fightclub34 wrote: » This would definitely work. the only problem is we have about 60 switches that would be alot of policies and work on the radius server
fightclub34 wrote: » ASA is .4 all other devices range from .10 - 100 it looks like you can use a subnet mask not an actual wildcard mask. Is there anyway to omit a low range and apply the same policy to the .10 - 100
sprkymrk wrote: » Or better yet, just use the "Client IP Address equals" AND "Windows Group equals" for the firewall policy as your first policy. Then simply use a "Windows Group is" for your other policies, omitting the "Client IP Address equals" for your switches.
fightclub34 wrote: » Ok thanks guys this is awesome. My last pitfall is i have mgmt users on the asa for configurations and i also have vpn groups that use radius. So right now my vpn users could actually access the device because they pass the radius group. Any ideas for this one