Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2102
  • Last Modified:

Cisco ASA LDAP Authentication and Default Group Policy

Hi, I'm running an ASA 5510 with 8.4(3) code. My remote access tunnel-group is authenticating to an Active Directory ldap server with an attribute map to assign group policy. What I would like to accomplish is that if the user is not a member of any of the groups in the attribute map, the client will disconnect or not connect at all. Is this possible?

As it presently stands, the ldap authentication mechanism will connect the client as long as the username/password are valid, and if the user is not a member of any of the groups in the attribute map, they are assigned to the default group policy.

Relevant config portions below, thanks.

tunnel-group vpn_group type remote-access
tunnel-group vpn_group general-attributes
 authentication-server-group ActiveDirectory LOCAL
tunnel-group vpn_group webvpn-attributes
 group-alias xxxxxx enable
tunnel-group vpn_group ipsec-attributes
 ikev1 pre-shared-key *****

aaa-server ActiveDirectory protocol ldap
aaa-server ActiveDirectory (inside) host 192.168.183.65
 ldap-base-dn DC=xxxxxx,DC=net
 ldap-scope subtree
 ldap-naming-attribute sAMAccountName
 ldap-login-password *****
 ldap-login-dn CN=Administrator,CN=Users,DC=xxxxxx,DC=net
 server-type microsoft
 ldap-attribute-map ldap-map
aaa-server ActiveDirectory (inside) host 192.168.183.64
 ldap-base-dn DC=xxxxxx,DC=net
 ldap-scope subtree
 ldap-naming-attribute sAMAccountName
 ldap-login-password *****
 ldap-login-dn CN=Administrator,CN=Users,DC=xxxxxx,DC=net
 server-type microsoft
 ldap-attribute-map ldap-map
 
ldap attribute-map ldap-map
  map-name  memberOf IETF-Radius-Class
  map-value memberOf "CN=xxxxxx VPN Admin,OU=Groups,DC=xxxxxx,DC=net" admin_policy
  map-value memberOf "CN=xxxxxx VPN Dial-in Global,OU=Groups,DC=xxxxxx,DC=net" employee_policy
  map-value memberOf "CN=xxxxxx VPN xxxxxx,OU=Groups,DC=xxxxxx,DC=net" xxxxxx_policy
  map-value memberOf "CN=xxxxxx VPN xxxxxx,OU=Groups,DC=xxxxxx,DC=net" xxxxxx_policy
  map-value memberOf "CN=xxxxxx VPN xxxxxx,OU=Groups,DC=xxxxxx,DC=net" xxxxxx_policy
 
group-policy DfltGrpPolicy attributes
 wins-server value 192.168.183.16 192.168.183.65
 dns-server value 192.168.183.16 192.168.183.65
 vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless
 default-domain value xxxxxx.net
 address-pools value vpnpool
 webvpn
  anyconnect profiles value AdminProfile type user
0
Syntax-Montreal
Asked:
Syntax-Montreal
  • 2
2 Solutions
 
CyberwrathCommented:
I have not seen what your asking done and I am suspecting its not possible as the functionality your seeing is the asa using the default policy for its intended purpose. While that might be undesirable there are ways to ensure the users without groups do not get access to anything  I suspect if you can do the above (nice config btw) you know how to accomplish what your asking, if not reply back and I can help.

Thank you!
0
 
Syntax-MontrealAuthor Commented:
Thanks for the comment Cyber, I just found the solution: set simultaneous-vpn-logins value to 0 for the DfltGrpPolicy, then you can't connect unless you match a value on the attribute map.

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml
0
 
Syntax-MontrealAuthor Commented:
The solution I found was the correct answer.
0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now