cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2563
Views
5
Helpful
2
Replies

FMC, AnyConnect, and RADIUS - assign conection profile?

wildbluesky
Level 1
Level 1

Setting up remote access VPN from FMC - I'm authenticating to my Windows NPS server ok, and I can use 3076 / 85 to group lock the user to the right connection profile.  I want to take it one step further and disable the ability to choose a connection profile and just assign it based on AD group membership.  I can't find how to do that with FMC.  Can anyone point me in the right direction?  Bonus points if you can also explain how to use DHCP server and assign the scope based on connection profile.  I remember doing it with ASA.... FMC is a little different and I'm trying to catch up with it.

1 Accepted Solution

Accepted Solutions

Rahul Govindan
VIP Alumni
VIP Alumni

Do you mean assigning a group-policy based on AD membership? You cannot choose Connection profile based on AAA credentials because that is where the Firepower/ASA defines what auth mechanism to use. But you can get the same behavior with assigning different group-policies to users based on their AD credentials. A few things to do this and I believe you already have major portions completed.

 

1) Choose a tunnel-group/connection profile where you want all users to fall into

2) Assign a group-url for that CP and set it to "https://<FQDN>"

3) Find the default group-policy assigned to the CP. Under that group-policy settings, set simulataneous logins to 0.

4) Create different group-policies for different sets of users.

5) On NPS, create conditions to Assign Radius Class attribute as "Group-policy-Name". The conditions can be based on your AD group membership.

6) Inside the group-policy, add scope under the general tab

dhcp-scope.PNGThe flow be as follows:

 

User goes to https://vpn[dot]domain[dot]com. No dropdown or list to choose from. They enter their AD credentials. Based on AD credentials, NPS returns Access-Accept with group-policy name set as Radius Class atribute. FTD then uses this info and automatically maps this user to that group-policy. Based on the group-policy, the DHCP scope and other options are applied to the user. If the user is not part of any of the NPS conditoons, you can send a Reject from NPS or send an accept with no Class attribute. They will fall into the Default group policy for that CP and be dropped (simultaneous logins =0).

 

Hope this helps. 

View solution in original post

2 Replies 2

Rahul Govindan
VIP Alumni
VIP Alumni

Do you mean assigning a group-policy based on AD membership? You cannot choose Connection profile based on AAA credentials because that is where the Firepower/ASA defines what auth mechanism to use. But you can get the same behavior with assigning different group-policies to users based on their AD credentials. A few things to do this and I believe you already have major portions completed.

 

1) Choose a tunnel-group/connection profile where you want all users to fall into

2) Assign a group-url for that CP and set it to "https://<FQDN>"

3) Find the default group-policy assigned to the CP. Under that group-policy settings, set simulataneous logins to 0.

4) Create different group-policies for different sets of users.

5) On NPS, create conditions to Assign Radius Class attribute as "Group-policy-Name". The conditions can be based on your AD group membership.

6) Inside the group-policy, add scope under the general tab

dhcp-scope.PNGThe flow be as follows:

 

User goes to https://vpn[dot]domain[dot]com. No dropdown or list to choose from. They enter their AD credentials. Based on AD credentials, NPS returns Access-Accept with group-policy name set as Radius Class atribute. FTD then uses this info and automatically maps this user to that group-policy. Based on the group-policy, the DHCP scope and other options are applied to the user. If the user is not part of any of the NPS conditoons, you can send a Reject from NPS or send an accept with no Class attribute. They will fall into the Default group policy for that CP and be dropped (simultaneous logins =0).

 

Hope this helps. 

That's exactly what I needed - thank you!

I think I'm still missing something simple with my scope selection, but it does use group-policy based on AD group membership now.