09-26-2023 11:37 PM - edited 09-26-2023 11:38 PM
We have FMC-FTD RAVPN with LDAP realm just like in
https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/216955-configure-ad-ldap-authentication-and-u.html#anc17
The Identity policy contains the LDAP realm. The user-based ACL rules in the ACP work correctly for RAVPN traffic. (Actually I don't quite understand why an Identity policy is required because "RAVPN sessions are actively authenticated by VPN. Other sessions use the rule Action" in the Identity policy.)
Now we have to add a new Connection Profile with Cisco ISE RADIUS AAA + posture and I am not sure how we will be able to use the Connection profiles parallelly and use the existing user rules in the ACP. How the Identity Policy should be modified? Should it contain (and distinguish) both the LDAP and the RADIUS connections? (I assume we can't distinguish unless we define another VPN pool to the RADIUS Connection Profile.)
AFAIK if a firewall has only RADIUS AAA (no LDAP) the user rules in ACP can work without any Identity policy.
Or do we have to add ISE in FMC as an Identity Source?
Our first tests with the new Connection Profile show that the user rules are not matched after the posture CoA... And the logs before CoA show they are matched to LDAP identity which is good but I'm worried about being dependent on the LDAP realm. (We may delete the old profile later when the migration completes.)
09-29-2023 08:19 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide