Is this what you guys are looking for ?

R4#show aaa attributes protocol radius

AAA ATTRIBUTE LIST:
    Type=1     Name=disc-cause-ext                 Format=Enum
        Protocol:RADIUS
        Unknown       Type=195   Name=Ascend-Disconnect-Cau Format=Enum

        Cisco VSA     Type=1     Name=Cisco AVpair          Format=String

    Type=2     Name=Acct-Status-Type               Format=Enum
        Protocol:RADIUS
        Unknown       Type=40    Name=Acct-Status-Type      Format=Enum

    Type=3     Name=Tunnel-Packets-Lost            Format=Ulong
        Protocol:RADIUS
        Unknown       Type=86    Name=Tunnel-Packets-Lost   Format=Ulong

    Type=4     Name=acl                            Format=String
        Protocol:RADIUS
        Unknown       Type=11    Name=Filter-Id             Format=Binary

    Type=5     Name=auth-services                  Format=Enum
        Protocol:RADIUS
        Cisco VSA     Type=1     Name=Cisco AVpair          Format=String

    Type=6     Name=azn-tag                        Format=String
    Type=7     Name=addr                           Format=IPv4 Address
        Protocol:RADIUS
        Unknown       Type=8     Name=Framed-IP-Address     Format=IPv4
Addre
    Type=8     Name=addrv6                         Format=String
        Protocol:RADIUS
        Cisco VSA     Type=1     Name=Cisco AVpair          Format=String

    Type=9     Name=addr-pool                      Format=String
        Protocol:RADIUS
        Unknown       Type=100   Name=Framed-IPv6-Pool      Format=String

        Unknown       Type=218   Name=Ascend-IP-Pool        Format=Ulong

    Type=10    Name=asyncmap                       Format=Ulong
        Protocol:RADIUS
        Unknown       Type=212   Name=Ascend-Asyncmap       Format=Ulong

    Type=11    Name=Authentic                      Format=Enum
        Protocol:RADIUS
        Unknown       Type=45    Name=Acct-Authentic        Format=Enum

    Type=12    Name=autocmd                        Format=String
    Type=13    Name=autocmd_ipprompt               Format=String
    Type=14    Name=callback-dialstring            Format=String
        Protocol:RADIUS
        Unknown       Type=19    Name=Callback-Number       Format=String

        Unknown       Type=227   Name=Ascend-Dial-Number    Format=String

    Type=15    Name=callback-line                  Format=Ulong
    Type=16    Name=nocallback-verify              Format=Ulong
    Type=17    Name=callback-rotary                Format=Ulong
    Type=18    Name=call-drops                     Format=Ulong
    Type=19    Name=call_type                      Format=String
        Protocol:RADIUS
        Cisco VSA     Type=19    Name=call_type             Format=String

    Type=20    Name=call-origin-endpt              Format=String
        Protocol:RADIUS
        Cisco VSA     Type=1     Name=Cisco AVpair          Format=String

    Type=21    Name=call-origin-endpt-type         Format=Enum
        Protocol:RADIUS
        Cisco VSA     Type=1     Name=Cisco AVpair          Format=String

 --More--
FNK


On Wed, May 2, 2012 at 6:39 PM, Mike Rojas <[email protected]> wrote:

