cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
560
Views
0
Helpful
3
Replies

ASA 5520 + IPSec with Tacacs authentication

Nikolay Savin
Level 1
Level 1

Good day

i have ASA 5520 ios 8.4(5)

I was configure IPSec remote-access and authentication with tacacs for user (rvpn).

tacacs was configure at FreeBSD tac_plus

the same tacacs is service authentication to management access for users (admin and cisco)

All working, but i can connect over vpn with all users, it is not good for me.

How i can allow vpn connection for some users and deny for other?

all users stay in same tacacs server.

Thanks

3 Replies 3

Shaoqin Li
Level 3
Level 3

it might be a little bit difficult for tacacs since it had limitedinfo sent by NAS. and the policy is set on your server, not on ASA. and server is not gonna know which request for vpn auth and which is for device auth...

better setup another server, or use radius.

Sent from Cisco Technical Support iPad App

I agree with Shaogin. You need to setup a radius server to use a Group-lock feature. If you would like to accomplish the same with local database, check here

~BR
Jatin Katyal

**Do rate helpful posts**

~Jatin

Thank You guys.

I will think about it.