08-04-2022 08:24 AM - edited 08-04-2022 08:25 AM
Hi
We have an exisiting ISE deployment and I am in the middle of trying to set up anyconnect, would I be best creating a new policy set for anyconnect use and would this interfere with the esisting Policy Set.?
Also whats the best way to create a Radius rule for Anyconnect I have a AD group for the authorisation so was thinking of for AuthZ
policy =
Network Device Firewall and AD group = then AuthZ profile for a DACL for Anyconnect users.
is this ok .??
Thanks
Solved! Go to Solution.
08-04-2022 09:58 AM
Hi @benolyndav
Create a new Policy Set, the condition to match the Policy Set can be "Radius Nas IP Address + x.x.x.x". Yes, the Policy Sets are matched top down, if the connection request does not come from the FTD, then the next policy set would be attempted.
Yes, the authorisation rule example would work - the FTD uses the same RADIUS attributes as the ASA. Authorisation Rules are also matched from top down, until a match found.
08-04-2022 08:34 AM - edited 08-04-2022 08:38 AM
@benolyndav if this is for AnyConnect users for Remote Access, then yes personally I'd setup a Policy Set which is separate to Wired/Wireless. You can match on a condition of the NAS IP address of the Firewall (ASA/FTD) for the Policy Set, which would therefore not apply to existing Wired/Wireless policy set - though that depends on the condition you already use.
For specific Authorisation rules you can match on the AD Group(s), if multiple tunnel-groups you can match on the ASA/FTD tunnel group - use the condition "Cisco-VPN3000:CVPN3000/ASA/PIX7x-Client-Type" EQUAL <tunnel-group name>
08-04-2022 09:49 AM - edited 08-04-2022 09:50 AM
Hi Rob
so .
1.new policy set
2.Authentication = Radius Nas IP Address + x.x.x.x, is radius allowe when using default network access as allowed protocols.??
also the below looks like something i will use can it be used for FTD.?
For specific Authorisation rules you can match on the AD Group(s), if multiple tunnel-groups you can match on the ASA/FTD tunnel group - use the condition "Cisco-VPN3000:CVPN3000/ASA/PIX7x-Client-Type" EQUAL <tunnel-group name>
also are policy sets/rules checked ina top down fashion untill a match is found ??
Thanks
08-04-2022 09:58 AM
Hi @benolyndav
Create a new Policy Set, the condition to match the Policy Set can be "Radius Nas IP Address + x.x.x.x". Yes, the Policy Sets are matched top down, if the connection request does not come from the FTD, then the next policy set would be attempted.
Yes, the authorisation rule example would work - the FTD uses the same RADIUS attributes as the ASA. Authorisation Rules are also matched from top down, until a match found.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide