User-based attributes policy enforcement – Cisco ASA 5505 User Manual

Page 1914

Advertising
background image

C-16

Cisco ASA 5500 Series Configuration Guide using the CLI

Appendix C Configuring an External Server for Authorization and Authentication

Configuring an External LDAP Server

Active Directory/LDAP VPN Remote Access Authorization Examples

This section presents example procedures for configuring authentication and authorization on the ASA
using the Microsoft Active Directory server. It includes the following topics:

User-Based Attributes Policy Enforcement, page C-16

Placing LDAP Users in a Specific Group Policy, page C-18

Enforcing Static IP Address Assignment for AnyConnect Tunnels, page C-20

Enforcing Dial-in Allow or Deny Access, page C-22

Enforcing Logon Hours and Time-of-Day Rules, page C-25

Other configuration examples available on Cisco.com include the following TechNotes.

ASA/PIX: Mapping VPN Clients to VPN Group Policies Through LDAP Configuration Example at
the following URL:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149
d.shtml

PIX/ASA 8.0: Use LDAP Authentication to Assign a Group Policy at Login at the following URL:

http://www.cisco.com/en/US/partner/products/ps6120/products_configuration_example09186a008
08d1a7c.shtml

User-Based Attributes Policy Enforcement

You can map any standard LDAP attribute to a well-known Vendor-Specific Attribute (VSA) as well as
map one or more LDAP attribute(s) to one or more Cisco LDAP attributes.

The following example shows how to configure the ASA to enforce a simple banner for a user configured
on an AD LDAP server. On the server, use the Office field in the General tab to enter the banner text.
This field uses the attribute named physicalDeliveryOfficeName. On the ASA, create an attribute map
that maps physicalDeliveryOfficeName to the Cisco attribute Banner1. During authentication, the ASA
retrieves the value of physicalDeliveryOfficeName from the server, maps the value to the Cisco attribute
Banner1, and displays the banner to the user.

This example applies to any connection type, including the IPsec VPN client, AnyConnect SSL VPN
client, or clientless SSL VPN. In the example, User1 connects through a clientless SSL VPN connection.

To configure the attributes for a user on the AD or LDAP Server, perform the following steps:

Step 1

Right-click a user.

The Properties dialog box appears (see

Figure C-3

).

gt

Operator

Greater than value

eq

Operator

Equal to value

neq

Operator

Not equal to value

range

Operator

Inclusive range. Should be followed by two values.

Table C-5

ASA-Supported Tokens (continued)

Token

Syntax Field

Description

Advertising