cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2415
Views
0
Helpful
6
Replies

Firepower FMC Remote Access VPN & Cisco ISE override group policy

star btsistem
Level 1
Level 1

Hi,

 

We have Firepower FMC 6.4 as RA VPN device and Cisco ISE 2.3 as radius server. We have one connection profile and different group policies on Firepower. We want to use different group policies for different AD groups. on ISE we have configured ASA VPN attribute as the name of the group policy created on Firepower. ISE is working correctly and it says on logs it applies the correct ASA VPN attribute but on firepower it could not override group policy. Every user hits the group policy defined on connection profile.

 

If we create different connection profile with different aliases it works but we do not work on this way because we do not want clients to see and choose alias.

 

Thanks,

 

1 Accepted Solution

Accepted Solutions

Are you performing posture? If so are you applying the group policy once posture status changes from unknown to compliant? If so, that doesn't appear to work, it only works when first establishing the VPN. So when performing posture, create multiple AuthZ rules (using AD groups to differentiate the users) for the posture unknown state, apply the GP on this first authorisation.

 

HTH

View solution in original post

6 Replies 6

Hi,

Did you modify the configuration to permit group policies to be assigned to VPN users from RADIUS? See example below

4.PNG

Which RADIUS values did you configure in the Authorisation Profiles?

 

HTH

 

 

Hi, 

 

Yes i have already modified, you can see the screenshot below. I am using "ASA VPN" attribute on ISE.

 

Firepower config :

 

Capture3.PNG

 

ISE auth policy config :

Capture4.PNG

 

 

 


@Rob Ingram wrote:

Hi,

Did you modify the configuration to permit group policies to be assigned to VPN users from RADIUS? See example below

4.PNG

Which RADIUS values did you configure in the Authorisation Profiles?

 

HTH

 

 


 

Are you performing posture? If so are you applying the group policy once posture status changes from unknown to compliant? If so, that doesn't appear to work, it only works when first establishing the VPN. So when performing posture, create multiple AuthZ rules (using AD groups to differentiate the users) for the posture unknown state, apply the GP on this first authorisation.

 

HTH


@Rob Ingram wrote:

Are you performing posture? If so are you applying the group policy once posture status changes from unknown to compliant? If so, that doesn't appear to work, it only works when first establishing the VPN. So when performing posture, create multiple AuthZ rules (using AD groups to differentiate the users) for the posture unknown state, apply the GP on this first authorisation.

 

HTH


Yes we are performing posture and yes applying the group policy once posture status changes from unknown to compliant. Ok i will try it now, but i have a question for this; on unknown policy we are redirecting the users to CPP, will i use ASA VPN attribute on the same policy ?

 

Thanks,

You can either combine all the settings into 1 AuthZ Profile or create 2 AuthZ Profiles and reference them both in the same AuthZ rule.

Very very thanks :) it works by that way :)

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card