4/6/2024 0 Comments Cisco anyconnect server list![]() Next > Add > Select ‘Class’ > Add > Enter ‘ ou=‘ > OK > Close > Next > Finish.Ĭreate a ‘Pool’ of IP addresses for the remote clients Next > Next > Add in ‘ Unencrypted (PAP SPAP)‘ > Next > No. Then, on your NAP Server create a Network Policy ( for each group), like so Īdd the ‘ User Group Condition’with the correct AD Group for this policy.Īdd the ‘ Client Friendly Name‘ condition, and set to to the name you used for the RADIUS client. Windows Server 2016 & 2012 Setup RADIUS for Cisco ASA 5500 Authentication Configure NAP Network Policies For Group Authenticationįirstly you will need some groups setup in AD, with some users in them, for testing. Use the link (below) to install the role, add the ASA as a RADIUS client, then return here (before configuring any policies!) Rather than reinvent the wheel, I’ve already ran though this. So when I had a client with a similar requirement, I sat down fired up the lab, and documented it. Fast forward to today, and I’m now working with the guy who set it up! (Kudos to Paul White). A few years ago I replaced a firewall that was setup like this, and while it took me a while to work out what was going on, I remember thinking it was an elegant solution. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |