<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RADIUS based AAA for remote access tunnel groups (remote access  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810041#M492579</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ssh question? Yes, with the LOCAL you are going to keep it with the database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote access VPN Users ( Web clients) question?&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;aaa authentication secure-http-client&lt;BR /&gt;aaa authentication include https outside 60.60.60.60 255.255.255.255 Radius_server&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please rate helpful posts,&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: line-through;"&gt;Julio&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Nov 2011 23:34:17 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2011-11-23T23:34:17Z</dc:date>
    <item>
      <title>RADIUS based AAA for remote access tunnel groups (remote access VPN users)</title>
      <link>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810040#M492577</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;How would I go about configuring RADIUS based AAA for remote access VPN users?&amp;nbsp; I have an OSX RADIUS server and an ASA 5510&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I need to configure something like:&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-GROUP protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-GROUP (inside) A.B.C.D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; key KEYNAME&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(I want to keep console and SSH using LOCAL, so I keep this: "aaa authentication ssh console LOCAL", right?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the rest of the config look like to get RADIUS based AAA for remote access VPN users?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810040#M492577</guid>
      <dc:creator>aimarchitect</dc:creator>
      <dc:date>2019-03-11T21:54:36Z</dc:date>
    </item>
    <item>
      <title>RADIUS based AAA for remote access tunnel groups (remote access</title>
      <link>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810041#M492579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ssh question? Yes, with the LOCAL you are going to keep it with the database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote access VPN Users ( Web clients) question?&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;aaa authentication secure-http-client&lt;BR /&gt;aaa authentication include https outside 60.60.60.60 255.255.255.255 Radius_server&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please rate helpful posts,&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: line-through;"&gt;Julio&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Nov 2011 23:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810041#M492579</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-23T23:34:17Z</dc:date>
    </item>
    <item>
      <title>RADIUS based AAA for remote access tunnel groups (remote access</title>
      <link>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810042#M492580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; font-family: arial, helvetica, sans-serif; font-size: 10pt; text-align: left; padding: 8px;"&gt;Actually, I was looking for the configuration for standalone VPN client remote access users, not web client users. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 19:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810042#M492580</guid>
      <dc:creator>aimarchitect</dc:creator>
      <dc:date>2011-11-28T19:15:02Z</dc:date>
    </item>
    <item>
      <title>RADIUS based AAA for remote access tunnel groups (remote access</title>
      <link>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810043#M492581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Along with the above commands, you need to configure server-group in the 'tunnel-group &lt;NAME&gt; type general-attributes. &lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;'tunnel-group &lt;NAME&gt; type general-attributes&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;authentication-server-group RADIUS-SERVER&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 20:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810043#M492581</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2011-11-28T20:33:45Z</dc:date>
    </item>
    <item>
      <title>RADIUS based AAA for remote access tunnel groups (remote access</title>
      <link>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810044#M492584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks MS!&amp;nbsp; is there a way to configure back-up AAA using the locally configured info if the RADIUS server goes off line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it look something like?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;!&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;'tunnel-group &lt;NAME&gt; type general-attributes&lt;/NAME&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;authentication-server-group RADIUS-SERVER LOCAL&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 20:44:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/radius-based-aaa-for-remote-access-tunnel-groups-remote-access/m-p/1810044#M492584</guid>
      <dc:creator>aimarchitect</dc:creator>
      <dc:date>2011-11-28T20:44:17Z</dc:date>
    </item>
  </channel>
</rss>

