I think there is mixing between : user-vpn-group which specify and lock the 
user to tunnel group and ou which just specify user policy , which if spicified 
and if it is  (internal or external )  its attributes will be merged with other 
groups spiciefied on tunnel group and default group policy 

Regards 

Date: Sat, 17 Sep 2011 09:39:03 +0530
From: [email protected]
To: [email protected]
CC: [email protected]
Subject: Re: [OSL | CCIE_Security] ASA ezVPN Server with RADIUS Authorization

Why do you want to combine them? OU seems to do the subset work of 
user-vpn-group.


With regards
Kings

On Sat, Sep 17, 2011 at 1:27 AM, Mark Senteza <[email protected]> wrote:

Can you combine them ? I've tried it and it doesnt fail to establish a VPN 
connection or get assigned to the right group. 


On Fri, Sep 16, 2011 at 3:57 AM, Kingsley Charles <[email protected]> 
wrote:


So "OU" is not required when we use "user-vpn-group" and it works, But I have 
not seen any docs. 



In CCIE lab, I think it's safer to use "OU"


With regards
Kings


On Fri, Sep 16, 2011 at 6:37 AM, Jim Terry <[email protected]> wrote:



Hi Mark,



OU- always puts a users  in that group.

user-vpn-group=  if a user tries to login under the wrong group the

connection is terminated.  If he logs with the right group- he is

allowed.



JT







On Wed, Sep 14, 2011 at 11:29 PM, Kingsley Charles

<[email protected]> wrote:

> I think, it's better to lab and see what's happening.

>

> Snippet from

> http://www.cisco.com/en/US/docs/ios/sec_secure_connectivity/configuration/guide/sec_easy_vpn_srvr_ps6441_TSD_Products_Configuration_Guide_Chapter.html#wp1516834




>

> User-VPN-Group

>

> The User-VPN-Group attribute is a replacement for the Group-Lock attribute.

> It allows support for both preshared key and RSA signature authentication

> mechanisms such as certificates.

>

> If you need to check that the group a user is attempting to connect to is

> indeed the group the user belongs to, use the User-VPN-Group attribute. The

> administrator sets this attribute to a string, which is the group that the

> user belongs to. The group the user belongs to is matched against the VPN

> group as defined by group name (ID_KEY_ID) for preshared keys or by the OU

> field of a certificate. If the groups do not match, the client connection is

> terminated.

>

> This feature works only with AAA RADIUS. Local Xauth authentication must

> still use the Group-Lock attribute.

>

> BTW, why are you using IOS Radius attribute for ASA authorization?

>

> With regards

> Kings

>

> On Thu, Sep 15, 2011 at 8:00 AM, Mark Senteza <[email protected]>

> wrote:

>>

>> OK.

>>

>> So it really does do the same thing as the "ipsec:user-vpn-group" commands

>> under the "Cisco IOS/PIX Radius Attributes"

>>

>> To me it seemed to do just that, but thought there might be a difference.

>>

>> On Wed, Sep 14, 2011 at 6:40 PM, Jim Terry <[email protected]> wrote:

>>>

>>> It directly adds the user to the ASA group that the OU=xx; points to.

>>>

>>> JT

>>>

>>>

>>> On Wed, Sep 14, 2011 at 7:03 PM, Mark Senteza <[email protected]>

>>> wrote:

>>> > Jim,

>>> >

>>> > so you're saying that the [025] Class setting overrides the

>>> > "ipsec:user-vpn-group" setting or  directly adding the user to the

>>> > group ?

>>> > Is that right

>>> >

>>> > Mark

>>> >

>>> > On Wed, Sep 14, 2011 at 5:58 PM, Jim Terry <[email protected]> wrote:

>>> >>

>>> >> Hi Mark,

>>> >>

>>> >> The OU on the ACS will override what is on the ASA- even if it is the

>>> >> same.  A practical application is you put all vpn users into one

>>> >> tunnel group/group policy with no access.  Then match them by OU and

>>> >> put them in a diff group policy on the ASA based on HR/Execs etc.

>>> >>

>>> >> JT

>>> >>

>>> >>

>>> >>

>>> >> On Wed, Sep 14, 2011 at 4:12 PM, Mark Senteza

>>> >> <[email protected]>

>>> >> wrote:

>>> >> > Kingsley,

>>> >> >

>>> >> > I did have the default-group-policy defined under the tunnel-group

>>> >> > configuration. The config

>>> >> >

>>> >> > group-policy EZVPN external server-group RADIUS password cisco

>>> >> >

>>> >> > tunnel-group EZVPN type remote-access

>>> >> > tunnel-group EZVPN general-attributes

>>> >> >  default-group-policy EZVPN

>>> >> >

>>> >> >

>>> >> > On Tue, Sep 13, 2011 at 11:08 PM, Kingsley Charles

>>> >> > <[email protected]> wrote:

>>> >> >>

>>> >> >> When you don't have the "default-group-policy" configured under the

>>> >> >> tunnel

>>> >> >> general sub-mode, then ASA will not know which group policy to

>>> >> >> apply.

