<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA VPN with ISE and diffrent OTP backends for authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004629#M182098</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an AAA-problem I hope to get some help solving.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem in short is: How to make the ASA via ISE send Radius Access Requests to diffrent given OTP backends given a connection to a certain Tunnel Group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BACKGROUND:&lt;/P&gt;&lt;P&gt;I will try to give you a brief picture of the scenario this is what I currently have.&lt;/P&gt;&lt;P&gt;A VPN system ( ASA 8.4(4) ) where I allow my users to choose from 3 different authentication methods being&lt;/P&gt;&lt;P&gt;1) Certificate (on smart-card)&lt;/P&gt;&lt;P&gt;2) Pledge - OTP token (One-Time-Password delivered via application in smartphone: using pledge from Nordic Edge OTP-Server)&lt;/P&gt;&lt;P&gt;3) SMS - OTP token (OTP via SMS from Nordic Edge OTP-Server) &lt;/P&gt;&lt;P&gt;The choice corresponds to different Connection Profiles/Tunnel Groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today all authentication requests go directly to the OTP-servers and authorization goes directly to AD via LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THE PROBLEM:&lt;/P&gt;&lt;P&gt;The problem arises when I try to put in the ISE into the mix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I obviously(?) would like to do is to have all network authentication/autorization go thru my ISE platform to take advantage of centralized administration, monitoring etc.&lt;/P&gt;&lt;P&gt;Still I would need to use the different backend databases such as AD and Nordic Edge OTP-Server, but then proxied via ISE.&lt;/P&gt;&lt;P&gt;For me to be able to know to which backend AAA system to proxy I must somehow be able to distinguish the incoming Radius Access-Requests.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WHAT IS KNOWN:&lt;/P&gt;&lt;P&gt;As of ASA 8.4.3 the Radius Access-Request contains 2 new attributes, Tunnel Group Name and Client Type, when a VPN user connects.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html#wp1802187" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html#wp1802187&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;QUESTION:&lt;/P&gt;&lt;P&gt;So, in theory is seams I can achive what I want looking at the Radius Access-Request attribute "Tunnel Group Name" and forward my request to diffrent OTP backends for the Autentication part. But, how do I actually go ahead and configure that in ISE?&lt;/P&gt;&lt;P&gt;I do not see this attribute when I look at the Radius Authentication details for a AAA autentication from the ASA to the ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;/Mattias&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 02:09:26 GMT</pubDate>
    <dc:creator>Mattias Andersson</dc:creator>
    <dc:date>2019-03-11T02:09:26Z</dc:date>
    <item>
      <title>ASA VPN with ISE and diffrent OTP backends for authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004629#M182098</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an AAA-problem I hope to get some help solving.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem in short is: How to make the ASA via ISE send Radius Access Requests to diffrent given OTP backends given a connection to a certain Tunnel Group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BACKGROUND:&lt;/P&gt;&lt;P&gt;I will try to give you a brief picture of the scenario this is what I currently have.&lt;/P&gt;&lt;P&gt;A VPN system ( ASA 8.4(4) ) where I allow my users to choose from 3 different authentication methods being&lt;/P&gt;&lt;P&gt;1) Certificate (on smart-card)&lt;/P&gt;&lt;P&gt;2) Pledge - OTP token (One-Time-Password delivered via application in smartphone: using pledge from Nordic Edge OTP-Server)&lt;/P&gt;&lt;P&gt;3) SMS - OTP token (OTP via SMS from Nordic Edge OTP-Server) &lt;/P&gt;&lt;P&gt;The choice corresponds to different Connection Profiles/Tunnel Groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today all authentication requests go directly to the OTP-servers and authorization goes directly to AD via LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THE PROBLEM:&lt;/P&gt;&lt;P&gt;The problem arises when I try to put in the ISE into the mix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I obviously(?) would like to do is to have all network authentication/autorization go thru my ISE platform to take advantage of centralized administration, monitoring etc.&lt;/P&gt;&lt;P&gt;Still I would need to use the different backend databases such as AD and Nordic Edge OTP-Server, but then proxied via ISE.&lt;/P&gt;&lt;P&gt;For me to be able to know to which backend AAA system to proxy I must somehow be able to distinguish the incoming Radius Access-Requests.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WHAT IS KNOWN:&lt;/P&gt;&lt;P&gt;As of ASA 8.4.3 the Radius Access-Request contains 2 new attributes, Tunnel Group Name and Client Type, when a VPN user connects.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html#wp1802187" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ref_extserver.html#wp1802187&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;QUESTION:&lt;/P&gt;&lt;P&gt;So, in theory is seams I can achive what I want looking at the Radius Access-Request attribute "Tunnel Group Name" and forward my request to diffrent OTP backends for the Autentication part. But, how do I actually go ahead and configure that in ISE?&lt;/P&gt;&lt;P&gt;I do not see this attribute when I look at the Radius Authentication details for a AAA autentication from the ASA to the ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;/Mattias&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004629#M182098</guid>
