07-06-2005 09:51 AM - edited 02-21-2020 10:13 AM
I am trying to create a seperate group called "WebVPNuser" and enable Webvpn permission only for that group and use Local authentication for users in WebVPnuser group.
What i observe is users (under webvpnuser group) do not authenticate using WebVPNusers group but are authenticated using basegroup which is Radius server.
I am not sure where i am going wrong. We have other users conencting using IPsec clinet without any problem.
07-07-2005 06:46 AM
Hi,
This is explained in Appendix B of the config manual.
http://www.cisco.com/univercd/cc/td/doc/product/vpn/vpn3000/4_1/config/webvpnap.htm#1008861
"Web VPN uses global authentication and authorization settings, not the settings configured for the group. The first active server, independent of type, is used for authentication and authorization of WebVPN sessions. "
You'll need to make Internal the first global auth method.
Hope this helps
Kind Regards
Catriona
07-08-2005 05:37 AM
Thanks for your info. I had tried this suggestion before and it had worked,
But i wanted to enable WebVPN only on "WebVPnuser" group instead of enabling webvpn in Base Group and use internal database for authentication.
I have changed internal the first auth method. Hope Changing Internal the first global auth method wont effect other VPN users authentication.
Appreciate your Help.
Regards,
Raj
02-13-2006 11:42 AM
I was looking for the same thing...were you able to find sort of solution to this?
03-01-2006 05:56 AM
Under Configuration | General | Authentication , you can enble group lookup and choose a delimiter (for example @).
After that you can log in with user@yourgroup .
yourgroup can be the only one able to do webvpn .
Hope this help you.
Morgan.
03-23-2006 06:19 AM
If this is the only way, it means I cannot separate my
WebVPN users in distinct groups, isn't it?
I would like to find a way of assigning WebVPN users to different groups in a secure way; because even if I configure the Radius server to return the right Class Attribute (Class="OU=
03-24-2006 08:14 AM
You can create different internally configured groups and put users in these groups(for example to have differents ACL):
user1@group1
user2@group2
These groups have to be internally configured because i don't think you can assign WebVPN attributes by Radius server(so your radius attribute will be ignored).
Regards.
03-24-2006 11:28 AM
I was able to partially resolve this issue. To assign users to a different group(using webvpn) we will need to pass group information during RADIUS authentication.
However, What i was not able to resolves was using some Webvpn users to authenticate using Local database and some on Radius server. I tried different ways like using "@" during login. Each time i tried to login, By defaultVPN concentator passes info to Radius server, Which rejectes as there are no users defined in radius server.
03-27-2006 07:19 AM
Take a group "webvpn" internally configured .
Create locally a user called "local" that you assign to this group and on the radius server a user called "external".
If you choose the option "strip group" on global authentication parameters on your vpn3000 , you will be able to log on using either "local" or "external@webvpn".
If you don't use "strip group" , you have to create a user "external@webvpn" on the radius server(this can be interesting if you want to put the same acccount in differents groups).
Regards,
Morgan.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide