My envrionment consists of two ASA 5510 devices in active/passive failover, both v8.2(5).
For years I have taken the easy way out to configure VPN access by using split-tunnel to give access to internal resources. Prior to the ASA I confugured my PIX's and entirely different way and could limit individual users to specific VLANs, but it's been so long I have forgotten how I did it. To make it worse, it's been awhile since I attended an ASA course so i'm very rusty. All authentication is done through Cisco ACS (windows) and all my users are using AnyConnect.
I would appreciate if anyone would have any links or resources that I could follow to convert my split-tunnel configuration to a more user-centric model where I can limit radius usernames to specific internal resources. Right now all VPN users are able to access the same VLANs, and even though some of these networks have ACL's on the OS side for access to resources, it still makes me uncomfortable to give a consultant access to some of our networks even though they lack the OS authentication.
I hope I am explaining myself sufficiently.
Thanks
Robert