Dynamic access of political turmoil

I have a 5510 ASA and I try to implement policies for dynamic access (DAP) for SSL VPN remote access control.

I have created several policies for specific users/providers and a hard time enforcing it. Specifically, the selection criteria is simply an AD security group and a network ACL filter.

What's weird, is that when I got the selection according to the Type of attribute AAA criteria: Cisco and used the name of specific user AD, the policy has been applied successfully.

When you try to use the security groups and LDAP, it's a no go. LDAP enters AAA server groups and also questions and successfully brings up all groups in the announcement during the selection of the criteria according to the criteria of selection of DAP.

Any thoughts? I'm supposed to have a separate AnyConnect connection profile for each DAP?

Thank you

Right. Him debugs also shows that the user has been authenticated using RADIUS, not LDAP.

Then you need to change your method of authentication for LDAP, or modify your DAP strategies to use Radius attributes instead of LDAP attributes.

HTH

Herbert

Tags: Cisco Security

Similar Questions

  • How to dynamically access the SQLite result set?

    I want to dynamically access the SQLite result set. Since webworks does not support the "PRAGMA table_info (table_name); I save all newly created information tables in a single two-column table called schema. schema has two columns, table_name, and column_name.

    So I created a function to dynamically access the data in the table. I use the item = results.rows.item (i) and that the data access with item.column line.

    column is a variable that will receive the value of a schema representative of column_name. When I alert (column) I get the column_name is correct, but when I used item.column my results are "not defined".

    any advice on how to solve this issue.

    I managed to solve this issue. The solution is the following: the normal way to access the data of the variable item = results.rows.item (i) is item.column (where the column is the name of the column in the database table. To access the data dynamically, I Specifies a var col1 to assign different values in col1. I then access the data in the database using point [col1] hope that makes sense. If you need a further explanation contact me at [email protected]

  • What is the dynamic-access-policy-registration ABC_Access?

    Can Hi anyone explain the following? I examine documents Cisco Anyconnect SSL VPN. It does not have these commands. What is the relationship of the Anyconnect VPN with these commands? Or send a link. Thank you

    -----

    dynamic-access-policy-registration ABC_Access

    Description 'access ABC '.

    WebVPN

    the value of the URL - list A_Intranet, ABC_Access

    SVC request to enable default svc

    --------------------

    I checked the document from Cisco, which say:

    Operating instructions

    Use the dynamic-access-policy-record command in configuration mode global to create one or more DAP records. When you use this command, you dynamic-access-policy-record mode, in which you can set attributes for the record named the DAP. The commands that you can use dynamic-access-policy-recording mode are:

    • Action (continue, terminate or quarantine)
    • Description
    • network-acl
    • priority
    • message from the user
    • WebVPN

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/ASA-command-reference/...

    That is - this to create one or more DAP records for?

    Please see the following guide for a good overview and details on the use and deployment of DAP:

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

  • How to map a dynamic access to a group policy strategy?

    Experts,

    I'm doing an SSL implementation and a part of the requirement is to have the authentication of users in LDAP, are mapped to a particular group policy. They need this mapping for a particular bookmark assigned to them, because they are strictly using the WEBVPN portal. I have several DAP is configured and I want to map the user that is matched for each DAP, to a particular group policy. I read you can use the LDAP attributes on the user account in AD, but I want to map the DAP "mortgage" in Group Policy "mortgage", as opposed to reading additional AD attributes of the user. Is this possible?

    DAP and group policy are two ways to implement access control on the remote access vpn client.

    DAP must take precedence over group strategy.

    When the responses from the LDAP server for authentication request with the LDAP group member attribute, you can map this attribute of joining a DAP folder or a group policy.

    If you want to map the LDAP group member attribute to group policy, you must set the attribute LDAP map. Please see the example below

    http://www.Cisco.com/en/us/partner/products/ps6120/products_configuration_example09186a00808d1a7c.shtml

    If you want to map the attribute for LDAP group membership in politics of the DAP, you will find the guide in ASDM

    Edit-> Advanced-> Guide dynamic access policy.

    The below is copied from the guide above.

