|
This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC!
We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.
Looking for some help as I am new to this version of ACS.
Here is the scenario:
We have two device groups
There are 2 AAA devices in each group.
We have 4 Identity Stores
Our requirements
Any assistance you could give me with this would be much appreciated. If further information is required then please let me know.
Regards,
TC
Solved! Go to Solution.
Hi Thomas,
for point 1. configure an "Identity store sequence" that consists of :
-acs internal db
-External radius server
Let's call it "VPNSequence"
For point 2, configure an IDentity store sequence of :
-AD
-LDAP
Let's call it "Wireless Sequence"
Then configure the identity section of your "default network access" service.
Put a condition that will match the vpn access (for example "if network device belongs to the network device group called "VPN concentrators". You will obviously put all ASAs there). The identity store used will be the sequence you created above("VPNSequence").
Create a second rule (for point 2) that will match wireless access (if network device belongs to WLC group for example) and that will use the sequence "WirelessSequence" as identity store.
This should authenticate everyone accordingly. However only "permit access" will be returned. If you want to return various attributes, it's in the authorization tab and it's another topic :-)
Hi Thomas,
for point 1. configure an "Identity store sequence" that consists of :
-acs internal db
-External radius server
Let's call it "VPNSequence"
For point 2, configure an IDentity store sequence of :
-AD
-LDAP
Let's call it "Wireless Sequence"
Then configure the identity section of your "default network access" service.
Put a condition that will match the vpn access (for example "if network device belongs to the network device group called "VPN concentrators". You will obviously put all ASAs there). The identity store used will be the sequence you created above("VPNSequence").
Create a second rule (for point 2) that will match wireless access (if network device belongs to WLC group for example) and that will use the sequence "WirelessSequence" as identity store.
This should authenticate everyone accordingly. However only "permit access" will be returned. If you want to return various attributes, it's in the authorization tab and it's another topic :-)
Thanks a lot - that worked great - I hadnt noticed the sequence option for the identity stores!
Best regards,
Thomas.