<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL VPN RADIUS AD Groups in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996873#M452286</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS (LAN) host 10.20.1.4&lt;BR /&gt; key *****&lt;BR /&gt;aaa authentication ssh console RADIUS LOCAL&lt;BR /&gt;aaa authentication telnet console RADIUS LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;BR /&gt; enable CMS&lt;BR /&gt; svc image disk0:/anyconnect-win-3.0.5080-k9.pkg 1 regex "Windows NT"&lt;BR /&gt; svc image disk0:/anyconnect-macosx-i386-3.0.5080-k9.pkg 2 regex "Intel Mac OS X"&lt;BR /&gt; svc enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt;group-policy VPN_Email_Only internal&lt;BR /&gt;group-policy VPN_Email_Only attributes&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; group-lock value CL_Email_Only_CxProf&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Email_Only&lt;BR /&gt;&amp;nbsp; customization value Email_Only_Customization&lt;BR /&gt;group-policy VPN_Client_Based internal&lt;BR /&gt;group-policy VPN_Client_Based attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 10.20.1.2 10.20.1.3&lt;BR /&gt; dhcp-network-scope 10.20.95.0&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; group-lock value CB_Full_VPN_CxProf&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel&lt;BR /&gt; default-domain value ***Deleted***.com&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc dtls enable&lt;BR /&gt;&amp;nbsp; svc mtu 1406&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive 20&lt;BR /&gt;&amp;nbsp; svc compression none&lt;BR /&gt;&amp;nbsp; svc modules none&lt;BR /&gt;&amp;nbsp; customization value Client_Based_Customization&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;BR /&gt;&amp;nbsp; svc df-bit-ignore disable&lt;BR /&gt;&amp;nbsp; always-on-vpn profile-setting&lt;BR /&gt;group-policy VPNUsers internal&lt;BR /&gt;group-policy VPNUsers attributes&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; group-lock value CL_Full_VPN_CxProf&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Full_VPN&lt;BR /&gt;&amp;nbsp; customization value Clientless_Customization&lt;BR /&gt;username inghrjt password ***Deleted*** encrypted privilege 0&lt;BR /&gt;tunnel-group CL_Full_VPN_CxProf type remote-access&lt;BR /&gt;tunnel-group CL_Full_VPN_CxProf general-attributes&lt;BR /&gt; authentication-server-group RADIUS&lt;BR /&gt; default-group-policy VPNUsers&lt;BR /&gt; dhcp-server 10.20.1.4&lt;BR /&gt; password-management&lt;BR /&gt;tunnel-group CL_Full_VPN_CxProf webvpn-attributes&lt;BR /&gt; customization Clientless_Customization&lt;BR /&gt; group-alias Clientless enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CL"&gt;https://***Deleted***/CL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cl"&gt;https://***Deleted***/cl&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CL"&gt;https://***Deleted***/CL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cl"&gt;https://***Deleted***/cl&lt;/A&gt; enable&lt;BR /&gt;tunnel-group CL_Email_Only_CxProf type remote-access&lt;BR /&gt;tunnel-group CL_Email_Only_CxProf general-attributes&lt;BR /&gt; authentication-server-group RADIUS&lt;BR /&gt; default-group-policy VPN_Email_Only&lt;BR /&gt; dhcp-server 10.20.1.4&lt;BR /&gt; password-management&lt;BR /&gt;tunnel-group CL_Email_Only_CxProf webvpn-attributes&lt;BR /&gt; customization Email_Only_Customization&lt;BR /&gt; group-alias Email enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/EMAIL"&gt;https://***Deleted***/EMAIL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/email"&gt;https://***Deleted***/email&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/EMAIL"&gt;https://***Deleted***/EMAIL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/email"&gt;https://***Deleted***/email&lt;/A&gt; enable&lt;BR /&gt;tunnel-group CB_Full_VPN_CxProf type remote-access&lt;BR /&gt;tunnel-group CB_Full_VPN_CxProf general-attributes&lt;BR /&gt; authentication-server-group RADIUS&lt;BR /&gt; default-group-policy VPN_Client_Based&lt;BR /&gt; dhcp-server 10.20.1.4&lt;BR /&gt; password-management&lt;BR /&gt;tunnel-group CB_Full_VPN_CxProf webvpn-attributes&lt;BR /&gt; group-alias Client enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CB"&gt;https://***Deleted***/CB&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cb"&gt;https://***Deleted***/cb&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CB"&gt;https://***Deleted***/CB&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cb"&gt;https://***Deleted***/cb&lt;/A&gt; enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Aug 2012 18:50:04 GMT</pubDate>
    <dc:creator>nn7963</dc:creator>
    <dc:date>2012-08-15T18:50:04Z</dc:date>
    <item>
      <title>SSL VPN RADIUS AD Groups</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996871#M452272</link>
      <description>&lt;P&gt;We have an ASA 5520 configured with Premium SSL VPN licenses. We've configured clientless and client based SSL VPN access. The VPN users are authenticated against a 2008 AD domain via a 2008 MS Radius server. My question is "can the users belong to a client-based and clientless AD group"? If we put them in both AD groups only one works. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is running 8.3(2), but we will be upgrading to 8.4(4-1) soon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We also have users in Admin AD groups who can do both clientless and client based VPN connections without even being in the client based or clientless AD groups. We haven't made any mapping of any admin groups from the ASA to RADIUS and then to AD. Is this normal?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996871#M452272</guid>
      <dc:creator>nn7963</dc:creator>
      <dc:date>2019-03-11T23:42:33Z</dc:date>
    </item>
    <item>
      <title>SSL VPN RADIUS AD Groups</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996872#M452278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please share the configs of your ASA. Because i do feel you could have given full privelaged access for the admin in your AD server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate if the given info helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 16:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996872#M452278</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-08-15T16:54:57Z</dc:date>
    </item>
    <item>
      <title>SSL VPN RADIUS AD Groups</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996873#M452286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS (LAN) host 10.20.1.4&lt;BR /&gt; key *****&lt;BR /&gt;aaa authentication ssh console RADIUS LOCAL&lt;BR /&gt;aaa authentication telnet console RADIUS LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;BR /&gt; enable CMS&lt;BR /&gt; svc image disk0:/anyconnect-win-3.0.5080-k9.pkg 1 regex "Windows NT"&lt;BR /&gt; svc image disk0:/anyconnect-macosx-i386-3.0.5080-k9.pkg 2 regex "Intel Mac OS X"&lt;BR /&gt; svc enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt;group-policy VPN_Email_Only internal&lt;BR /&gt;group-policy VPN_Email_Only attributes&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; group-lock value CL_Email_Only_CxProf&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Email_Only&lt;BR /&gt;&amp;nbsp; customization value Email_Only_Customization&lt;BR /&gt;group-policy VPN_Client_Based internal&lt;BR /&gt;group-policy VPN_Client_Based attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 10.20.1.2 10.20.1.3&lt;BR /&gt; dhcp-network-scope 10.20.95.0&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; group-lock value CB_Full_VPN_CxProf&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel&lt;BR /&gt; default-domain value ***Deleted***.com&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc dtls enable&lt;BR /&gt;&amp;nbsp; svc mtu 1406&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive 20&lt;BR /&gt;&amp;nbsp; svc compression none&lt;BR /&gt;&amp;nbsp; svc modules none&lt;BR /&gt;&amp;nbsp; customization value Client_Based_Customization&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;BR /&gt;&amp;nbsp; svc df-bit-ignore disable&lt;BR /&gt;&amp;nbsp; always-on-vpn profile-setting&lt;BR /&gt;group-policy VPNUsers internal&lt;BR /&gt;group-policy VPNUsers attributes&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; group-lock value CL_Full_VPN_CxProf&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Full_VPN&lt;BR /&gt;&amp;nbsp; customization value Clientless_Customization&lt;BR /&gt;username inghrjt password ***Deleted*** encrypted privilege 0&lt;BR /&gt;tunnel-group CL_Full_VPN_CxProf type remote-access&lt;BR /&gt;tunnel-group CL_Full_VPN_CxProf general-attributes&lt;BR /&gt; authentication-server-group RADIUS&lt;BR /&gt; default-group-policy VPNUsers&lt;BR /&gt; dhcp-server 10.20.1.4&lt;BR /&gt; password-management&lt;BR /&gt;tunnel-group CL_Full_VPN_CxProf webvpn-attributes&lt;BR /&gt; customization Clientless_Customization&lt;BR /&gt; group-alias Clientless enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CL"&gt;https://***Deleted***/CL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cl"&gt;https://***Deleted***/cl&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CL"&gt;https://***Deleted***/CL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cl"&gt;https://***Deleted***/cl&lt;/A&gt; enable&lt;BR /&gt;tunnel-group CL_Email_Only_CxProf type remote-access&lt;BR /&gt;tunnel-group CL_Email_Only_CxProf general-attributes&lt;BR /&gt; authentication-server-group RADIUS&lt;BR /&gt; default-group-policy VPN_Email_Only&lt;BR /&gt; dhcp-server 10.20.1.4&lt;BR /&gt; password-management&lt;BR /&gt;tunnel-group CL_Email_Only_CxProf webvpn-attributes&lt;BR /&gt; customization Email_Only_Customization&lt;BR /&gt; group-alias Email enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/EMAIL"&gt;https://***Deleted***/EMAIL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/email"&gt;https://***Deleted***/email&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/EMAIL"&gt;https://***Deleted***/EMAIL&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/email"&gt;https://***Deleted***/email&lt;/A&gt; enable&lt;BR /&gt;tunnel-group CB_Full_VPN_CxProf type remote-access&lt;BR /&gt;tunnel-group CB_Full_VPN_CxProf general-attributes&lt;BR /&gt; authentication-server-group RADIUS&lt;BR /&gt; default-group-policy VPN_Client_Based&lt;BR /&gt; dhcp-server 10.20.1.4&lt;BR /&gt; password-management&lt;BR /&gt;tunnel-group CB_Full_VPN_CxProf webvpn-attributes&lt;BR /&gt; group-alias Client enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CB"&gt;https://***Deleted***/CB&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cb"&gt;https://***Deleted***/cb&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/CB"&gt;https://***Deleted***/CB&lt;/A&gt; enable&lt;BR /&gt; group-url &lt;A href="https://***Deleted***/cb"&gt;https://***Deleted***/cb&lt;/A&gt; enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 18:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996873#M452286</guid>
      <dc:creator>nn7963</dc:creator>
      <dc:date>2012-08-15T18:50:04Z</dc:date>
    </item>
    <item>
      <title>SSL VPN RADIUS AD Groups</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996874#M452290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Any thoughts on why the admin AD users can connect to client and clientless without being in the client and/or clientless AD groups with specific VPN permission?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 14:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-radius-ad-groups/m-p/1996874#M452290</guid>
      <dc:creator>nn7963</dc:creator>
      <dc:date>2012-08-21T14:26:18Z</dc:date>
    </item>
  </channel>
</rss>