      <dc:creator>Mattias Andersson</dc:creator>
      <dc:date>2019-03-11T02:09:26Z</dc:date>
    </item>
    <item>
      <title>ASA VPN with ISE and diffrent OTP backends for authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004630#M182107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an update for this quite broad question.&lt;/P&gt;&lt;P&gt;I have now came a bit further on the path.&lt;/P&gt;&lt;P&gt;Now the needed Radius Access Attribute are available in ISE after adding them in &lt;/P&gt;&lt;P&gt;"Policy Elements" -&amp;gt; "Dictionaris" -&amp;gt; "System" -&amp;gt; "Radius" -&amp;gt; "Cisco-VPN3000".&lt;/P&gt;&lt;P&gt;I added both the attribute 146 Tunnel-Group-Name which I realy need to achive what I want(select diffrent OTP-backends depending on Tunnel Group in ASA) and the other new attribute 150 Client-Type which could be intresting to look at as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here the "Diagnostics Tools" -&amp;gt; "Generel tools" -&amp;gt; "TCP Dump" and Wireshare helped me understand how this worked.&lt;/P&gt;&lt;P&gt;With that I could really see the attributes in the radius access requests going in to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now looking at a request in "Radius Authentication details" I have&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;TABLE id="AUTOGENBOOKMARK_28" style="color: #000000; font-family: sans-serif; background-color: #f5f9fd; font-size: small; empty-cells: show; width: 1589px; margin-top: 0pt; border-bottom-style: none;"&gt;&lt;TBODY&gt;&lt;TR valign="top"&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt; white-space: nowrap;" valign="middle"&gt;&lt;P id="AUTOGENBOOKMARK_62"&gt;Other Attributes:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;" valign="middle"&gt;&lt;P style="margin-top: 0pt; padding-top: 1pt;"&gt;ConfigVersionId=29,Device Port=1025,DestinationPort=1812,RadiusPacketType=AccessRequest,Protocol=Radius,CVPN3000/ASA/PIX7.x-Tunnel-Group-Name=SMHI-TG-RA-ISESMS,CVPN3000/ASA/PIX7.x-Client-Type=,CPMSessionID=ac100865000006294FD60A7F,.....&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;Ok, the tunnel group name attribute seems to be understood correct, but Client-Type just say =, no value for that.&lt;/P&gt;&lt;P&gt;That is strange, I must have defined that wrong(?), but lets leave that for now, I do not really need it for the moment being.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/0/9/90908-ISE_auth_detail.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now when I have this Tunnel-Group-Name attribute available I want to use it in my Rule-Based Authentication Policy.&lt;/P&gt;&lt;P&gt;Problem now is that as soon as I in an expression add a criteria containing Cisco-VPN3000:CVPN3000/ASA/PIX7.x-Tunnel-Group-Name matches .* (just anything), then that row does not match any more. It still work matching against NAS-IP and other attributes.&lt;/P&gt;&lt;P&gt;What could it be I have missed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/1/9/90910-ISE_auth_policy.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;/Mattias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 11:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004630#M182107</guid>
      <dc:creator>Mattias Andersson</dc:creator>
      <dc:date>2012-06-12T11:54:17Z</dc:date>
    </item>
    <item>
      <title>ASA VPN with ISE and diffrent OTP backends for authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004631#M182113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you may be hitting the following issue:&lt;/P&gt;&lt;P&gt;CSCtz49846: ISE does not match condition with VPN attribute 146 Tunnel-Group-Name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This issue is not specific to this attribute as can be seen from the workaround in the release note&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workaround&lt;/P&gt;&lt;P&gt;Ensure that attribute name does not include a '.' character. This also applies to some of the existing attributes in the Cisco-VPN300 dictionary. The attribute names should similarly be modified so that they do not include a '.' character.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 12:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004631#M182113</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2012-06-12T12:17:22Z</dc:date>
    </item>
    <item>
      <title>ASA VPN with ISE and diffrent OTP backends for authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004632#M182124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks alot, that was it!&lt;/P&gt;&lt;P&gt;It also solved the problem that I did not see any values for the Client-Type attribute.&lt;/P&gt;&lt;P&gt;I renamed both thoose attributes to not include a . in the name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After changing the attribute name in the dictonary the authentication policy changed to reflect that.&lt;/P&gt;&lt;P&gt;I hoped it would now directly work, but that was not the case. Looking at the "Authentication Details" the name for the attribute was still the old name. I figured some component must be restarted to fetch the new attribute name. Don't knowing exacly which one I restarted the whole primary ISE-box and the it just worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been spending a lot of hours on this one and thought I have missunderstood the whole concept. I'm really glad to hear it was a bug and not me... &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 13:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-vpn-with-ise-and-diffrent-otp-backends-for-authentication/m-p/2004632#M182124</guid>
      <dc:creator>Mattias Andersson</dc:creator>
      <dc:date>2012-06-12T13:47:14Z</dc:date>
    </item>
  </channel>
</rss>

