Having trouble passing radius attributes from ASA to NPS.via a Dynamic Access Policy.
I'm having some problems with a certain DAP that included a radius attribute. I can't get it to match a certain
Here's how it's setup right now.
User log in on VPN (ipsec, anyconnect and portal) and their access is determined by AD groups that is specified in the NPS on a 2008 server.
The DAP looks like this.
I got 4242 from this (i also found that "memberOf" could also be 145, and therefor 4241, but that didn't help)
"For RADIUS attributes, DAP defines the Attribute ID = 4096 + RADIUS ID. For example: The RADIUS attribute "Access Hours" has a Radius ID = 1, therefore DAP attribute value = 4096 + 1 = 4097. The RADIUS attribute "Member Of" has a Radius ID = 146, therefore DAP attribute value = 4096 + 146 = 4242."
The NPS Network policy looks like this.
In the log you can see that it's using DfltAccessPolicy and therefore denying access.
The authentication server is set on RADIUS and if I try my account there it works.
My account is in the right group (ggSEGRY_VPN_NO_ALWAYS_ON)
As soon I a remove the radius attribute it's working, but I need it to force some other polices on certain users.
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...