    Example of composition of group

    You can create a basic logical expression for the special criteria of belonging to an AD Group. Because users can belong to several groups, DAP analyzes the response from the LDAP server in separate fields in a table. You need an advanced feature to accomplish the following:

    • Compare the memberOf a string field (in which case the user belongs to a group).
    • Iterate over each field returned memberOf if the data returned is of type "table".

    The function that we have written and tested for this purpose is shown below. In this example, if a user is a member of a group, ending by "-stu" they correspond to the DAP.

    assert(function()
       local pattern = "-stu$"
       local attribute = aaa.ldap.memberOf
       if ((type(attribute) == "string") and
           (string.find(attribute, pattern) ~= nil)) then
           return true
       elseif (type(attribute) == "table") then
           local k, v
           for k, v in pairs(attribute) do
               if (string.find(v, pattern) ~= nil) then
                   return true
               end
           end
       end
       return false
    end)()
  • Question of dynamic access Cisco policy

    I have my cisco ASA pulling active directory. So far I have only deployed vpn without client for intranet access. But iin test I have cisco anyconnect vpn works also from active directory. I would like to give different levels of access to the anyconnect vpn. I've been messing around with dynamic access policies. However, when I create a new policy and map it to the users group in the AD and the access network list, then I click Finish on the dfltaccesspolicy, I can connect is no longer in the clientlessvpn. I gave my DAP policy a priority 2147483647 I read was the highest, but it still does not work. What I am doing wrong?

    Thanks in advance for your help

    Awesome Neal!

    Thanks for sharing about how you solved your problem with others is the idea of this great forum.

    Please mark this message as answered.

    Have a good.

  • Is there a way to get programmatic access to political information for flash access?

    Looking for just the information above for purposes of test automation.

    Thank you.

    Hello

    In fact, 'policies' that can be retrieved from DRMVoucher are simply "custom properties" and "rights custom" that can be set in the license server.  Please see the following Javadocs 'ApplicationDefinedRight' and 'ApplicationProperties '.

    ApplicationDefinedRight: http://help.adobe.com/en_US/flashaccess/2.0/javadocs/com/adobe/flashaccess/sdk/rights/Appl icationDefinedRight.html

    ApplicationProperties: http://help.adobe.com/en_US/flashaccess/2.0/javadocs/com/adobe/flashaccess/sdk/util/Applic ationProperties.html

    These are personalized (not defined by Flash Access) properties and rights that the customer can choose to implement and apply in their application.  For example, Flash Access currently has only one right, called "Playwright", with several constraints, attached to the right, as the Expiration, OutputProtection, PlaybackWindow, etc...  If the customer finds the need for a law, not supported by FlashAccess, like "AllowCopyToProtectedFlashCard", and then you set your own "ApplicationDefinedRight".

    Don't go back to your question - there is no way to analyze the political content of Flash Access programmatically (via AS3).  The thing the closest it would be to analyze the content of the license, once the license server issues a license (see DRMVoucher methods).  The only downside is that while licensing issues Flash access Reference Implementation server exactly as specified in the policy, there is no guarantee that the content distributor has not change the code of the license server to change some rights and restrictions (because of business rules), licensed to result emitted which does not correspond to the original font.

    see you soon,

    / Eric.

  • Package APEX to dynamically access the tabs in the menu?

    Hello community!

    We must build a dynamic authorization to the navigation of our application, so, each tab will have a plsql as a condition function, which evaluates the user authorization to respective tabs in a sql query, returning true or false.

    Now I would like to build a monitoring report, which lists all tabs and displays authorization (LDAP) for each tab group, as appropriate.

    To achieve this, I was wondering if there is a bunch of apex which are available to display all the information of interest to all of the existing tabs: tab label, pages, condition parameters, hierarchy (parent or child), in order to get an overview of the current configuration and create a user-friendly interface to link new user groups for the authorization menu tabs.

    I searched for a while and not find anything, but I'm sure its possible with buildin functions apex law. So I hope you can help me on my way.

    Thank you very much in advance,

    Best regards

    Tobi

    Version 4.2 of the APEX

    Hey Tobi,

    Have you looked at the sight of the APEX, APEX_APPLICATION_TABS?

