cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
470
Views
0
Helpful
2
Replies

Applying Dynamic Access Policies using Radius Attributes

croninbarry
Level 1
Level 1

Hi,

I'm trying to define a DAP using Radius attributes but the policy is not being correctly assigned. I've tried using attribute value 25 and 145 based off the following documentation.

http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/aaa-radius.html#32985

Users connect via an Anyconnect Client, then based of their AD groups (via Radius server) they are assigned to Group Policy. Instead of creating several different Group Policies and multiple NPS network policies I'd like to use DAP to define more granular access.

Has anybody successfully done this as what Radius attribute did you use?

Thanks

 

 

2 Replies 2

jan.nielsen
Level 7
Level 7

Those radius attributes are as you have seen already, used to assign Group Policy not DAPs. I have not tried it, but does it not work, if you send the class 25 attribute from NPS, as the AD group name, and then use a DAP to match that AAA value ?

I tried (i think) what you are speaking about here without much success. At the moment the only way I can add a group policy to a DAP is by specifying it from the drop down list. I figure there must be some way of doing it as the radius option is available.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: