Group Policy

In the Group Policy section, click the drop-down to view the group policies associated with the device.

Attention

CDO reads the group policies configured with tunneling protocol as SSL VPN Client.

CDO reads most of the group policy attributes configured in ASA. The information is displayed across the tabs in the RA VPN Group policy wizard. To see the details of group policies read from the ASA device, you need to perform the following:

Procedure


Step 1

In the left pane, click Objects > FTD Network Objects.

Step 2

Filter for RA VPN Group Policy.

Step 3

Select the group policy associated with that device and click Edit.


What to do next

Note

CDO doesn't support the Standard Access Control Lists (ACL) defined in the split tunneling in the ASA device. It supports the Extended Access Control Lists (ACL) and reads them as ACLs in the ASA policies. For more information, see Split Tunneling Attributes. To see the policies, on the navigation bar, you can click Policies > ASA Access Policies.

To select the extended ACLs, perform the following:

  • Click the Split Tunneling tab.

  • Based on whether the traffic in ASA uses IPv4 or IPv6 addresses, select "Allow specified traffic over tunnel" or "Exclude networks specified below" from the corresponding drop-down list. Select the extended ACLs that are imported from ASA.