cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
963
Views
0
Helpful
6
Replies

ASA5508 - Restrict LDAP group access

salinas_42
Level 1
Level 1

I have a remote access vpn that works fine but I need to restrict access to only one active directory group, I have configured the following but any AD user can connect, the AD group to which I want to limit the connection to the vpn is UsersVpn Can someone help me solve this?

ldap attribute-map VPN_MAP
  map-name memberOf Group-Policy
  map-value memberOf cn=UsersVpn,ou=JDLPVpn,dc=fjdlp,dc=com permit-vpn
aaa-server LDAP_JDLP protocol ldap
aaa-server LDAP_JDLP (inside) host 192.168.10.237
 ldap-base-dn DC=fjdlp,DC=com
 ldap-scope subtree
 ldap-naming-attribute sAMAccountName
 ldap-login-password *****
 ldap-login-dn cn=administrador,cn=Users,dc=fjdlp,dc=com
 server-type microsoft
 ldap-attribute-map VPN_MAP

6 Replies 6

Rahul Govindan
VIP Alumni
VIP Alumni

The above configuration only assigns the group-policy "permit-vpn" to the users in the AD group UsersVpn. Anyone not in that group will get assigned the default-group-policy that is assigned to the tunnel-group. In order to restrict those users, your default-group-policy should be something other than "permitvpn" (like NoAccess) and the "vpn-simultaneous-logins" set to 0. "permitvpn" should have this value set to 3.

Example for this is given here:

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/91831-mappingsvctovpn.html#anc15

Hello
I currently have this group policy which is the default

group-policy GroupPolicy_JARDINES-RA internal
group-policy GroupPolicy_JARDINES-RA attributes
 wins-server none
 dns-server value 192.168.10.237
 vpn-tunnel-protocol ssl-client
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value Jardines-red
 default-domain none

Then what I should do is change to this policy so that nobody can connect and create a new one so that only users who are in the "UsersVpn" group can connect

group-policy GroupPolicy_JARDINES-RA internal
group-policy GroupPolicy_JARDINES-RA attributes
 vpn-simultaneous-logins 0

group-policy permit-vpn internal
group-policy permit-vpn attributes
 wins-server none
 dns-server value 192.168.10.237
 vpn-simultaneous-logins 3
 vpn-tunnel-protocol ssl-client
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value Jardines-red
 default-domain none

Yes, you are correct. This is considering that "GroupPolicy_JARDINES-RA" is the default-group-policy under the tunnel-group.

Hello
Make the changes and now no user can connect, when placing the credentials in anyconnect send password error message
, both users who are added to the group and those who are not in the group

Run a "debug ldap 255" on the ASA when testing this to see if they are being assigned to the right Group-policy.

Hello
Thank you very much for your help, the problem was the upper and lower case, change it and now it works well.