Has anyone got this to work with a Firepower 2110? I have the extension installed and NPS setup but don't even get a prompt when I authenticate just and immediate denial.
I have a couple of Windows clients that don't seem to forget previous VPN ip addresses when they connect again. I have seen 6-8 IPs on the Anyconnect adapter on one of these machines. I have been searching around but thus far have not found anyone ...
What purpose doe the AD join serve when creating a realm with the FMC? It seems to be the only difference between AD and LDAP is the AD boxes. Since AD is LDAP, why is there even two choices here? Why would I use one over the other?
Is there any good documentation out there to be able to limit users with access to the VPN to a specific group? Currently my system will allow ANY AD user to connect which is less than ideal. Thanks
Turns out this article helped get it working, ASA VPN User Authentication against Windows 2008 NPS Server (Active Directory) with RADIUS Configuration Example - Cisco
Thanks, still not finding the problem. I was hoping to find someone that got this working and see if they can divulge what they did. There are some Cisco videos and articles about using and ASA but not so much with the Firepower.