amritpatek Fri, 08/03/2007 - 09:45

Users who have ?dial-in? permission set in the AD/LDAP server are mapped to the ?Allowaccess? group policy, and the users with no ?dial-in? permission set are assigned to the ?No-access? group policy of ASA. The ?No access? group policy does not have the VPN-protocol set for WebVPN, which, in turn, drops the WebVPN session

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008089149d.shtml

WILLIAM STEGMAN Fri, 08/03/2007 - 09:56

I think I have have been too vague in my original post. I'm referring to the list of firewalls Cisco has within a vpn group policy that you can setup to require a vpn remote access client to have in order to complete the connection to the VPN server. Right now there is zone labs, cisco built-in, custom firewall, etc. I'm wondering if there are any new vendors in the new 8.0 version of ASA?

Actions

This Discussion