EasyManuals Logo

Cisco ASA 5585-X Cli Configuration Guide

Cisco ASA 5585-X
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #2148 background imageLoading...
Page #2148 background image
1-24
Cisco ASA Series CLI Configuration Guide
Appendix 1 Configuring an External Server for Authorization and Authentication
Configuring an External LDAP Server
Note If you select the Control access through the Remote Access Policy option, then a value is not
returned from the server, and the permissions that are enforced are based on the internal group
policy settings of the ASA.
Step 3 Create an attribute map to allow both an IPsec and AnyConnect connection, but deny a clientless SSL
connection.
The following example shows how to create the map tunneling_protocols, and map the AD attribute
msNPAllowDialin used by the Allow Access setting to the Cisco attribute Tunneling-Protocols using the
map-name command, and add map values with the map-value command:
hostname(config)# ldap attribute-map tunneling_protocols
hostname(config-ldap-attribute-map)# map-name msNPAllowDialin Tunneling-Protocols
hostname(config-ldap-attribute-map)# map-value msNPAllowDialin FALSE 48
hostname(config-ldap-attribute-map)# map-value msNPAllowDialin TRUE 4
Step 4 Associate the LDAP attribute map to the AAA server.
The following example enters the aaa server host configuration mode for the host 10.1.1.2, in the AAA
server group MS_LDAP, and associates the attribute map tunneling_protocols that you created in Step 2:
hostname(config)# aaa-server MS_LDAP host 10.1.1.2
hostname(config-aaa-server-host)# ldap-attribute-map tunneling_protocols
Step 5 Verify that the attribute map works as configured.
Step 6 Try connections using clientless SSL, the AnyConnect client, and the IPsec client. The clientless and
AnyConnect connections should fail, and the user should be informed that an unauthorized connection
mechanism was the reason for the failed connection. The IPsec client should connect because IPsec is
an allowed tunneling protocol according to the attribute map (see Figure 1-10 and Figure 1-11).
Figure 1-10 Login Denied Message for Clientless User

Table of Contents

Other manuals for Cisco ASA 5585-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA 5585-X and is the answer not in the manual?

Cisco ASA 5585-X Specifications

General IconGeneral
Firewall Throughputup to 20 Gbps
Maximum VPN Peers10, 000
IPS Throughputup to 10 Gbps
Maximum Concurrent Connections10, 000, 000
Security Contexts250
Interfaces8 x 10 Gigabit Ethernet
Connections Per Second350, 000
Power SupplyDual, hot-swappable

Related product manuals