01-09-2007 08:23 AM - edited 03-10-2019 02:54 PM
Hello,
I have ACS and I use this authentication center for multiple devices. My issue is to deny VPN access for some groups, and allow for other. Clients are connected to ASA, maybe the solution can be an cisco-av-pair attribute or something else.
Please do some suggestion.
Thanks in advance.
bye
FCS
01-09-2007 02:20 PM
Hi,
You can define a Network Access Restriction (NAR) to deny access to ASA for the group which should not have access to VPN.
More on NARs at :-
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/g.htm#wp478900
Regards,
Vivek
01-09-2007 11:58 PM
If you need to deny access request coming some of your NAS, you can use NAR( Network Access Restrictions) at ACS. NAR alows you to define which user should connect to which NAS
If you want to deny access request for some of the vpn group at ASA, you can basicly select an different Authentication server for that group.
01-16-2007 01:56 AM
Guys,
Sorry but I couldn't catch the solution still now.
On my ASA I have GROUP1 and GROUP2 VPN groups for remote VPN connections. In my ACS I define two groups GROUP1-USER and GROUP2-USER, what I want to reach that GROUP1-USER will be able to access GROUP1 profile etc. And I want to do this limitation on ACS (using External database: Windows group mapping).
If you can please send me some usefule link or better if you can a short configuration guide for this limitation anyway the authentication works well from ACS using External Database.
Thanks in advance
FCS
01-16-2007 04:01 AM
You want to restrict GROUP1-USER's users to GROUP1 on ASA and GROUP2-USER's users to GROUP2 on ASA ?
If yes, then on GROUP1-USER on ACS select RADIUS IEFT attribute 25 - CLass and set it to ou=GROUP1;
Likewise On GROUP2-USER set class to ou=GROUP2;
HTH
01-16-2007 04:56 AM
OK, it sounds good. Do I need some extra config on ASA? Like authorization or something if yes can you explain?
Thanks
FCS
01-16-2007 08:13 AM
No we will not require any thing apart from the authentication command.
Make sure OU is in capital letters and that there is a semicolon after the group name in ACS class attribute.
01-17-2007 01:06 AM
It doesn't work for me.
aaa-server ACS protocol radius
aaa-server ACS host x.x.x.x
key keykeykeykey
tunnel-group TG general-attributes
address-pool TG-Pool
authentication-server-group ACS
default-group-policy TG
And in the ACS the ASA is set as RADIUS (Cisco VPN 3000/ASA/PIX 7.x+), but I tried with RADIUS IETF too. The Class attributes is OU=VPNGROUP;
Anway the VPN works well. What can be the problem?
I use External Datbase Mapping in ACS.
Thanks in advance.
Bye
FCS
01-18-2007 03:56 AM
Asa works differently - Not as concentrator etc.
With Asa the Class attribute will just provide the group policy name and not the group name.
The group policy on the Asa will then have the group to which the users needs to be bound.
Let's say you want to lock user rj123 into group RemoteGroup. Then on the
radius server define IETF attribute 25 Class "OU=RemotePolicy;" for this user. Here is the
config on the ASA:
group-policy RemotePolicy internal
group-policy RemotePolicy attributes
dns-server value 10.1.1.1 10.2.2.2
group-lock value RemoteGroup
Basically the OU set the group policy for this user and in the group policy
you lock the user into the tunnel-group that you want.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide