lock: command is to tie the username down to a fixed set of parameters that's define in the group-policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 19:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998158#M439522</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-20T19:08:04Z</dc:date>
    </item>
    <item>
      <title>ASA- SSL / Clientless SSL VPN with NPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998159#M439523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some of our users need to belong to multiple groups, like a Manager for an account that needs to access his agents VPN group for testing and the corporate group in general for enhanced access.&amp;nbsp; Since Radius servers do a top down match on the request, the OU returned is the first group the user belongs to which means each user is stuck in one login option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to get the ASA to send the group-lock value in the OU of the radius request, so the server can validate if the user is a member of that group instead? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 09:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998159#M439523</guid>
      <dc:creator>MATHEW KALLELIL</dc:creator>
      <dc:date>2012-07-22T09:16:55Z</dc:date>
    </item>
    <item>
      <title>ASA- SSL / Clientless SSL VPN with NPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998160#M439524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Is your RADIUS server Cisco ACS 5.X?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 17:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998160#M439524</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-22T17:02:05Z</dc:date>
    </item>
    <item>
      <title>ASA- SSL / Clientless SSL VPN with NPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998161#M439525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, it is Microsoft 2008 Radius server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 17:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998161#M439525</guid>
      <dc:creator>MATHEW KALLELIL</dc:creator>
      <dc:date>2012-07-22T17:26:58Z</dc:date>
    </item>
    <item>
      <title>ASA- SSL / Clientless SSL VPN with NPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998162#M439526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: justify;"&gt;Hi Bro&lt;/P&gt;&lt;P style="text-align: justify;"&gt;As you know, the group-lock feature is simply to map the incoming VPN usernames to a specific tunnel-group, that's all. In that tunnel-group, you would then have the command “authentication-server-group XXXX” pointing the authentication to your Microsoft 2008 Radius server. That’s it. The job of your Cisco ASA is now down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Hence, in your Microsoft 2008 Radius server, which is part of the same domain as your Windows AD, you will need to bind the VPN username/group to multiple OUs. You can even assign these VPN usernames with static DHCP POOL IP. This can be achieved if the Radius server was Cisco ACS v4.2 using the IETF RADIUS Attributes. I believe this is something you’d need to work with your Microsoft 2008 Radius server vendor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2012 10:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-clientless-ssl-vpn-with-nps/m-p/1998162#M439526</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-25T10:34:35Z</dc:date>
    </item>
  </channel>
</rss>

