cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1560
Views
0
Helpful
1
Replies

Mapping Split tunnel list value from Radius (ACS) to ASA for remote access VPN.

dtochilovsky
Level 1
Level 1

Hello all, I am tryingto replace a VPN3000 with an ASA (8.4) for remote access. We use Cisco ACS for authorization and accounting, and RSA for authorization.

On the VPN3000 we were able to pass the Split-Tunnel list to restrict users access to only specified IP's.

I am trying to replicate the same on the ASA. I understand that I can create access-lists that will limit user access, and I am trying to understand how to assign an access list to the user based on the Radius attribute -  [3076\027] IPSec-Split-Tunnel-List.

Is this done using the Dynamic Acccess Policy?

How do I assign the Radius Attribute of the IPSec-Split-Tunnel-List to the dynamic policy?

Any help will be greatly appreciated.

Dima.

1 Reply 1

dtochilovsky
Level 1
Level 1

I found out that for Dynamic Access Policy the Radius attibute equals 4096 + RADIUS ID. So I configured DAP to look for Radius attribute of 4123 (4096+27 which is the value for IPSec Split Tunnel in Radius). But testing it with Remote Access VPN there is not split tunneling.

The question is how do I apply this Dynamic Access policy to the remote vpn users?

Again any help will be appreciated.

Dima.