This is a little bit of a thread hijack, but it's close enough to the subject matter :)
I tried this out on Cistron radius using both the Cisco attribute 'ip:inacl#' and 'acl=test'.
In both cases, the ACL's showed as being applied to the VPN user in a 'show uauth', but they didn't seem to take affect.
For example, I did a small ACL to block port 80 traffic and allow everything else:
ip:inacl#=deny tcp any any eq 80
ip:inacl#=permit ip any any
uauth showed it as assigned and the ACL matched up with what I configured in radius, but it didn't stop any traffic.
next I created a local ACL with the same data as the one I created in radius, and sent attribute values "acl=acltest". Once again uauth showed it as applied, but I was still able to surf around without it taking affect.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...