I will be building a new RAS solution for a customer. Users will authenticate using RSA SecurID to the ASA. I will be using LDAP to map these users into group policies on the ASA. Behind the ASA I will have a CAS in Virtual Gatway mode. Once the users are authenticated agains the ASA I will use VPN SSO to automatically authenticate the user against the NAC infastructure.
My question is this. Is it possible to map users to NAC roles based on the group-policy assigned by the ASA to a NAC role using accounting packets from the ASA? I cannot find specific examples on how to do this with just the ASA and the NAC appliance without introducing ACS.
User A authenticates to the ASA using SecurID and is mapped to the group policy "employees" by LDAP - I would like them to be dynamically mapped to a NAC role called employees by the accounting packets from the ASA. If its possible, which attribute would hold the group policy info?
I am open to other ideas as well.
Thanks Kevin for the response.
With this scenario I would be using AD authentication, either with LDAP or Kerberos and then authorize the user with LDAP to provide them will a role mapping.
The scenario I'm looking at is using the accounting packets from the ASA to map the user into a NAC role. The user will already be authorized by LDAP when logging into the ASA, I'm trying to save a step by avoiding yet a 2nd authorization to LDAP. My Auth provider in this scenario would be VPN SSO.
It's not tunnel-group name.
checked the link below
Basically, you need configure "ldap attribute-map" on ASA to map group attribute which is sent to ASA by LDAP server to Radius class. The value of that "group attribute" would be the value of Radius class 25. it's nothing related to tunnel-group name.
If a user called userA who is a member of group groupA in LDAP, I can map the "memberOf" attribute to radius "class" using a LDAP MAP on the ASA and this class will be forwarded in a radius accounting packet to the NAC so I can make a role mapping?
My customer plans on having about 12 - 14 tunnel groups, all but one using VPN SSO. The other will be using Windows AD SSO with Kerberos. The plan is to have the ASA perform all the authentication and authorization and send the radius accounting packet to the NAC for SSO where I can also perform the role mapping.
Yes, you are correct.
Saying LDAP server returns the group info of "UserA" in memberof attribute, it's value is "groupA".
You configure ASA to map "memberof" attribute value "groupA" to Radius class attribute value "group-policyA", where "group-policyA" is a group-policy cy name configured on ASA. ASA will send Radius accounting packet including Radius class attribute with value "group-policyA" to NAC. You can use it to do role mapping. HTH.
Thanks for your help Kevin.
I'm working with some folks on cabling the NAC appliance. As I have already mentioned this will be used in conjunction with a Cisco ASA to perform posture against the VPN users. I plan to deploy this in VGW mode with L3 support. Do you see any issues with cabling the ASA directly to the untrusted interface on the CAS? Available switch ports are the main reason for this discussion.
How would the VLAN mapping work in this instance? Would I need a trunk interface on the ASA to pass the necessary VLAN tags?
If you connect ASA to CAS directly, I think you have to use subinterface on ASA with related VLAN assigned. In this way, ASA can send the packet with the correct vlan tag.