5-12
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 5 Identity Firewall
Configure the Identity Firewall
You can specify the traditional or simplified format.
The typical ldap-login-dn command format includes: CN=username,OU=Employees,OU=Sample
Users,DC=sample,DC=com.
Step 7 Configure the LDAP server model for the Microsoft Active Directory server.
server-type microsoft
Example:
hostname(config-aaa-server-host)# server-type microsoft
Step 8 Specify the location of the Active Directory groups configuration in the Active Directory domain
controller.
ldap-group-base-dn string
Example:
hostname(config-aaa-server-host)# ldap-group-base-dn OU=Sample Groups,DC=SAMPLE,DC=com
If not specified, the value in the ldap-group-base-dn command is used. Specifying this command is
optional.
Step 9 Allow the ASA to access the Active Directory domain controller over SSL.
ldap-over-ssl enable
Example:
hostname(config-aaa-server-host)# ldap-over-ssl enable
To support LDAP over SSL, Active Directory server needs to be configured to have this support.
By default, the Active Directory does not have SSL configured. If SSL is not configured in the Active
Directory, you do not need to configure it on the ASA for the Identity Firewall.
Step 10 Specify the server port.
server-port port-number
Example:
hostname(config-aaa-server-host)# server-port 389
hostname(config-aaa-server-host)# server-port 636
By default, if the ldap-over-ssl command is not enabled, the default server port is 389; if the
ldap-over-ssl command is enabled, the default server port is 636.
Step 11 Set the amount of time before LDAP queries time out.
group-search-timeout seconds
Example:
hostname(config-aaa-server-host)# group-search-timeout 300