<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL VPN Setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-vpn-setup/m-p/1365020#M719564</link>
    <description>&lt;P&gt;I am in the process of rebuilding my ASA 5510 8.0(5) firewall configs and I am up to the point of building the remote-access VPN tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I am not sure if this is possible without a RADIUS or a VPN Concentrator but I figured I would try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am attempting to do is use Active Directory to determine how a user connects in. &lt;/P&gt;&lt;P&gt;So based on the AD group the person belongs to, is what SSL VPN they can connect to.&lt;/P&gt;&lt;P&gt;The 3 connections are going to be:&lt;/P&gt;&lt;P&gt;Full VPN Tunnel&lt;/P&gt;&lt;P&gt;Tunnel into an OWA server&lt;/P&gt;&lt;P&gt;Tunnel into a Terminal Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some complicated reasons I am unable to put my Exchange or Terminal Server in the DMZ, so rather than having pin-holes from my External Connection directly to my Exchange and Terminal Server I figured I would just use the ASA and a VPN tunnel to connect to those services, along with the full VPN access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far this is as far as I have gotten (hardly anywhere):&lt;/P&gt;&lt;P&gt;aaa-server LDAP_SRV_GRP protocol ldap&lt;BR /&gt; aaa-server LDAP_SRV_GRP (internal) host 10.1.1.1&lt;BR /&gt; ldap-base-dn dc=test, dc=com&lt;BR /&gt; ldap-login-dn cn=LDAPPerson, cn=Service Users OU, cn=Standard Users, dc=test, dc=com&lt;BR /&gt; ldap-login-password xxxxxx &lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; server-type microsoft&lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;ldap attribute-map LDAPSSLMap&lt;BR /&gt; map-name memberOf VPN Access Grp&lt;BR /&gt; map-value memberOf cn=VPN Access Grp, OU=VPN OU, OU=Security Groups, DC=test, DC=com SSLVPNPolicy&lt;BR /&gt; map-value memberOf cn=OWA Access Grp, OU=VPN OU, OU=Security Groups, DC=test, DC=com SSLOWAPolicy&lt;BR /&gt; map-value memberOf cn=TS Access Grp, OU=VPN OU, OU=Security Groups, DC=test, DC=com SSLTSPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I started to try to configure the VPN tunnels but I couldn't figure out how to determine which Policy to use based on the authentication the user uses.&amp;nbsp; Hence why I am unsure whether this is even possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done something similar with SSL where I have the user log in and it sends them directly to a Terminal Server window and asks for an IP address for the server (using AAA).&amp;nbsp; With this setup is there a way to directly send them to the Terminal Server wihtout them having to put in the IP address?&lt;/P&gt;&lt;P&gt;Also is it possible if they belong to both the TS and OWA group that they are prompted for which they want to connect to (either the TS or OWA)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will keep playing with this to see if I can figure out what needs to be done.&amp;nbsp; If I find a solution I will post it, but any assistance with this would be greatly appreciated.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:28:45 GMT</pubDate>
    <dc:creator>kharvey</dc:creator>
    <dc:date>2019-03-11T17:28:45Z</dc:date>
    <item>
      <title>SSL VPN Setup</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-setup/m-p/1365020#M719564</link>
      <description>&lt;P&gt;I am in the process of rebuilding my ASA 5510 8.0(5) firewall configs and I am up to the point of building the remote-access VPN tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I am not sure if this is possible without a RADIUS or a VPN Concentrator but I figured I would try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am attempting to do is use Active Directory to determine how a user connects in. &lt;/P&gt;&lt;P&gt;So based on the AD group the person belongs to, is what SSL VPN they can connect to.&lt;/P&gt;&lt;P&gt;The 3 connections are going to be:&lt;/P&gt;&lt;P&gt;Full VPN Tunnel&lt;/P&gt;&lt;P&gt;Tunnel into an OWA server&lt;/P&gt;&lt;P&gt;Tunnel into a Terminal Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some complicated reasons I am unable to put my Exchange or Terminal Server in the DMZ, so rather than having pin-holes from my External Connection directly to my Exchange and Terminal Server I figured I would just use the ASA and a VPN tunnel to connect to those services, along with the full VPN access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far this is as far as I have gotten (hardly anywhere):&lt;/P&gt;&lt;P&gt;aaa-server LDAP_SRV_GRP protocol ldap&lt;BR /&gt; aaa-server LDAP_SRV_GRP (internal) host 10.1.1.1&lt;BR /&gt; ldap-base-dn dc=test, dc=com&lt;BR /&gt; ldap-login-dn cn=LDAPPerson, cn=Service Users OU, cn=Standard Users, dc=test, dc=com&lt;BR /&gt; ldap-login-password xxxxxx &lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; server-type microsoft&lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;ldap attribute-map LDAPSSLMap&lt;BR /&gt; map-name memberOf VPN Access Grp&lt;BR /&gt; map-value memberOf cn=VPN Access Grp, OU=VPN OU, OU=Security Groups, DC=test, DC=com SSLVPNPolicy&lt;BR /&gt; map-value memberOf cn=OWA Access Grp, OU=VPN OU, OU=Security Groups, DC=test, DC=com SSLOWAPolicy&lt;BR /&gt; map-value memberOf cn=TS Access Grp, OU=VPN OU, OU=Security Groups, DC=test, DC=com SSLTSPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I started to try to configure the VPN tunnels but I couldn't figure out how to determine which Policy to use based on the authentication the user uses.&amp;nbsp; Hence why I am unsure whether this is even possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done something similar with SSL where I have the user log in and it sends them directly to a Terminal Server window and asks for an IP address for the server (using AAA).&amp;nbsp; With this setup is there a way to directly send them to the Terminal Server wihtout them having to put in the IP address?