36-3
Cisco ASDM User Guide
OL-16647-01
Chapter 36 Configuring Dynamic Access Policies
Understanding VPN Access Policies
DAP Support for Remote Access Connection Types
The DAP system supports the following remote access methods:
IPsec VPN
Clientless (browser-based) SSLVPN
Cisco AnyConnect SSL VPN
PIX cut-through proxy (posture assessment not available)
DAP and AAA
DAP complements AAA services. It provides a limited set of authorization attributes that can override
those AAA provides. The security appliance selects DAP records based on the AAA authorization
information for the user and posture assessment information for the session. The security appliance can
select multiple DAP records depending on this information, which it then aggregates to create DAP
authorization attributes.
You can specify AAA attributes from the Cisco AAA attribute hierarchy, or from the full set of response
attributes that the security appliance receives from a RADIUS or LDAP server. For more information
about DAP and AAA, see the section, Add/Edit AAA Attributes.

AAA Attribute Definitions

Table 36-1 defines the AAA selection attribute names that are available for DAP use. The Attribute
Name field shows you how to enter each attribute name in a Lua logical expression, which you might do
in the Advanced section of the Add/Edit Dynamic Access Policy pane.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
• • •——
Table 36-1 AAA Selection Attributes for DAP Use
Attribute
Type Attribute Name Source Value
Max String
Length Description
Cisco aaa.cisco.cla ss AAA string 64 Group policy name on the security appliance
or sent from a Radius/LDAP server as the
IETF-CLass (25) attribute
aaa.cisco.ipaddress AAA number - Assigned IP address for full tunnel VPN
clients (IPsec, L2TP/IPsec, SSL VPN
AnyConnect)
aaa.cisco.tunnelgroup AAA string 64 Connection profile (tunnel group) name
aaa.cisco.username AAA string 64 Name of the authenticated user (applies if
using Local authentication/authorization