<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD Agent setup vs. using aaa ldap for remote access VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758396#M534086</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You must mean something like this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://blog.pbmit.com/asa_identity_fw"&gt;http://blog.pbmit.com/asa_identity_fw&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://blog.pbmit.com/asa_identity_fw2"&gt;http://blog.pbmit.com/asa_identity_fw2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;Conclusion:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Based on our observations, deploying identity firewall requires careful design of ACL and extensive testing to make sure an AD agent outage will not neither cause user traffic to be blocked nor accidently allow an unauthorized access. Idle timer may also need to be adjusted to prevent deny-access due to users prematurely becoming inactive while they are still logged in to the domain. In addition, there is a chance that the ASA user-to-IP mapping table becomes out-of-sync from the AD agent. Although we can manually force update, this certainly is not practical.&lt;BR /&gt; This concludes my review on the ASA identity firewall. I hope both of my articles will help you decide whether deploying identity firewall is the right choice in your production environment.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 12.0pt;"&gt;&lt;STRONG&gt;Conclusion:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We were able to restrict user access to the lab telnet server based on both the AD username and user group. The ASA was able to correctly obtain the username-to-IP mapping information from the AD agent, and utilize them in the ACL. &lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Caveat:&lt;/STRONG&gt;&amp;nbsp; Username-to-IP mapping does not get updated when the IP on a user computer is changed while the user is logged in to the domain. This causes the user IP information on the ASA to become inaccurate, and potentially results in an incorrect ACL being applied to user traffic. This is due to the fact that the AD agent creates the username-to-IP mapping table by monitoring user logon/logoff activities, hence uninformed of the IP change after the user has already logged in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Aug 2011 23:14:13 GMT</pubDate>
    <dc:creator>lcaruso</dc:creator>
    <dc:date>2011-08-23T23:14:13Z</dc:date>
    <item>
      <title>AD Agent setup vs. using aaa ldap for remote access VPN</title>
      <link>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758392#M534082</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just started reading the documentation for the AD Agent. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting the impression there is overlap/duplication with setting up remote access VPN authentiction to Active Directory via aaa and ldap. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone who has already done this tell me if AD Agent and using aaa ldap to authenticate via AD will interoperate, interfere, or are the same thing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've never setup the former but have setup the latter serveral times. Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758392#M534082</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2019-03-11T21:08:39Z</dc:date>
    </item>
    <item>
      <title>AD Agent setup vs. using aaa ldap for remote access VPN</title>
      <link>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758393#M534083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From my understanding the ASA is not "interoperating" the LDAP and RADIUS connections as the AD Agents purpose is to distribute the AD-IP mappings and the AD-LDAP connection is used to poll the Users/Groups.&lt;/P&gt;&lt;P&gt;I'm currently setting up a test scenario, as soon as it's working I will implement VPN auth via LDAP and tell you if problems are arising.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 07:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758393#M534083</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-08-08T07:55:04Z</dc:date>
    </item>
    <item>
      <title>AD Agent setup vs. using aaa ldap for remote access VPN</title>
      <link>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758394#M534084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It was a vague question. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's an example that compares what I've done with AD ldap for remote access vpn authentication and what cisco has in their documentation as step one configuration, what they call &lt;/P&gt;&lt;P&gt;Configuring the Active Directory Domain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the documenation, it would appear you can either use port 389 or 636 if you SSL for AD Agent. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was just trying to get a handle on how I'm going to do both AD Agent and Remote Access VPN authentication together. I'll probably open a TAC case when the time comes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring the Active Directory Domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server adserver protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server adserver (inside) host 172.168.224.6&lt;/P&gt;&lt;P&gt;ldap-base-dn DC=SAMPLE,DC=com&lt;/P&gt;&lt;P&gt;ldap-scope subtree&lt;/P&gt;&lt;P&gt;ldap-login-password obscurepassword&lt;/P&gt;&lt;P&gt;ldap-login-dn SAMPLE\user1&lt;/P&gt;&lt;P&gt;server-type microsoft&lt;/P&gt;&lt;P&gt;ldap-group-base-dn OU=Sample Groups,DC=SAMPLE,DC=com&lt;/P&gt;&lt;P&gt;ldap-over-ssl enable&lt;/P&gt;&lt;P&gt;server-port 636&lt;/P&gt;&lt;P&gt;group-search-timeout 300&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring Remote Access VPN to use AD via ldap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server ldap_ad protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server ldap_ad (inside) host 192.168.15.21&lt;/P&gt;&lt;P&gt;server-port 389&lt;/P&gt;&lt;P&gt;ldap-base-dn DC=CLIENT,DC=LOCAL&lt;/P&gt;&lt;P&gt;ldap-scope subtree&lt;/P&gt;&lt;P&gt;ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt;ldap-login-password *****&lt;/P&gt;&lt;P&gt;ldap-login-dn CN=cisco-vpn,OU=Service Accounts,DC=CLIENT,DC=LOCAL&lt;/P&gt;&lt;P&gt;server-type microsoft&lt;/P&gt;&lt;P&gt;ldap-attribute-map ldap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map ldap&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf CN=VpnUsers,CN=Users,DC=CLIENT,DC=LOCAL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Aug 2011 03:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758394#M534084</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-08-09T03:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: AD Agent setup vs. using aaa ldap for remote access VPN</title>
