12-21-2017 02:58 PM - edited 02-21-2020 07:00 AM
Is it possible to just allow specific users or group to connect via remote access VPN? After configuring the identity realm and testing any AD user can connect. Do I need to scope the Base DN to a specific group or OU or is there something else I'm missing here?
Solved! Go to Solution.
01-23-2018 10:21 AM
Dear Jack,
the solution is on the urls below:
https://supportforums.cisco.com/t5/tkb/articleprintpage/tkb-id/4561-docs-security/article-id/4171
The first url, shows how to enable NPS on DC.
The second url is how you lock AD groups, with specific group-policy.
On FMC, you should add as radius server (object/object management) the DC (NPS enabled).
Add the authentication of vpn the radius and everything is ok.
If you need any more info, do not hesitate to ask!
skra
01-23-2018 10:21 AM
Dear Jack,
the solution is on the urls below:
https://supportforums.cisco.com/t5/tkb/articleprintpage/tkb-id/4561-docs-security/article-id/4171
The first url, shows how to enable NPS on DC.
The second url is how you lock AD groups, with specific group-policy.
On FMC, you should add as radius server (object/object management) the DC (NPS enabled).
Add the authentication of vpn the radius and everything is ok.
If you need any more info, do not hesitate to ask!
skra
01-30-2018 12:56 PM
This works if you have FMC, but by understanding is that RADIUS is still in the works for FDM
01-30-2018 01:00 PM - edited 01-30-2018 01:01 PM
I think that it would work also on FDM.
My configuration works on FMC.
By enabling the passwork management, the user can also change the password.
The only thing it does not work , is password expiration notification.
Regards,
Spyros
01-30-2018 01:06 PM
04-18-2018 09:42 PM
Hello everyone! I have FMC and FTDv. I'm also need RA VPN for users who belong to one of AD Group. I found this topic and try to configure auth via NPS. But i didn't understand second URL. May be because of this i recieve from NPS Auth-reject. Also i can't find reason of reject in event viewer at AD server where NPS is configured. I view log of NPS via log interpreter at C:\Windows\system32\LogFiles. Can anybody help me?
04-19-2018 07:13 AM
Not sure if it help, but one issue we had working with Cisco support, is that we had to check both "encrypted authentication (CHAP) and "Unencrypted authentication (PAP, SPAP)" under Authentication Methods.
A FMC command you can use for testing is firepower# test aaa authentication "enter name of RADIUS Server Group". Should ask for RADIUS server IP, username, and password. I didn't have to use the domain in the user name.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide