<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Any resolution? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/webvpn-user-authenticated-through-ldap-failure/m-p/2162722#M128853</link>
    <description>&lt;P&gt;Any resolution?&lt;/P&gt;</description>
    <pubDate>Mon, 11 May 2015 16:54:22 GMT</pubDate>
    <dc:creator>Keith Wood</dc:creator>
    <dc:date>2015-05-11T16:54:22Z</dc:date>
    <item>
      <title>WEBVPN user authenticated through LDAP failure!</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-user-authenticated-through-ldap-failure/m-p/2162721#M128832</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm trying to configure an ASA5510 with release 9.1(1) in order to authenticate VPN AnyConnect &lt;/P&gt;&lt;P&gt;users through LDAP. In a first step the logs shiw me this kind of error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Session Start&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] New request Session, context 0xadf415d4, reqType = Authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Fiber started&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Creating LDAP context with uri=ldap://192.168.4.251:389&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Connect to LDAP server: ldap://192.168.4.251:389, status = Successful&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] supportedLDAPVersion: value = 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] supportedLDAPVersion: value = 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Binding as XUSERX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Performing Simple authentication for XUSERX to 192.168.4.251&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Simple authentication for XUSERX returned code (8) Strong(er) authentication required&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Failed to bind as administrator returned code (-1) Can't contact LDAP server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Fiber exit Tx=211 bytes Rx=682 bytes, status=-2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483632] Session End&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ERROR: Authentication Server not responding: AAA Server has been removed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I've changed the aaa-server configuration in order to use a different method for SASL (digest-MD5),&lt;/P&gt;&lt;P&gt;following the logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;test aaa-server authentication LDAP_SRV_GRP host 192.168.4.251 usernam$&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;INFO: Attempting Authentication test to IP address &amp;lt;ipc01&amp;gt; (timeout: 12 seconds)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Session Start&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] New request Session, context 0xade91d2c, reqType = Authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Fiber started&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Creating LDAP context with uri=ldap://192.168.4.251:389&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Connect to LDAP server: ldap://192.168.4.251:389, status = Successful&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] supportedLDAPVersion: value = 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] supportedLDAPVersion: value = 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Binding as XUSERX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Performing SASL authentication for XUSERX to 192.168.4.251&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Server supports the following SASL methods: GSSAPI GSS-SPNEGO EXTERNAL DIGEST-MD5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] hostname = 192.168.4.251&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] SASL authentication start with mechanism DIGEST-MD5 for XUSERX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] getsimple:4002 [XUSERX]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] getsimple:4001 [XUSERX]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] getsecret: [*********]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] SASL step for XUSERX returned code (1) another step is needed in authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] SASL authentication for XUSERX with mechanism DIGEST-MD5 rejected&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Failed to bind as administrator returned code (-1) Can't contact LDAP server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Fiber exit Tx=616 bytes Rx=859 bytes, status=-2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;[-2147483608] Session End&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ERROR: Authentication Server not responding: AAA Server has been removed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that I made one step forward but not solved the problem.&lt;/P&gt;&lt;P&gt;Could someone give me some suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following the aaa-server configuration part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ipcasa# sh run aaa-server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa-server LDAP_SRV_GRP protocol ldap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; reactivation-mode depletion deadtime 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa-server LDAP_SRV_GRP (corporate) host ipc01&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; server-port 389&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-base-dn dc=ipc, dc=local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-scope subtree&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-login-password *****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-login-dn cn=XUSERX, cn=users, dc=ipc, dc=local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; sasl-mechanism digest-md5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; server-type microsoft&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa-server LDAP_SRV_GRP (corporate) host 192.168.4.253&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; server-port 389&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-base-dn dc=ipc, dc=it&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-scope subtree&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-login-password *****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ldap-login-dn cn=XUSERX, cn=users, dc=ipc, dc=local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; sasl-mechanism digest-md5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; server-type microsoft&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa-server KRB01 protocol kerberos&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa-server KRB01 (corporate) host 192.168.4.253&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; kerberos-realm IPC.LOCAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any suggestions!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Denni&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-user-authenticated-through-ldap-failure/m-p/2162721#M128832</guid>
      <dc:creator>dugolotti</dc:creator>
      <dc:date>2019-03-11T03:08:46Z</dc:date>
    </item>
    <item>
      <title>Any resolution?</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-user-authenticated-through-ldap-failure/m-p/2162722#M128853</link>
      <description>&lt;P&gt;Any resolution?&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 16:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-user-authenticated-through-ldap-failure/m-p/2162722#M128853</guid>
      <dc:creator>Keith Wood</dc:creator>
      <dc:date>2015-05-11T16:54:22Z</dc:date>
    </item>
    <item>
      <title>I'm pretty sure you need to</title>
      <link>https://community.cisco.com/t5/network-access-control/webvpn-user-authenticated-through-ldap-failure/m-p/2162723#M128908</link>
      <description>&lt;P&gt;I'm pretty sure you need to use LDAP over SSL (port 686 i think), to have that work.&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2015 14:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/webvpn-user-authenticated-through-ldap-failure/m-p/2162723#M128908</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-05-12T14:16:03Z</dc:date>
    </item>
  </channel>
</rss>