      <link>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758395#M534085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I asked TAC about this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TAC cannot tell me if the aaa server that would be used for the Identity Firewall can co-exist with or be one in the same with the aaa server I use for remote access vpn AD authentication. I have no configuration examples that would show this either way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TAC cannot tell me what the effects of not having/not having netbios probing and/or mac address checking capabilities would be. They are not required, but are affected by various site/configuration issues. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All TAC can offer is they are a "break and fix" organization, so I can call them if it doesn't work. &lt;SPAN __jive_emoticon_name="angry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/angry.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a new product in 8.4(2).&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I say the documentation, being an early rev, is broken. &lt;/EM&gt; &lt;/P&gt;&lt;P&gt;&lt;EM&gt;Maybe someone could fix the documentation&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe someone could fix the documentation so it has something more substantive. Instead of countless repetitive warnings about the Windows patches that are required, how about some examples in real world networks, where, for example, an existing configuration is being updated with Identity Firewall? Maybe even some examples that are not entirely boxed in, you know, like one normally sees in Cisco documetation. That way at least you can cut and paste all in one shot instead of having to navigate little cells for each individual command. How about a dicussion of the effects of having/not having netbios probing and/or mac address checking enabled/available? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better yet, let's see one of the those Cisco Blog posts with detailed information regarding this subject. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in the meantime, I can tell my client, "we don't know if Cisco's Identity Firewall will work for you, or if it does work, how it will integrate and perform with your existing requirements"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Super&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 15:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758395#M534085</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-08-11T15:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: AD Agent setup vs. using aaa ldap for remote access VPN</title>
      <link>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758396#M534086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You must mean something like this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://blog.pbmit.com/asa_identity_fw"&gt;http://blog.pbmit.com/asa_identity_fw&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://blog.pbmit.com/asa_identity_fw2"&gt;http://blog.pbmit.com/asa_identity_fw2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;Conclusion:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Based on our observations, deploying identity firewall requires careful design of ACL and extensive testing to make sure an AD agent outage will not neither cause user traffic to be blocked nor accidently allow an unauthorized access. Idle timer may also need to be adjusted to prevent deny-access due to users prematurely becoming inactive while they are still logged in to the domain. In addition, there is a chance that the ASA user-to-IP mapping table becomes out-of-sync from the AD agent. Although we can manually force update, this certainly is not practical.&lt;BR /&gt; This concludes my review on the ASA identity firewall. I hope both of my articles will help you decide whether deploying identity firewall is the right choice in your production environment.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 12.0pt;"&gt;&lt;STRONG&gt;Conclusion:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We were able to restrict user access to the lab telnet server based on both the AD username and user group. The ASA was able to correctly obtain the username-to-IP mapping information from the AD agent, and utilize them in the ACL. &lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Caveat:&lt;/STRONG&gt;&amp;nbsp; Username-to-IP mapping does not get updated when the IP on a user computer is changed while the user is logged in to the domain. This causes the user IP information on the ASA to become inaccurate, and potentially results in an incorrect ACL being applied to user traffic. This is due to the fact that the AD agent creates the username-to-IP mapping table by monitoring user logon/logoff activities, hence uninformed of the IP change after the user has already logged in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2011 23:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758396#M534086</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-08-23T23:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: AD Agent setup vs. using aaa ldap for remote access VPN</title>
      <link>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758397#M534087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;YUP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's EXACTLY what I'm talking about.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2011 23:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ad-agent-setup-vs-using-aaa-ldap-for-remote-access-vpn/m-p/1758397#M534087</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-08-23T23:14:44Z</dc:date>
    </item>
  </channel>
</rss>

