There are so many policies which can be configured for a one user on different places on ASA. But when the ASA is reading them, there is an order. It is crucial to understand how ASA takes the decision to assign policies for the particular user for troubleshooting.
Policies are ordered in 2 steps for a one user who is connected via a VPN.
1. Pre-Login Policy
2. Post-Login Policies
Pre-Login Policy
Connection Profile (Tunnel Group) controls the Pre Login Policy entirely.
When a user is going to connect via a VPN client like Cisco
Policies are ordered in 2 steps for a one user who is connected via a VPN.
1. Pre-Login Policy
2. Post-Login Policies
Pre-Login Policy
Connection Profile (Tunnel Group) controls the Pre Login Policy entirely.
When a user is going to connect via a VPN client like Cisco
AnyConnect, he is asked to select a group. This group is actually the tunnel group or in ASA language it is called the Connection Profile..
In the capture you can see the group name is Anyconnect which really means there is a Connection Profile named Anyconnect on the ASA with a Group Policy bound with it which tells how the specific user should be authenticated, assign IP address if not a "Client Less SSL", DNS servers to use etc..
If a specific group policy is not bound, Default Connection Profiles will be used..
After the login is successful, Post-Login Policies will be applied for the same user..
Post-Login Policies
Post-Login Polices define the permissions, authorizations, restrictions etc for a particular user..
Dynamic Access Policies are the 1st to take care of after a user is authenticated. If no specific DAP is applied, default of DiftAccessPolicy will be applied.
Ex:- An example for a Dynamic Access Policy is that we can configure some access restrictions to a specific internal server resource if the authenticated user has or has not an active firewall on his machine.
For all unmatched items the order stated on the snap will be used.
Ex:- For a user, a connection timeout is configured with 2 values on his Connection Profile Group Policy and his User Group Policy. In this case the value configured on his User Group Policy will be used because it is more preferable in the order..
This means that the Connection Profile can have a different Group Policy than a User Profile has..
If no Group Policy is configured on ASA, Default Group Policies will be applied like in Pre-Login Policy.
There are 2 Default Group Policies for SSL and IPSec.
According to the connection type, a user will end up in a one group..
You can view these order of operation real time on Monitoring > VPN > VPN Statistics > Sessions tab on ASDM for VPN sessions users come in..
On CLI you can use show vpn-sessiondb command for similar output..
If a specific group policy is not bound, Default Connection Profiles will be used..
After the login is successful, Post-Login Policies will be applied for the same user..
Post-Login Policies
Post-Login Polices define the permissions, authorizations, restrictions etc for a particular user..
Ex:- An example for a Dynamic Access Policy is that we can configure some access restrictions to a specific internal server resource if the authenticated user has or has not an active firewall on his machine.
For all unmatched items the order stated on the snap will be used.
Ex:- For a user, a connection timeout is configured with 2 values on his Connection Profile Group Policy and his User Group Policy. In this case the value configured on his User Group Policy will be used because it is more preferable in the order..
This means that the Connection Profile can have a different Group Policy than a User Profile has..
If no Group Policy is configured on ASA, Default Group Policies will be applied like in Pre-Login Policy.
There are 2 Default Group Policies for SSL and IPSec.
According to the connection type, a user will end up in a one group..
You can view these order of operation real time on Monitoring > VPN > VPN Statistics > Sessions tab on ASDM for VPN sessions users come in..
On CLI you can use show vpn-sessiondb command for similar output..