>>> >> >> In

>>> >> >> that case, you should add Radius AV 25 to the Xauth user account on

>>> >> >> ACS

>>> >> >> and

>>> >> >> that should be the external group policy name that you have

>>> >> >> configured

>>> >> >> on

>>> >> >> the ASA.

>>> >> >>

>>> >> >>

>>> >> >> With regards

>>> >> >> Kings

>>> >> >>

>>> >> >> On Wed, Sep 14, 2011 at 7:20 AM, Mark Senteza

>>> >> >> <[email protected]>

>>> >> >> wrote:

>>> >> >>>

>>> >> >>> Hello all,

>>> >> >>>

>>> >> >>> I have my ASA setup as an EZVPN server, with an externally

>>> >> >>> configured

>>> >> >>> group-policy on the RADIUS server, like so:

>>> >> >>>

>>> >> >>>                 group-policy EZVPN external server-group RADIUS

>>> >> >>> password

>>> >> >>> cisco

>>> >> >>>

>>> >> >>> My group setup has the following:

>>> >> >>>

>>> >> >>>               Group renamed to "EZVPN"

>>> >> >>>

>>> >> >>>               Cisco VPN 3000/ASA/PIX v7.x+ RADIUS Attributes

>>> >> >>>                      [3076\011] Tunneling-Protocol

>>> >> >>> =

>>> >> >>> WebVPN & IPSec

>>> >> >>>                      [3076\072] IPSec-Split-Tunnel-List

>>> >> >>> =

>>> >> >>> SPLIT-TUNNEL                                                    <-

>>> >> >>> SPLIT-TUNNEL ACL configured on the ASA

>>> >> >>>                      [3076\055] IPSec-Split-Tunneling-Policy   =

>>> >> >>> Only

>>> >> >>> tunnel networks in the list

>>> >> >>>                      [3076\217]

>>> >> >>> Address-Pools                       =

>>> >> >>> EZVPN

>>> >> >>> <-

>>> >> >>> EZVPN address pool configured on the ASA

>>> >> >>>

>>> >> >>> I have a user setup (for pulling down Radius Attributes) as

>>> >> >>> follows:

>>> >> >>>                 User Name: EZVPN   (same name as the Group)

>>> >> >>>                 Password: cisco

>>> >> >>>

>>> >> >>> And finally my XAUTH User Setup

>>> >> >>>                 User Name: ezvpnuser

>>> >> >>>                 Password: cisco

>>> >> >>>

>>> >> >>>                 setup config for test 1 - under Cisco IOS/PIX 6.x

>>> >> >>> RADIUS

>>> >> >>> Attributes

>>> >> >>>

>>> >> >>> [009\001]

>>> >> >>> cisco-av-pair

>>> >> >>>

>>> >> >>> ipsec:user-vpn-group=EZVPN

>>> >> >>>

>>> >> >>>

>>> >> >>>                setup config for test 2 - under IETF RADIUS

>>> >> >>> Attributes

>>> >> >>>

>>> >> >>> [025]

>>> >> >>> Class

>>> >> >>>

>>> >> >>> OU=EZVPN;

>>> >> >>>

>>> >> >>> My question is related to the setup config I mentioned in the last

>>> >> >>> section for test 1 and test 2. When I use either config for the

>>> >> >>> XAUTH

>>> >> >>> user I

>>> >> >>> am still able to successfully establish a VPN connection to the

>>> >> >>> ASA

>>> >> >>> EZVPN

>>> >> >>> server. The user is assigned the attributes as defined in the

>>> >> >>> group

>>> >> >>> setup

>>> >> >>> and encrypts traffic only to the split-tunnel networks.

>>> >> >>>

>>> >> >>> Why and when would I have to use the "[025] Class" config under

>>> >> >>> the

>>> >> >>> IETF

>>> >> >>> RADIUS Attributes for the user ?

>>> >> >>>

>>> >> >>> Mark

>>> >> >>>

>>> >> >>> _______________________________________________

>>> >> >>> For more information regarding industry leading CCIE Lab training,

>>> >> >>> please

>>> >> >>> visit www.ipexpert.com

>>> >> >>>

>>> >> >>> Are you a CCNP or CCIE and looking for a job? Check out

>>> >> >>> www.PlatinumPlacement.com

>>> >> >>

>>> >> >

>>> >> >

>>> >> > _______________________________________________

>>> >> > For more information regarding industry leading CCIE Lab training,

>>> >> > please

>>> >> > visit www.ipexpert.com

>>> >> >

>>> >> > Are you a CCNP or CCIE and looking for a job? Check out

>>> >> > www.PlatinumPlacement.com

>>> >> >

>>> >

>>> >

>>

>>

>> _______________________________________________

>> For more information regarding industry leading CCIE Lab training, please

>> visit www.ipexpert.com

>>

>> Are you a CCNP or CCIE and looking for a job? Check out

>> www.PlatinumPlacement.com

>

>








_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com                                         
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to