I´m currently struggling with a problem concerning VPN logins. To be honest I´m not if this problem can be solved.
My setup looks like the following:
ACS Server 4.2 for AAA
ASA 8.2 as VPN endpoint
Cisco VPN Client 22.214.171.124
The VPN Client connects to the ASA using certificates, based on the certification map the ASA assigns a vpn tunnel-group, in this tunnel group AAA is configured using radius of the ACS.
When the user is authenticated dACL are downloaded etc. this works perfect.
What I now need is, if the same User logs in with another certificated from the ASA should assign a different tunnel group and should do AAA again against the ACS Server but should then get a total different set of dACL.
User A – connects to ASA1 – gets Tunnel group VPNCLient – AAA dACL from ACS1 = permit ip any any
User A- Connects to ASA1 – gets Tunnel group Smartphone – AAA dACL from ACS1= permit tcp any host x.x.x.x eq 80
I hope some has an Idea how to solve this, thanks in advance
SymptomsOutage during FTD code upgrade DiagnosisThe FTD code upgrade thru FMC will cause the traffic interruptionSolutionBelow process will upgrade the FTD with no downtime and no traffic interruption.Before the upgrade process:Download the FTD platf...
Process for FTD migration with PolicyAs per Cisco documentation, we have below steps for for de-register and register process. Please follow below steps :Step 1 : Break HA pair and de-register your FTD from FMC (old).Step 2 : Register your primary FTD wit...
Hi There,Is there a relationship between the hardware of the Cisco ASA 5505 FWs (V02) and the 9.x software version? Multiple ASA have been successfully updated with the same software. The ASAs that have been updated without any problems are V06 versi...
Dear Cisco Customers and Partners,
We know that the Cisco Identity Services Engine (ISE) is a critical element of your network security and so stability is of paramount importance. As a result, many of you asked us for a suggested release given sev...
Over 100-year-old Yokogawa Engineering Asia deploys Cisco Advanced Malware Protection (AMP) to shield itself against cyber attacks. With Cisco Talos threat intelligence, it stays ahead of the latest malicious behavior on the Internet. Learn more at http:/...