B-21
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Appendix B      Configuring an External Server for Authorization and Authentication
  Configuring an External LDAP Server
Step 4 Add the new group-policy on the adaptive security appliance and configure the required policy attributes 
that will be assigned to the user. For this case, we created the Group-policy-1, the name entered in the 
Department field on the server:
hostname(config)# group-policy Group-policy-1 external server-group LDAP_demo
hostname(config-aaa-server-group)#
Step 5 Establish the VPN connection as the user would, and verify that the session inherits the attributes from 
Group-Policy1 (and any other applicable attributes from the default group-policy)
You can monitor the communication between the adaptive security appliance and the server by enabling 
the debug  ldap 255 command from privileged EXEC mode. Below is sample output of this command. 
The output has been edited to provide the key messages:
[29] Authentication successful for user1 to 3.3.3.4
[29] Retrieving user attributes from server 3.3.3.4
[29] Retrieved Attributes:
[29] department: value = Group-Policy-1
[29] mapped to IETF-Radius-Class: value = Group-Policy-1