Book now with code EOY2025
lsud00d wrote: » So I'm not a network guy but I can poke around the ASDM interface to get an idea of what's going on. I'm trying to do cleanup in AD and as of now we have several AD groups that membership grants access to the VPN, however in the ASDM I can only locate one location where groups are specifically mentioned (Remote Access VPN-->Network (Client) Access-->Dynamic Access Policies.) I don't see any attribute mappings in use so it appears to be controlled through DAP's but there are only 2 AD groups configured and somehow there are other groups in our AD that allow users to access the VPN. I can't figure out where else they would be coming from...I don't think it's RADIUS either. Any pointers? ASDM version is 7.1. I've been looking through Cisco docs and on Google but no avail. TIA
You need to know how they are authenticating and verify which AD groups are in production yes?
lsud00d wrote: » Heh, I totally forgot about that lil guy. He's a D1 legacy RADIUS server who has one more remote access policy than RADIUS01 (other than internal wifi and connecting to devices), and it is aptly titled 'ASA-VPN-Authentication' but it only contains one AD group. So, there still exists other groups in AD that users are members of and somehow connect to the VPN.
lsud00d wrote: » I checked the current connections and one is using this connection profile: aaa-server D1-AD protocol ldap aaa-server D1-AD (SERVER-CORE) host 10.40.9.10 ldap-base-dn DC=D1,DC=ORG ldap-scope subtree ldap-naming-attribute sAMAccountName ldap-login-password ***** ldap-login-dn CN=service asa,OU=NoPolicy,OU=Servers,DC=D1,DC=ORG server-type microsoft It has the base DN so it can do it's LDAP crawl, but this says nothing of group AD specificity.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!