    Jeff

  • Dynamically access the fields of a record of cursor

    Hi all
    I have a rather poorly designed application where a Subscriber has up to about 40 fields indicating the different balances. According to the profile of the Subscriber, a Subscriber can have anything on a single balance balances 40. An overview of the structure of the table is therefore along the lines:

    table_name (subscriber_id, no_of_balances, balance1_id, balance1_amount, balance2_id, balance2_amount,... balance40_id, balance40_amount). Here is my code fragment:

    CURSOR c1_data is SELECT * FROM table_name;
    ...
    var_i INTEGER = 1;
    var_no_of_balances c1_data.no_of_balances%TYPE;
    FOR c1_rec IN c1_data LOOP
    I'm IN 1.var_no_of_balances LOOP
    IF "balance". I have | "" _id "= 10 THEN <-here's where I need to see a field_name dynamically according to the value of the loop counter i.
    ......
    END IF;
    END LOOP;
    END LOOP;

    Is this achievable in PL/SQL?
    Thank you

    HouseofHunger wrote:

    I have a rather poorly designed application where a Subscriber has up to about 40 fields indicating the different balances. According to the profile of the Subscriber, a Subscriber can have anything on a single balance balances 40. An overview of the structure of the table is therefore along the lines:

    table_name (subscriber_id, no_of_balances, balance1_id, balance1_amount, balance2_id, balance2_amount,... balance40_id, balance40_amount).

    Alternative to DBMS_SQL.

    Create a collection for the columns of the balance type:

    create or replace type TBalance is table of number;
    

    Now dynamically create a collection/table in the projection of SQL. For example

    begin
      for c in (
          select
            subscriber_id,
            no_of_balances,
            TBalance(  balance1_amount,  balance2_amount, .. , balance40_amount ) as BALANCES
          from table_fubar
      ) loop
        .. to process balance 20 use c.balances(20).. etc.
      end loop;
    end;
    

    Using defined user (aka early) data types let you dynamically structure column of the row in a more significant structure which can even be referenced dynamically.

  • 6 page pdf dynamic access conversion

    Hello

    I am trying to create a dynamic pdf which shows/hides the different sections and pushes as needed depending on what is selected.  I started with a pdf of the 6 page I created on the html Web page that we currently use to do this with javascript.

    I'm setting my subforms upward and use of the generator of the Action to define the presence of subforms and everything is working great until I get to the bottom of the page and the last subform does not operate on page 2 and is just cut in the middle.   I tried to look at various options of paging, and I'm not sure what to do.  So I looked in the help and more and he talks about how dynamic PDF don't really have pages until they are fully processed, so I don't know how to get my fields out of the existing provision of the 6 page.  I am very new to the designer, so I would appreciate if you have any advice for me on how to get this working.


    Thank you!


    Mindy

    Hello

    The hierarchy objects full of page1 overflow on a new 'instance' of page1. It is likely that the content on page 2 will appear on the next page.

    If you want that content to keep together, so if the content of page 1 overflows, it will appear on the top of page 2, pushing content down page2. In LC Designer, you can drag the subforms of page2 and then onto page 1 icon in the hierarchy. On release LC Designer will insert the subform into bottom of page 1. If there is no room, then it will insert a new page. Continue to do this work down the hierarchy, so that all content is on page 1. In Design view, you will always have the six pages of content.

    Who is? Try it on a backup copy of the form.

    Niall

    Ensure the dynamics

  • Dynamic access policies - limited ASA 9.4?

    Hello

    Is there a maximum number of DAP supported by ASA 9.4 55XX?

    Cisco recommended a maximum of 100 to 9.1. Is it always true to 9.4?

    Thank you

    Patrick

    Hi Patrick,

    There is no virtual limit for DAP policies, you can create on the SAA depends on more than the material that you are using the ASA rather than the code is running. However, there is a limit to the attributes within each DAP.

    Currently, a maximum of 5000 values/instances can be treated by the attribute in each PAD.
    A syslog is generated when this deadline has passed:
    3 ASA-109035%: exceeded the number maximum (5000) of DAP attribute instances for
    user =

    It may be useful

    -Randy-

  • Limit of the dynamic access policies?

