<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Duo MFA with Cisco ISE and FTD RAVPN in Deployment Strategy</title>
    <link>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/4975384#M200</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your reply, I have attached a screenshot for all required points, so what I'm doing is when the request comes to the FTD it's configured with AAA server (ISE nodes), and the ISE is configured with External radius server (Duo Auth Proxy) which will send the first authentication (Username and Password) to the ISE.&lt;/P&gt;
&lt;P&gt;Also, I can see this error message, so do you think if we enable the MS-CHAPv2 on the Cisco Duo it will work?&lt;/P&gt;
&lt;P&gt;allow concat is configured but is not supported with ms-chapv2 authentications. Did you try to concatenate your second factor to your password?&lt;/P&gt;
&lt;P&gt;Knowing that this setup is working fine with Active Directory as an external identity for authentication.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Ibrahim&lt;/P&gt;</description>
    <pubDate>Mon, 11 Dec 2023 10:31:35 GMT</pubDate>
    <dc:creator>Ibrahim-Sharif</dc:creator>
    <dc:date>2023-12-11T10:31:35Z</dc:date>
    <item>
      <title>Duo MFA with Cisco ISE and FTD RAVPN</title>
      <link>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/4975316#M198</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;Hope you are doing well.&lt;/P&gt;
&lt;P&gt;I have Cisco FTD configured with remote access VPN and Cisco ISE for AAA services using the local user database on the ISE itself, and now I intend to add the 2FA using Cisco Duo.&lt;/P&gt;
&lt;P&gt;After completing the configuration on the Cisco ISE and preparing the Cisco Duo Auth proxy, I'm facing an issue with the primary authentication "ISE username &amp;amp; password":&lt;/P&gt;
&lt;P&gt;Error performing primary authentication: RADIUS auth request timed out&lt;/P&gt;
&lt;P&gt;Allow concat is configured, but is not supported with MS-CHAPv2 authentications. Did you try to concatenate your second factor to your password?&lt;/P&gt;
&lt;P&gt;Returning response code 3: AccessReject&lt;BR /&gt;(('10.171.22.110', 22043), user1@local, 17): Sending response&lt;BR /&gt;dropping packet from 10.171.22.110:1812 - unrecognized ID in response packet: 9&lt;/P&gt;
&lt;P&gt;In the attached screenshot you can see the traffic flow and topology, as well as the Cisco Auth proxy configuration file.&lt;/P&gt;
&lt;P&gt;I would appreciate your input in addressing this issue.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Ibrahim&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 07:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/4975316#M198</guid>
      <dc:creator>Ibrahim-Sharif</dc:creator>
      <dc:date>2023-12-11T07:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Duo MFA with Cisco ISE and FTD RAVPN</title>
      <link>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/4975326#M199</link>
      <description>&lt;P&gt;I need to see&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Radius server config&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Connection profiles/AAA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Take screenshots for this and share here let me check it&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 08:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/4975326#M199</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-11T08:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: Duo MFA with Cisco ISE and FTD RAVPN</title>
      <link>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/4975384#M200</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your reply, I have attached a screenshot for all required points, so what I'm doing is when the request comes to the FTD it's configured with AAA server (ISE nodes), and the ISE is configured with External radius server (Duo Auth Proxy) which will send the first authentication (Username and Password) to the ISE.&lt;/P&gt;
&lt;P&gt;Also, I can see this error message, so do you think if we enable the MS-CHAPv2 on the Cisco Duo it will work?&lt;/P&gt;
&lt;P&gt;allow concat is configured but is not supported with ms-chapv2 authentications. Did you try to concatenate your second factor to your password?&lt;/P&gt;
&lt;P&gt;Knowing that this setup is working fine with Active Directory as an external identity for authentication.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Ibrahim&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 10:31:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/4975384#M200</guid>
      <dc:creator>Ibrahim-Sharif</dc:creator>
      <dc:date>2023-12-11T10:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: Duo MFA with Cisco ISE and FTD RAVPN</title>
      <link>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/5297105#M287</link>
      <description>&lt;P&gt;Hello Ibrahim,&lt;/P&gt;&lt;P&gt;Did you manage to integrate Duo MFA with FMC/ISE for RAVPN users?&lt;/P&gt;&lt;P&gt;We have already got FMC/ISE integrated with RAVPN and want to introduce Duo to the mix, do you have any pointers for me?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2025 06:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/5297105#M287</guid>
      <dc:creator>alfred</dc:creator>
      <dc:date>2025-06-06T06:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Duo MFA with Cisco ISE and FTD RAVPN</title>
      <link>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/5297193#M288</link>
      <description>2 ways&lt;BR /&gt;&lt;BR /&gt;  1.&lt;BR /&gt; ISE 3.3 or later can integrate with Duo directly&lt;BR /&gt;  2.&lt;BR /&gt;  you can use the Duo.Auth Proxy. Have FMC/FTD send its radius queries to the auth proxy and the Auth Proxy can query ISE.&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Jun 2025 12:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/5297193#M288</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2025-06-06T12:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: Duo MFA with Cisco ISE and FTD RAVPN</title>
      <link>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/5304752#M296</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;use pass_through_all&lt;/P&gt;
&lt;P&gt;&lt;A href="https://duo.com/docs/radius" target="_blank"&gt;https://duo.com/docs/radius&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 07:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/duo-mfa-with-cisco-ise-and-ftd-ravpn/m-p/5304752#M296</guid>
      <dc:creator>ergin.sezgin</dc:creator>
      <dc:date>2025-07-02T07:24:00Z</dc:date>
    </item>
  </channel>
</rss>