>  Eugene and all of the ones that have doubts about it:
>
> This is the non partner document (which is the same I posted before to
> Matt)
>
>
> http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800949ba.shtml
>
> If you follow the path on the Left, you will get there from the Support
> page without having to be logged in. If you want to check if a document is
> reachable, look it on google, or follow the same path on the left without
> being logged in and check if you can get there.
>
> Mike
>
> ------------------------------
> From: [email protected]
> To: [email protected]
> Date: Wed, 2 May 2012 20:21:14 +0000
> CC: [email protected]
> Subject: Re: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions
>
>
>  Interesting,
>
> It never occurred to me that I access that page as a partner as my browser
> cached my Cisco CCO credentials.
>
> It raises a legitimate question how can CCIE candidates get access to
> Cisco documentation without a partner status?
>
>
>
> Eugene
>
>
>
> *From:* Matt Manire [mailto:[email protected]]
> *Sent:* 02 May 2012 12:55
> *To:* Eugene Pefti
> *Subject:* RE: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN
> Solutions
>
>
>
> Thanks Eugene but unfortunately I am not a partner so I can’t access the
> site.
>
>
>
> *Matt Manire*
> *CCSP, CCNP, CCDP, MCSE* *2003 & MCSE 2000*
> *Information Systems Security Manager*
> [email protected]
> *t*: 817.525.1863
> *f*: 817.525.1903
> *m*: 817.271.9165
>
> *First Rate* | 1903 Ascension Boulevard | Arlington, TX 76006|
> www.FirstRate.com <http://www.firstrate.com/>
>
>
>
>
>
> *From:* Eugene Pefti [mailto:[email protected]]
> *Sent:* Wednesday, May 02, 2012 2:53 PM
> *To:* Matt Manire; [email protected]
> *Subject:* RE: [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN
> Solutions
>
>
>
> Take a look at this document, Matt.
>
>
> http://www.cisco.com/en/US/partner/tech/tk583/tk372/technologies_configuration_example09186a00800949ba.shtml
>
> I have never found any place in Cisco documentation where they would
> provide a full list of Cisco VSA for IPSec.
>
>
>
> Eugene
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Matt Manire
> *Sent:* 02 May 2012 08:56
> *To:* [email protected]
> *Subject:* [OSL | CCIE_Security] Lab 4A - Configure Cisco VPN Solutions
>
>
>
> Guys,
>
>
>
> I am trying to work through the practice VPN lab “4.8 Easy VPN with
> External Group Authorization and XAUTH.”  In regards to performing external
> authentication, where can I find a list/documentation for the RADIUS
> attributes to add to the [009\001] cisco-av-pair box under Group
> authentication?
>
>
>
> For example,  as part of this solution I am supposed to input the
> following values in the [009\001] cisco-av-pair box under Group
> authentication:
>
>
>
> Ipsec:tunnel-type=ESP
>
> Ipsec:key-exchange=ike
>
> Ipsec:inacl=170
>
> Ipsec:save-password=1
>
> Ipsec:addr-pool=EZPOOL2
>
>
>
>
>
> Where can a list of these attributes be found for reference?
>
>
>
> psec:tunnel-type=
>
> Ipsec:key-exchange=
>
> Ipsec:inacl=
>
> Ipsec:save-password=
>
> Ipsec:addr-pool=
>
>
>
>
>
> Thanks,
>
>
>
> *Matt Manire*
> *CCSP, CCNP, CCDP, MCSE* *2003 & MCSE 2000*
> *Information Systems Security Manager*
> [email protected]
> *t*: 817.525.1863
> *f*: 817.525.1903
> *m*: 817.271.9165
>
> *First Rate* | 1903 Ascension Boulevard | Arlington, TX 76006|
> www.FirstRate.com <http://www.firstrate.com/>
>
>
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Fawad Khan
> *Sent:* Wednesday, May 02, 2012 9:05 AM
> *To:* Kingsley Charles
> *Cc:* [email protected]
> *Subject:* Re: [OSL | CCIE_Security] AnyConnect per group ACLs
>
>
>
> No still on any connect VPN-filter
>
>
>
> On Wednesday, May 2, 2012, Kingsley Charles wrote:
>
> Are you talking about GETVPN?
>
>
> With regards
> Kings
>
> On Wed, May 2, 2012 at 6:18 PM, Fawad Khan <[email protected]> wrote:
>
> There are two ways to handle that situation which You mentioned.
>
>
>
> 1. An outbound acl on the inside/DMz interface. So that inside hosts
> cannot initiate the traffic because of the unnecessary hole created by acl.
>
> 2. This one is not very restrictive but still better than something I.e
> instead of having the acl like you mentioned
>
> Permit tcp vpn ip host 10.20.30.40 23
>
>
>
> Use this acl
>
> Permit tcp VPN ip gt 1023 host 10.20.30.40 23
>
>
>
>
>
> FNK
>
>
>
> On Wednesday, May 2, 2012, Kingsley Charles wrote:
>
> ASA VPN filter is tricky, but one think to remember is that is directional.
>
> permit tcp any host 10.20.30.40 eq 23
>
> Now this ACL will permit outside user to connect to 
> 10.20.30.40@23(inbound/post decrypt) and at the same time allow
> 10.20.30.40@23 (outbound/pre-encrypt) to any one outside.
>
>
> Have your tried the "match acl" in GETVPN crypto map? Seems it also bears
> a similar property.
>
>
> We can add an ACL with only "deny" entries and precedes the donwloaded acl
> from KS and those traffic are bypassed. This bypass is for outbound. What
> about inbound? The mirror traffic should also be bypassed,right? Whether
> the same ACE is going to the job. It has not been the case for me.
>
>
>
> With regards
> Kings
>
> On Wed, May 2, 2012 at 1:54 PM, Fawad Khan <[email protected]> wrote:
>
> Not the outside network specifically, by remote I mean ip address from the
> VPN pool (which is from perspective outside of the network but another
> perspective it's "now" part of the network after connecting to VPN.
>
>
>
> On Wednesday,  May 2, 2012, Kingsley Charles wrote:
>
> Is 10.X.X.0/24 outside network?
>
> The format for vpn filter is always
>
> access-list name permit <outside IP> <outside port> <inside IP> <inside
> port> irrespective of whatever is the direction of traffic
> (inbound/outbound).
>
> Is this what you said?
>
>
>
> With regards
> Kings
>
> On Wed, May 2, 2012 at 7:21 AM, Fawad Khan <[email protected]> wrote:
>
> Matt,
>
>
>
> As others have said. VPN-Filter will do the job.. however as Eugene
> pointed out, the ACL is tricky...... remember that SOURCE in the ACL is
> always REMOTE (no matter who is initiating the connection). Check this old
> email I wrote couple of months back. it will give you a link as well.
>
>
>
> ===================================
>
>
>
>
>
>
>
> Antonio,
>
>
>
>
>
> I think you have guessed it right, i.e. VPN-Filter under group-policy. I
> usually put something like following in the vpn-filter acl.
>
>
>
> access-list permit vpn-filter-group-1 permit tcp 10.x.x.x 255.255.255.0 gt
> 1023 192.168.x.x 255.255.0.0 eq XYZ.
>
>
>
> where 10.x.x.x is ssl vpn subnet and 192.168.x.x is on the core
> network/dmz/lan and XY is any service.
>
>
>
> the key about vpn-filter ACL is that..... remote addresses (i.e. SSL VPN
> address in your case) would always act as a source, even though there would
> be a chance that inside/core user would access any service on the remote
> address. For example, if you want to enable remote desktop functionatility
> from your core to the ssl users then the vpn-filter acl would like the
> following in addition to regular OUTBOUND ACL on the inside interface.
>
>
>
> access-list permit vpn-filter-group-1 permit tcp 10.x.x.x 255.255.255.0 eq
>
>
>
> --
> FNK
>
> _______________________________________________ For more information
> regarding industry leading CCIE Lab training, please visit
> www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out
> www.PlatinumPlacement.com
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
> Are you a CCNP or CCIE and looking for a job? Check out
> www.PlatinumPlacement.com
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to