    Hello

    Is there a maximum number of DAP supported by ASA 55XX 9.1?

    Thanks for your information

    Patrick

    Patrick,

    No policy limit is imposed, but less than 100 is recommended (for high-end deployments). Realistically 20-50 is what we see in the more advanced deployments.

    Impose us limits on the amount of attributes (999) in DAP.

    M.

  • Mobile AV support for dynamic access ASA policies

    We went just to the last image of the CSD, 3.6.6203 and ASA 8.4.4.1.  We have currently a DAP set up to scan a group policy for an AV means but wanted to start this run for all group policies and including several different flavors of AV (so anyone could connect from anywhere as long as a pre-approved AV is installed).  We leave about 20 different versions of different AV and I've tried a couple and they succeeded.

    My question is now trying to allow (or deny) AV that is installed on an Android Tablet (and possibly Apple devices).  The Tablet has avast Mobile Security installed and even if I select the seller: Alwil overall, he does not always recognize and refuses to the user.  I tested on a PC and it works fine.  Is there something I'm missing or are mobile AV programs not included in the policies of the DAP?  Is that this is going to be considered in future versions of the CSD or ASA or we're going to continue to consider devices Android and Apple 'secured' and doesn't require the VA?  Thank you.

    Hello

    At this stage the CSD is not supported on Android / iOS devices.

    CDD + HostScan can be used to allow administrators to identify Apple iOS devices, but is limited to the communication of the operating system.

    You can submit an enhacement request to your account team.

    Portu.

    Please note any workstation that you be useful.

  • Political dynamic VPN access and access to the administration

    Hi all

    I'm testing a scenerio with an ASA 5520 so he could authenticate VPN users against and an environment Active Directory more access to management as well. I created a dynamic access on the ASA policy indicating that, if you are a member of the Active Directory 'Managment' group continue. I have chagned the DefaultAccessPolicy to "Finish." With it, users could not connect VPN because they are not a member of this group, but access to manage the ASA is allowed due to this policy.

    Is there a way through the use of dynamic access policies I can afford access to the administration (SSH, AMPS, etc.) by matching to membership in a group and will allow normal users to VPN in successfully, but not give them access to the management of the ASA?

    I just try this but it seems that I should be able to swing that?

    Thaks in advance.

    Hello

    You can try to apply the DAP and configure the filter ACL network. allowing only the protocols you want to that they can access.

    Kind regards

    Anisha

    P.S.: Please mark this thread as answered if you feel that your query is resolved. Note the useful messages.

  • AnyConnect dynamic address pool

    It is possible using DAP to assign the different address for anyconnect users pool?

    Currently, I check if the PC has some elements such as process, save the key and activated applications.

    If yes-> ACL using "allow normal access.

    Is not-> ACL uses 'access '.

    That works, but two computers uses the pool of customer addresses defined in the configuration of the Tunnel

    tunnel-group remoteaccess General attributes
    remoteaccess-pool1 address pool

    It is possible to also dynamically set the address pool?

    If yes-> ACL using 'Allow normal access' & 'remoteaccess-pool1'

    SE not-> 'Access restricted' ACL uses & "remoteaccess-pool2.

    Thank you!

    Rolando A. Valenzuela.

    Hello Rolando,

    Correct than me if I'm wrong, based on the computer (the domain to which it belongs) that you want to map to some Grouppolicy, which has some qualities as the pool of addresses, and that way you can establish a distinction, one area to the other, let's say:
    (Admins/domain gets the address pool of 10.10.10.0/24)
    (Suppliers/field gets the address pool of 10.20.20.0/24)

    Based on this I will give you my recommendations, if you want to do it based on the computer and not the user, I recommend you to get all the computers in the same group of users in Active Directory, so if you have a group of users (Admin / domain group) you can add computers, and with the LDAP Mapping attribute you can map based on membership in a specific political group in this way, all computers that use of Admin users, will be assigned to a group policy with several attributes, such as the Pool of local IP, if users don't below any of the advertised groups, they will not be able to connect either, because you will need create a group policy NO ACCESSIBLE to be used for users who should not connect You can find more information here:

    - http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-nex...