&lt;/P&gt;&lt;P&gt;Also is it possible if they belong to both the TS and OWA group that they are prompted for which they want to connect to (either the TS or OWA)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will keep playing with this to see if I can figure out what needs to be done.&amp;nbsp; If I find a solution I will post it, but any assistance with this would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-setup/m-p/1365020#M719564</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2019-03-11T17:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN Setup</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-setup/m-p/1365021#M719571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay I have made it a bit farther but I have a couple more issues that I need to work through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have most of the AD permissions setup and working with this:&lt;/P&gt;&lt;P&gt;ldap attribute-map VPNAccessMap&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;BR /&gt;&amp;nbsp; map-value memberOf "CN=OWA Access Grp,OU=VPN OU,OU=Security Groups,DC=test,DC=com" OWAAccessPlc&lt;BR /&gt;&amp;nbsp; map-value memberOf "CN=TS Access Grp,OU=VPN OU,OU=Security Groups,DC=test,DC=com" TSAccessPlc&lt;BR /&gt;&amp;nbsp; map-value memberOf "CN=VPN Access Grp,OU=VPN OU,OU=Security Groups,DC=test,DC=com" SSLAccessPlc&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server LDAP_SRV_GRP protocol ldap&lt;BR /&gt;aaa-server LDAP_SRV_GRP (IntNet) host 10.1.2.80&lt;BR /&gt; ldap-base-dn DC=ECCOGroup,DC=corp&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password xxxxxxxx&lt;BR /&gt; ldap-login-dn CN=dude,OU=Service Users OU,OU=Users,DC=test,DC=com&lt;BR /&gt; server-type microsoft&lt;BR /&gt; ldap-attribute-map VPNAccessMap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to verify that it is working by using different Banners in the Group Policies:&lt;/P&gt;&lt;P&gt;group-policy SSLAccessPlc internal&lt;BR /&gt;group-policy SSLAccessPlc attributes&lt;BR /&gt; banner value SSL VPN Access Policy&lt;BR /&gt;group-policy TSAccessPlc internal&lt;BR /&gt;group-policy TSAccessPlc attributes&lt;BR /&gt; banner value Terminal Server Access Policy&lt;BR /&gt;group-policy OWAAccessPlc internal&lt;BR /&gt;group-policy OWAAccessPlc attributes&lt;BR /&gt; banner value Outlook Web Access Policy&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; authentication-server-group LDAP_SRV_GRP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only have a couple of questions left before this becomes functional:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; How do I make it to where if a user is not part of any of the 3 AD groups they are denied access?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Right now if they are not part of any of the 3 AD groups they are assigned to the SSLAccessPlc&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; How would I go about auto forwarding users that are using the OWAAccessPlc directly to my Outlook Web Access?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; So when a user signs onto the Clientless SSL and they are part of the OWAAccessPlc it forwards them directly to the OWA web address using the tunnel.&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; How do I setup the single sign-on?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When a user signs onto the SSL VPN since they are already using AD credentials, how do I forward those credentials onto either OWA or the Terminal Server?&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; How do I setup a link on the Portal to a Terminal Server and have it include the Terminal Server address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have been able to setup a link to the Terminal Server in the past, but the users still needed to enter in the IP address of the Terminal Server once they clicked the link.&amp;nbsp; I would like to automate this to where the users don't have to remember anything but the username and password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will keep working on this through out today, and hopefully I can answer some of my own questions.&amp;nbsp; I will continue to post my findings until I am able to get everything working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 14:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-setup/m-p/1365021#M719571</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-09T14:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN Setup</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-setup/m-p/1365022#M719587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize if this becomes annoying, but I just figured out question #1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bascially what I had to do was create another AD group called Remote Access Grp, then I created a DAP rule that says that if the user is not part of Remote Access Grp then terminate the connection.&amp;nbsp; So when a user requests access to the VPN I would have to first assign them to the Remote Access Grp, and then assign them to either the OWA, TS, or VPN groups to limit their access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is config that I setup:&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record SSLDenyPlc&lt;BR /&gt; user-message "Rejected"&lt;BR /&gt; action terminate&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; file-browsing disable&lt;BR /&gt;&amp;nbsp; file-entry disable&lt;BR /&gt;&amp;nbsp; http-proxy disable&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It appears though that I can only set DAP's through ASDM as there is nothing in the running config that has Remote Access Grp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still working on my other questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 15:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-setup/m-p/1365022#M719587</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-09T15:47:41Z</dc:date>
    </item>
  </channel>
</rss>

