scothaniel
MIS
We are looking to setup RADIUS authentication for our Cisco VPN-clients, without effecting our LAN-LAN VPN connections.
We have 2 sites set up for IPSec tunnels. These sites are always up and do not need the extended authentication. We have a group of laptops and home PC's using the vpn-client that we would like to add RADIUS authentication to.
The radius server is set up and responding to authent requests, but I am not sure how to tell the pix to ignore the LAN-LAN connections. We are using vpngroups and access-lists to setup all connections.
Would the best solution be to use this command:
aaa authentication match [access-list] outside AuthInbound
and use the no-nat access list for the VPN Clients?
Since the lan-lan tunnels are always up, it is very difficult for me to test these things out.
Any help would be appriciated.
Thanks,
Scott
We have 2 sites set up for IPSec tunnels. These sites are always up and do not need the extended authentication. We have a group of laptops and home PC's using the vpn-client that we would like to add RADIUS authentication to.
The radius server is set up and responding to authent requests, but I am not sure how to tell the pix to ignore the LAN-LAN connections. We are using vpngroups and access-lists to setup all connections.
Would the best solution be to use this command:
aaa authentication match [access-list] outside AuthInbound
and use the no-nat access list for the VPN Clients?
Since the lan-lan tunnels are always up, it is very difficult for me to test these things out.
Any help would be appriciated.
Thanks,
Scott