06-06-2013 12:32 PM - edited 03-10-2019 08:31 PM
I'm new to ACS5.4. What I'm trying to achieve is to let ACS5.4 assign IP's to users who connect to our ASA using Cisco VPN client. ASA is running as Radius client of ACS5.4, and we've tested successfully for Radius authentication. But users are still getting "unknown error" in VPN client, after authenticating successfully. I suspect I probably used incorrect RADIUS attributes in authorization policy. Here's what I did:
1. In policy elements -> authorization and permissions -> network access -> authorization profiles, I created a new profile, and that profile calls the Radius attribute CVPN3000/ASA/PIX7.x-DHCP-Network-Scope. An IP address is entered under that attribute as a static value.
2. Then, in access policies -> access services -> IPSec VPN client with Radius (this is the policy I created) -> authorization, I created an authorization policy that allow the RADIUS profile created earlier to be used.
Did I miss anything? Maybe I picked the wrong RADIUS attribute? Thanks in advance for any help!
Solved! Go to Solution.
06-06-2013 01:12 PM
ACS 5 doesn't have ability to provide IP addresses from IP address pools defined in ACS.
You need to assign static user on per user basis on ACS 5. You may also create a pool on the ASA and push the pool name from ACS 5
Jatin Katyal
- Do rate helpful posts -
06-06-2013 01:12 PM
ACS 5 doesn't have ability to provide IP addresses from IP address pools defined in ACS.
You need to assign static user on per user basis on ACS 5. You may also create a pool on the ASA and push the pool name from ACS 5
Jatin Katyal
- Do rate helpful posts -
06-06-2013 01:17 PM
You are absolutely right!! I was doing research online after posting the above. The correct RADIUS attribute to use is actually CVPN3000/ASA/PIX7.x-Group-Based-Address-Pools. Then create the pool in ASA, and call that pool's name in ACS under that RADIUS attribute. Someone explained this perfectly in this community before. Much appreciate your answer!
Here's from another post last year:
ACS 5 does not have the feature of IP pools. Logically its always good to setup pools locally on vpn server and if you want user to pick ip from specific local pool you can configure acs to push that attribute.
On ACS Go to > Policy Elements -> Network Access -> Authorization Profiles -> Create ->
Name of the Policy ->Dictionary Type: Radius-Cisco VPN 3000/ASA/PIX7.x
Attribute Type : CVPN3000/ASA/PIX7.x-Group-Based-Address-Pools
Attribute Type: String
Attribute Value : Static MYPOOL (Name of the Pool which is defined on the ASA)
Access Policies ->Default Network Access -> Authorization -> Create -> Under result section call the Authorization p
06-06-2013 04:30 PM
Your welcome! Well, this is from the begining since ACS 5.x launched. With the above steps, could say that you're on the right path.
Jatin Katyal
- Do rate helpful posts -
12-12-2013 08:02 AM
I'd really like to see the rest of that text. It seems to have been cut off
12-12-2013 12:47 PM
Codewize,
Access Policies ->Default Network Access -> Authorization -> Create ->
Under result section call the Authorization policy that you created before.
**Share your knowledge. It’s a way to achieve immortality.
--Dalai Lama**
Please Rate if helpful.
Regards
Ed
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide