Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Can anyone help me figure out why my "sh vpn-sessiondb anyconnect" doesn't parse the username properly. Here is a picture of what its doing, and what I'm expecting. It's saying "Users" instead of "Dan Bryan"I am using the default Microsoft Users c...
I am trying to bring an asa 5505 into my PKI network. My CA uses ECC instead of RSA. ASDM will let me import RSA root certs, but it will not let me import ECC Root certs.Can someone confirm if there is an update to the ASA which will allow me to im...
I am using Anyconnect and I have a group policy configured with a split tunnel policy to "Exclude Network Lists Below". I created a list to define my local LAN which I don't want to be "secured by the vpn". Whenever I VPN in, it still forces all tr...
I have several interfaces:outsideinside(192.168.0.0/24)wifi(192.168.101.0/24)haklab(10.10.10.0/24)Currently I have remote access anyconnect users who are able to VPN in and get access to the outside internet and inside devices.I am trying to add anot...
I changed it to:username-from-certificate use-entire-name and it gave me the following output which is acceptable. Username : e=Dan.Bryan@securesub.net,cn=Dan Bryan,cn=Users,dc=securesub,dc=netI would still prefer for it to just say "Dan Bryan" ...
It doesn't seem like you can issue that command under webvpn-attributes, but I was able to do it under general-attributes. I logged off and back onto the VPN, and it still shows as Usersasa(config)# show run tunnel-group Securesubtunnel-group Secure...
asa# show run tunnel-group Securesubtunnel-group Securesub type remote-accesstunnel-group Securesub general-attributes address-pool VPN_POOL authentication-server-group SECURESUB_LDAP LOCAL default-group-policy Securesubtunnel-group Securesub webvpn-...