    Another medium, will be filtering the PC based on the MAC address, YES this function uses a regular expression to match the organizational (YES) the unique identifier that will allow the PC connect so those that match the program defined in the regular expression with Regex LUA , this is possible, you can find this regular expression, for example :

    assert(function ()    local pattern = "^d067\.e5*"    local true_on_match = true
    
        local match = false    for k,v in pairs(endpoint.device.MAC) do        print(k)        match = string.find(k, pattern)        if (match) then            if (true_on_match) then                return true            else return (false)            end        end    endend)()
    If the PC is HP or Dell, you can use the MAC address YES part and set it there and allow the user to connect, and the user peuvent then be mapped with the Protocol LDAP attribute mapping to a group policy so they will be able to connect with a different IP address. (DAP cannot assign IP address), it's a dynamic access policy that works with HostScan Module of Posture to do a preliminary assessment and as he says unit of Posture, NOTE: PAH itself gives you the ability to filter by individual MAC address, so you don't need to do it by YES, this is common for large companies that have a large amount of users , so they prefer to make Yes that is easier, but you can set the MAC address of another way will be to use another regular expression so DAP can examine the first 3 letters (Case Insensitive) of the PC and then allow it to connect if it matches the regex, if it's not, the connection ends, you can find the regular expression here :
    assert(function()    local match_pattern = "^[Mm][Ss][Vv]"         -> Those are the 3 first letters    local match_value   = endpoint.device.hostname  --> Specifying hostname      if (type(match_value) == "string") then        if (string.find(match_value, match_pattern) ~= nil) then            return true        end    elseif (type(match_value) == "table") then        local k,v        for k,v in pairs(match_value) do            if (string.find(v, match_pattern) ~= nil) then                return true            end        end    end    return falseend)()
    In addition to regular expressions of LUA:- http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-nex... To do this you must License Premium AnyConnect (then Yes you can use the default two value that comes with the ASA). Also, you must have image CSD or Hostscan in ASA and activated so that you can get that kind of information about the computers that connects the AnyConnect. You can use the AnyConnect image like hostscan image. (do not forget to activate the attributes of endpoint through Deputy Ministers, DEPUTIES of the section of the CSD, otherwise it won't work). The previous mentioned is good options for you to explore, but it will not be very scalable (depending on number of users), so I recommend than a registry key with check check "Domain name" or file would work well but its your CUs call if he wants to still check MAC or not. Please do not forget to rate and score as correct this message if it helped, keep me posted! Best regards, David Castro,
  • ASA 5505: VPN access to different subnets

    Hi All-

    I'm trying to understand how to configure our ASA so that remote users can have VPN access to two different subnets (Office LAN and LAN phone).  Currently I have 3 VLAN configuration - VLAN 1 (inside), VLAN 2 (outside), VLAN 13 (phone LAN).  Essentially, remote users must be able to access their PC (192.168.1.0/24) and also have access to the office phone system (192.168.254.0/24).  Is it still possible?  Here are the configurations on our ASA,

    Thanks in advance:

    ASA Version 8.2 (5)

    !

    names of

    name 10.0.1.0 Net-10

    name 20.0.1.0 Net-20

    name phone 192.168.254.0

    name 192.168.254.250 PBX

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    switchport access vlan 3

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    switchport access vlan 13

    !

    interface Vlan1

    nameif inside

    security-level 100

    192.168.1.98 IP address 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    address IP X.X.139.79 255.255.255.224

    !

    interface Vlan3

    No nameif

    security-level 50

    192.168.5.1 IP address 255.255.255.0

    !

    interface Vlan13

    nameif phones

    security-level 100

    192.168.254.200 IP address 255.255.255.0

    !

