I'm setting up our ssl vpn to authenticate to a radius server. I have the radius server sending back the group-policy that the user should connect to, and this works good. The problem that I have is that if the user logs in, and their radius account isn't sending back the class 25 attribute, they land in the default policy. I want them to be denied access completely, and not be able to log in. I've tried removing the svc and webvpn protocols on the default policy, but this doesn't do anything. In fact, it disallows them from being able to log in, but also keeps them from being able to log in when they're in their appropriate group. It seems that the default policy is hit before the radius attributes get sent back.
Any ideas on how I can deny a login if they're not part of any allowed groups?