USG110 VPN LDAP Security Group Recursive not working
Users can connect from outside via L2TP VPN.
As authentication method we use an Active Directory (LDAP) query.
Allowed users are all users in the Domain Security Group gRemoteAccess.
This is working fine, as long as the users are directly in this Security Group.
If this gRemoteAccess contains other Security Groups within the users are (recursive) then this is not working.
This looks clearly like a bug. (Btw: same issue with our USG1100)
See attached screenshots.
This is how the working Security Group looks like:
This is how the not working Security Group looks like:
Veronesi
All Replies
-
Hi @Veronesi
As your description, gField and gSupport are members of gRemoteAccess.
And users are belonging to gField and gSupport groups.
You can use “test” function to make sure what is the value in “memberof”.
If there is no gRemoteAccess identifier, then authentication will fail.
(The attribute is replied from AD/LDAP server)
0 -
@Zyxel_Stanley
Thank you for your reply.
I did this test and the Result is: "UserXYZ does not belong to this group."
So this test is quite useful. However, it will not solve my problem.
Because this user really belongs to this group. - But not in 1st hierarchy!
In this Group are only other security groups. And there are then the members.
You mentioned it right:
gField and gSupport are members of gRemoteAccess.
And users are belonging to gField and gSupport groups.
So, the user belongs to the gRemoteAccess (indirectly). But the USG should recursively search for all groups and test.
This is currently not the case and therefore this issue happens.
Veronesi0 -
Hi @Veronesi
The attribute is replied from AD/LDAP server, If attribute without it, then user authentication will fail.
There is other way to improve this situation. You can add subgroups first,aAnd then group them as a group object on USG.
0 -
@Zyxel_Stanley
Thank you for your answer.
Yes, this would probably work.
However, we don't like to manage the user groups in AD and in USG. (In AD there are many other attributes assigned to control different access permissions, not only VPN).
Also there are more than only these two groups (gField and gSupport). About 30 different groups in at least 6 different countries (with their own USG).
So this is unfortunately not very practicable for us. Currently we've added all the different people manually in AD to the gRemoteAccessVPN group. This works and has the advantage for us, that we all can manage in AD - one central point.
Pity, but thank you anyway for your suggestion.
Best regards, Veronesi0 -
Hi @Veronesi
For USG, it is just forwarding request to AD server.
The attributes and accessing permission are controlled by AD server.
If gRemoteAccess group is not in “memberof” attribute, then AD server will not allow to login.
It’s good heard you use other workaround on your environment.
0 -
0
-
Anyway, if your security group is with _ like Group_Name then it doesn't work, so remove _ in your group name! A bug from zyxel since many years.0
-
swissp said:Anyway, if your security group is with _ like Group_Name then it doesn't work, so remove _ in your group name! A bug from zyxel since many years.
Do you mean the group name is named on the AD server database? Thanks.Share your feedback through our survey, make your voice heard, and win a WiFi 7 AP! https://bit.ly/2024_Survey_Community
0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 145 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 239 USG FLEX H Series
- 267 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.3K Consumer Product
- 247 Service & License
- 384 News and Release
- 83 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight