I haven't tried this myself yet (so no guarantees :)), but I believe you should be able to do something like this:
ip local pool poolA 192.168.1.1 192.168.1.254
aaa attribute list listA
attribute type addr-pool poolA
username a password p4$$w0rd
username a aaa attribute list listA
aaa authorization network localauthor local
webvpn gateway yourGW
webvpn context yourCTX
aaa authorization list localauthor
In the attribute list you can then also specify other attributes (do "attribute type ?" for a long list) if needed.
I'm assuming you want to configure everything locally. Alternatively you can use Radius or LDAP authentication/authorization.
I tried this and yes, it solved partialy the problem assigning different IP addresses from local pool lists to different users using this way. However the main problem from my first post remains.. even though protected networks are specified on policy groups. Using attribute type command (that sure is the biggest list i've seen on a cisco router), i tried many commands like svc, split, policy, webvpn etc.. Still nothing
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :