If you’re just using it so their AD credentials are being referenced for AnyConnect/etc, it’s just a matter of changing the IPs in ASDM … highlight the AAA server group on the top that contains those old DCs and then add the new ones down below in the ‘servers in the selected group’ section (presuming you’re using NT Domain protocol).
They’ve got a bloody convenient ‘test’ button out to the right side of that section, to make sure it flies. From: Tom Miller [mailto:[email protected]] Sent: Tuesday, November 13, 2012 10:59 AM To: NT System Admin Issues Subject: Cisco ASA question Folks, I have a new job and they use Cisco ASA firewalls here. I'm new to Cisco firewalls so I'm still learning. Under Remote Access VPN --> AAA/Local User ---> AAA Server groups, I have a few Windows 2000 servers that are DCs listed here. Those are going to be retired and I need to point this to 2008 R2 servers. Can anyone tell me which roles/features on a Windows 2008 R2 server I need to install/configure to be used by the ASA? Thanks, Tom ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected]<mailto:[email protected]> with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
