09-16-2018 01:03 PM - edited 03-12-2019 06:58 AM
Hi all,
I'm replacing a customer's ASAs with FTDs and I've hit a couple of snags.
The customer is currently using clientless SSL VPN for contractors to access a small subset of internal services.
Contractors authenticate their SSL VPN session to the ASA local user database whereas normal employees authenticate to active directory. Each user group has a separate group policy and alias.
FTDs do not support local users or clientless VPN so I have to use AnyConnect for the contractors and somehow assign different access policies depending on their AD group membership. I could be wrong, but I don't think FTD supports this natively?
I don't think the Firepower User Agent will achieve what I need either.
So I'm thinking the only solution is to use a RADIUS server like ISE or ACS or something and use that to send down an AV pair to the FTD to influence the chosen group policy.
Any thoughts?
Many thanks in advance,
Matt.
Solved! Go to Solution.
09-16-2018 02:48 PM
09-17-2018 01:57 PM
This could because of the tunnel-group the user ends up connecting to. If you have that option checked, the user sees the option to connect to all the tunnel-groups that have an alias set. IF you do not have this checked, the url "vpn.domain.com", usually takes you directly to the DefaultTunnelGroup. This may be why your authentication is failing.
09-16-2018 02:48 PM
09-17-2018 12:59 PM
Hi Rahul,
Thank you for confirming my suspicions. I got it working with a Cisco ACS server doing the RADIUS duties but I stumbled on another 'funny' though....
As long as "Allow Users to select connection profile while logging in" is checked and an Alias exists and is enabled under the connection profile it works fine. But if I disable or delete the alias or I uncheck the "Allow Users to select connection profile while logging in" option, authentication fails? No evidence in the logs of the FTD talking to the ACS server at all. Weird.
Cheers!
Matt.
09-17-2018 01:57 PM
This could because of the tunnel-group the user ends up connecting to. If you have that option checked, the user sees the option to connect to all the tunnel-groups that have an alias set. IF you do not have this checked, the url "vpn.domain.com", usually takes you directly to the DefaultTunnelGroup. This may be why your authentication is failing.
09-17-2018 02:36 PM
You were right! Again! Adding an alias URL did the trick!
Thank you Rahul! :-)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide