Solved

Setup ACL Cisco ASDM 6.1 (Cisco 5510 series) for Clientless VPN - LDAP/Local

Posted on 2009-07-14
3
870 Views
Last Modified: 2013-12-24
Hey guys.

I am in the middle of setting up a clientless VPN and everything seems to be set (minus certificate, but that doesnt matter right now) but I can't seem to get each custom portal to be its own.

What I am saying is simply, How can I restrict access to other custom portals?

I've already configured Group Policys, AAA Server Groups and LDAP Maps. Two connection profiles have been set as well enabling the drop down menu at login. The problem is, any user with the right password can visit either custom page/portal. Im not sure if I configured the LDAP Map correctly or AAA Groups for that matter.

I also noticed a Web ACL option/setup. Would that by any chance be helpful to my question? If so, I could use some help in setting it up. If there is any screencaptures you would like or current running config let me know. Im a noob on routers at the moment and just started my routing classes on cisco.

I just want controlled access to portals and AD to work, I believe it worked at one point so there must be something that was changed.

ie. User 1 selects Admin = Prohibited User 1 must select Users to proceed
ie. Vendor 1 selects Users/Admin/Other = Prohibited Vendor 1 must select Vendors to proceed
loginwindow.jpg
0
Comment
Question by:zenki_fc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 15

Accepted Solution

by:
bkepford earned 250 total points
ID: 24850826
Lookup Dynamic Access Policies (DAP) that should get you what you're looking for.
0
 
LVL 1

Author Comment

by:zenki_fc
ID: 24851486
Well I fixed it :)

it turns out my objects in AD were moved around and the existing map I had configured on the asdm was "invalid" after correcting the paths in ldap-map on cisco and changing some properties in the advanced menus of the tunnel groups I was able to successfully isolate or "point" each user to the right portal.

Now, when Administrators log in they get all the networking functionalities while users and vendors are limited to protocols and other services.

Thanks for your quick response Bkepford!
0
 
LVL 1

Author Closing Comment

by:zenki_fc
ID: 31603303
Though the accepted solution is not exactly how the problem was solved it was indeed related to my initial request.
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to protecting Oracle Database servers and systems, there are a ton of myths out there. Here are the most common.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question