Having trouble passing radius attributes from ASA to NPS.via a Dynamic Access Policy.
I'm having some problems with a certain DAP that included a radius attribute. I can't get it to match a certain
Here's how it's setup right now.
User log in on VPN (ipsec, anyconnect and portal) and their access is determined by AD groups that is specified in the NPS on a 2008 server.
The DAP looks like this.
I got 4242 from this (i also found that "memberOf" could also be 145, and therefor 4241, but that didn't help)
"For RADIUS attributes, DAP defines the Attribute ID = 4096 + RADIUS ID. For example: The RADIUS attribute "Access Hours" has a Radius ID = 1, therefore DAP attribute value = 4096 + 1 = 4097. The RADIUS attribute "Member Of" has a Radius ID = 146, therefore DAP attribute value = 4096 + 146 = 4242."
The NPS Network policy looks like this.
In the log you can see that it's using DfltAccessPolicy and therefore denying access.
The authentication server is set on RADIUS and if I try my account there it works.
My account is in the right group (ggSEGRY_VPN_NO_ALWAYS_ON)
As soon I a remove the radius attribute it's working, but I need it to force some other polices on certain users.
SymptomsOutage during FTD code upgrade DiagnosisThe FTD code upgrade thru FMC will cause the traffic interruptionSolutionBelow process will upgrade the FTD with no downtime and no traffic interruption.Before the upgrade process:Download the FTD platf...
Process for FTD migration with PolicyAs per Cisco documentation, we have below steps for for de-register and register process. Please follow below steps :Step 1 : Break HA pair and de-register your FTD from FMC (old).Step 2 : Register your primary FTD wit...
Hi There,Is there a relationship between the hardware of the Cisco ASA 5505 FWs (V02) and the 9.x software version? Multiple ASA have been successfully updated with the same software. The ASAs that have been updated without any problems are V06 versi...
Dear Cisco Customers and Partners,
We know that the Cisco Identity Services Engine (ISE) is a critical element of your network security and so stability is of paramount importance. As a result, many of you asked us for a suggested release given sev...
Over 100-year-old Yokogawa Engineering Asia deploys Cisco Advanced Malware Protection (AMP) to shield itself against cyber attacks. With Cisco Talos threat intelligence, it stays ahead of the latest malicious behavior on the Internet. Learn more at http:/...