    passive FTP mode

    object-group service RDP - tcp

    EQ port 3389 object

    object-group service DM_INLINE_SERVICE_1

    the purpose of the ip service

    EQ-ssh tcp service object

    vpn_nat_inside of access list extensive ip Net-10 255.255.255.224 allow 192.168.1.0 255.255.255.0

    access-list extended vpn_nat_inside allowed ip Net-10 255.255.255.224 phones 255.255.255.0

    inside_nat0_outbound list extended access permits all ip Net-10 255.255.255.224

    inside_access_in of access allowed any ip an extended list

    Split_Tunnel_List list standard access allowed Net-10 255.255.255.224

    phones_nat0_outbound list extended access permits all ip Net-10 255.255.255.224

    outside_access_in list extended access allowed object-group DM_INLINE_SERVICE_1 Mac host everything

    pager lines 24

    Enable logging

    timestamp of the record

    record monitor errors

    record of the mistakes of history

    asdm of logging of information

    Within 1500 MTU

    Outside 1500 MTU

    MTU 1500 phones

    mask IP local pool SSLClientPool-10 10.0.1.1 - 10.0.1.20 255.255.255.128

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    don't allow no asdm history

    ARP timeout 14400

    Global interface (10 Interior)

    Global 1 interface (outside)

    global interface (phones) 20

    NAT (inside) 0-list of access inside_nat0_outbound

    NAT (inside) 1 0.0.0.0 0.0.0.0

    NAT (10 vpn_nat_inside list of outdoor outdoor access)

    NAT (phones) 0-list of access phones_nat0_outbound

    NAT (phones) 1 0.0.0.0 0.0.0.0

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 X.X.139.65 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    AAA authentication enable LOCAL console

    the ssh LOCAL console AAA authentication

    LOCAL AAA authorization command

    Enable http server

    http 192.168.1.0 255.255.255.0 inside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    outside_map interface card crypto outside

    Crypto ca trustpoint ASDM_TrustPoint0

    registration auto

    name of the object CN = not - asa .null

    pasvpnkey key pair

    Configure CRL

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    lifetime 28800

    VPN-sessiondb max-session-limit 10

    Telnet timeout 5

    SSH 192.168.1.100 255.255.255.255 inside

    SSH 192.168.1.0 255.255.255.0 inside

    SSH Mac 255.255.255.255 outside

    SSH timeout 60

    Console timeout 0

    dhcpd auto_config inside

    !

    dhcpd address 192.168.1.222 - 192.168.1.223 inside

    dhcpd dns 64.238.96.12 66.180.96.12 interface inside

    !

    a basic threat threat detection

    host of statistical threat detection

    Statistics-list of access threat detection

    a statistical threat detection tcp-interception rate-interval 30 burst-400-rate average rate 200

    SSL-trust outside ASDM_TrustPoint0 point

    WebVPN

    allow outside

    AnyConnect essentials

    SVC disk0:/anyconnect-win-2.5.2014-k9.pkg 1 image

    SVC disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2 image

    enable SVC

    tunnel-group-list activate

    internal SSLClientPolicy group strategy

    attributes of Group Policy SSLClientPolicy

    WINS server no

    value of 64.238.96.12 DNS server 66.180.96.12

    VPN-access-hour no

    VPN - connections 3

    VPN-idle-timeout no

    VPN-session-timeout no

    IPv6-vpn-filter no

    VPN-tunnel-Protocol svc

    group-lock value NO-SSL-VPN

    by default no

    VLAN no

    NAC settings no

    WebVPN

    SVC mtu 1200

    SVC keepalive 60

    client of dpd-interval SVC no

    dpd-interval SVC bridge no

    SVC compression no

    attributes of Group Policy DfltGrpPolicy

    value of 64.238.96.12 DNS server 66.180.96.12

    Protocol-tunnel-VPN IPSec svc webvpn

    attributes global-tunnel-group DefaultRAGroup

    address-pool SSLClientPool-10

    IPSec-attributes tunnel-group DefaultRAGroup

    pre-shared key *.

    NO-SSL-VPN Tunnel-group type remote access

    General-attributes of the NO-SSL-VPN Tunnel-group

    address-pool SSLClientPool-10

    Group Policy - by default-SSLClientPolicy

    NO-SSL-VPN Tunnel - webvpn-attributes group

    enable PAS_VPN group-alias

    allow group-url https://X.X.139.79/PAS_VPN

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    !

    global service-policy global_policy

    privilege level 3 mode exec cmd command perfmon

    privilege level 3 mode exec cmd ping command

    mode privileged exec command cmd level 3

    logging of the privilege level 3 mode exec cmd commands

    privilege level 3 exec command failover mode cmd

    privilege level 3 mode exec command packet cmd - draw

    privilege show import at the level 5 exec mode command

    privilege level 5 see fashion exec running-config command

    order of privilege show level 3 exec mode reload

    privilege level 3 exec mode control fashion show

    privilege see the level 3 exec firewall command mode

    privilege see the level 3 exec mode command ASP.

    processor mode privileged exec command to see the level 3

    privilege command shell see the level 3 exec mode

    privilege show level 3 exec command clock mode

    privilege exec mode level 3 dns-hosts command show

    privilege see the level 3 exec command access-list mode

    logging of orders privilege see the level 3 exec mode

    privilege, level 3 see the exec command mode vlan

    privilege show level 3 exec command ip mode

    privilege, level 3 see fashion exec command ipv6

    privilege, level 3 see the exec command failover mode

    privilege, level 3 see fashion exec command asdm

    exec mode privilege see the level 3 command arp

    command routing privilege see the level 3 exec mode

    privilege, level 3 see fashion exec command ospf

    privilege, level 3 see the exec command in aaa-server mode

    AAA mode privileged exec command to see the level 3

    privilege, level 3 see fashion exec command eigrp

    privilege see the level 3 exec mode command crypto

    privilege, level 3 see fashion exec command vpn-sessiondb

    privilege level 3 exec mode command ssh show

    privilege, level 3 see fashion exec command dhcpd

    privilege, level 3 see the vpnclient command exec mode

    privilege, level 3 see fashion exec command vpn

    privilege level see the 3 blocks from exec mode command

    privilege, level 3 see fashion exec command wccp

    privilege see the level 3 exec command mode dynamic filters

    privilege, level 3 see the exec command in webvpn mode

    privilege control module see the level 3 exec mode

    privilege, level 3 see fashion exec command uauth

    privilege see the level 3 exec command compression mode

    level 3 for the show privilege mode configure the command interface

    level 3 for the show privilege mode set clock command

    level 3 for the show privilege mode configure the access-list command

    level 3 for the show privilege mode set up the registration of the order

    level 3 for the show privilege mode configure ip command

    level 3 for the show privilege mode configure command failover

    level 5 mode see the privilege set up command asdm

    level 3 for the show privilege mode configure arp command

    level 3 for the show privilege mode configure the command routing

    level 3 for the show privilege mode configure aaa-order server

    level mode 3 privilege see the command configure aaa

    level 3 for the show privilege mode configure command crypto

    level 3 for the show privilege mode configure ssh command

    level 3 for the show privilege mode configure command dhcpd

    level 5 mode see the privilege set privilege to command

    privilege level clear 3 mode exec command dns host

    logging of the privilege clear level 3 exec mode commands

    clear level 3 arp command mode privileged exec

    AAA-server of privilege clear level 3 exec mode command

    privilege clear level 3 exec mode command crypto

    privilege clear level 3 exec command mode dynamic filters

    level 3 for the privilege cmd mode configure command failover

    clear level 3 privilege mode set the logging of command

    privilege mode clear level 3 Configure arp command

    clear level 3 privilege mode configure command crypto

    clear level 3 privilege mode configure aaa-order server

    context of prompt hostname

    no remote anonymous reporting call

    Hello

    Loss of connectivity to the LAN is not really supposed all remove this command UNLESS your network is using another device as their gateway to the Internet. In this case configuration dynamic PAT or political dynamics PAT (as you) would make sense because the LAN hosts would see your VPN connection from the same directly connected network users and would be know to traffic before the ASA rather than their default gateway.

    So is this just for VPN usage and NOT the gateway on the LAN?

    If it is just the VPN device I'd adding this

    global interface (phones) 10

    He would do the same translation for 'phones' as he does on 'inside' (of course with different PAT IP)

    -Jouni

Maybe you are looking for