If you’re just using it so their AD credentials are being referenced for 
AnyConnect/etc, it’s just a matter of changing the IPs in ASDM … highlight the 
AAA server group on the top that contains those old DCs and then add the new 
ones down below in the ‘servers in the selected group’ section (presuming 
you’re using NT Domain protocol).

They’ve got a bloody convenient ‘test’ button out to the right side of that 
section, to make sure it flies.



From: Tom Miller [mailto:[email protected]]
Sent: Tuesday, November 13, 2012 10:59 AM
To: NT System Admin Issues
Subject: Cisco ASA question

Folks,

I have a new job and they use Cisco ASA firewalls here.  I'm new to Cisco 
firewalls so I'm still learning.

Under Remote Access VPN --> AAA/Local User ---> AAA Server groups, I have a few 
Windows 2000 servers that are DCs listed here.  Those are going to be retired 
and I need to point this to 2008 R2 servers.

Can anyone tell me which roles/features on a Windows 2008 R2 server I need to 
install/configure to be used by the ASA?

Thanks,
Tom

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
[email protected]<mailto:[email protected]>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to