07-17-2023 12:58 PM
Hi Everyone!
I’m trying to use the Dynamic Access Policy in Cisco FMC to create a RA policy for specific VPN profiles.
I’m trying the new FMC DAP option under Device/VPN/DAP.
Have someone ever used this feature to create a policy like this:
I tried to find documentation about this new part in FMC 7.0, but I need help finding good documentation.
I tried the LDAP criteria memberOf, and the Radius criteria 4242 (according to Cisco Documentation, this is for RADIUS attributes, DAP defines the Attribute ID = 4096 + RADIUS ID). And used the Cisco VPN Criteria with Connection Profile or Group Policy.
Thanks for any help on this!
07-20-2023 03:00 AM
05-03-2024 03:03 AM
No help..... WHAT HostScan package?
I have this issue, but I want the FTD to check my AD domain that the user is a member of a group.
05-03-2024 03:56 AM
Make new post it better
MHM
05-04-2024 10:03 AM
I don't think you need hostscan for this task. Both connection profile and AD group are AAA attributes: aaa.cisco.tunnelgroup and aaa.ldap.memberOf. Refer to https://community.cisco.com/t5/security-knowledge-base/asa-8-x-dynamic-access-policies-dap-deployment-guide/ta-p/3117596
04-23-2025 06:02 AM
@Infrastructure Team did you ever get this resolved? I have the same requirement and have been able to use DAP successfully to achieve the end result.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide