<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ezvpn ISAKMP authorization (mode config) on IOS using ACS issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ezvpn-isakmp-authorization-mode-config-on-ios-using-acs-issue/m-p/1913975#M209025</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've tried using IOS CA rsa-sig for ISAKMP instead of pre-shared keys, and it works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is still the same though. Since the OU in the client certificate has to match the ezvpn group name (and corresponding ACS user), xauth is meaningless. There will always be a well known username who must have "cisco" as password. Anyone getting hold of a company laptop can get VPN access to corporate resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm starting to think that ISAKMP authorization with RADIUS is very insecure and should not be used under any circumstance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I right in thinking that local ISAKMP authorization is the way to go for ezvpn?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Mar 2012 09:38:50 GMT</pubDate>
    <dc:creator>Erik Ingeberg</dc:creator>
    <dc:date>2012-03-02T09:38:50Z</dc:date>
    <item>
      <title>Ezvpn ISAKMP authorization (mode config) on IOS using ACS issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ezvpn-isakmp-authorization-mode-config-on-ios-using-acs-issue/m-p/1913974#M209017</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've set up ezvpn using DVTI for both hardware and software ezvpn clients on on a IOS router. Authentication authorization (mode config) is done with RADIUS towards ACS 4.2, and this is working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to get this to work, I had to create users on ACS that have the same names as the ezvpn groups with password "cisco".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users and ezvpn IOS NEM clients are getting authenticated and authorized correctly with the correct mode configuration. My problem is that I am able to log in with a vpn client using any group-name as username and the password "cisco".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the group-name is visible in the software client, and the password is always "cisco", it is very easy for unwanted users to get access (the enc_GroupPwd in the pcf file is very easily decrypted).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been trying to deny access to the username that is the same as the group-name, but then authentication fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the relevant config for the software vpn client on the ezvpn server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login acs group radius&lt;/P&gt;&lt;P&gt;aaa authorization network acs group radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; encr aes 256&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp profile ezvpn-client&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; self-identity address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match identity group ezvpn-client&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client authentication list acs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; isakmp authorization list acs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client configuration address respond&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; virtual-template 30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec profile ezvpn-client&lt;/P&gt;&lt;P&gt; set transform-set tset&lt;/P&gt;&lt;P&gt; set reverse-route tag 10&lt;/P&gt;&lt;P&gt; set isakmp-profile ezvpn-client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Virtual-Template30 type tunnel&lt;/P&gt;&lt;P&gt; ip unnumbered Loopback0&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt; tunnel source x.x.x.x&lt;/P&gt;&lt;P&gt; tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt; tunnel path-mtu-discovery&lt;/P&gt;&lt;P&gt; tunnel protection ipsec profile ezvpn-client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool ezvpn-client-pool x.x.x.1 x.x.x.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended split&lt;/P&gt;&lt;P&gt; permit ip x.x.x.x x.x.x.x any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius server acs&lt;/P&gt;&lt;P&gt; address ipv4 x.x.x.x auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt; key xxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS group config (both the "ezvpn-client" user and regular users are members):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cisco-av-pair:&lt;/P&gt;&lt;P&gt;ipsec:key-exchange=ike&lt;/P&gt;&lt;P&gt;ipsec:key-exchange=pre-shared&lt;/P&gt;&lt;P&gt;ipsec:inacl=split&lt;/P&gt;&lt;P&gt;ipsec:addr-pool=ezvpn-client-pool&lt;/P&gt;&lt;P&gt;ipsec:user-vpn-group=ezvpn-client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IETF attributes:&lt;/P&gt;&lt;P&gt;[006] Service-Type: Outbound&lt;/P&gt;&lt;P&gt;[064] Tunnel-Type: IP ESP&lt;/P&gt;&lt;P&gt;[069] Tunnel-Password: xxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to stop the "ezvpn-client" user being able to connect using the well know password "cisco"?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ezvpn-isakmp-authorization-mode-config-on-ios-using-acs-issue/m-p/1913974#M209017</guid>
      <dc:creator>Erik Ingeberg</dc:creator>
      <dc:date>2019-03-11T01:51:34Z</dc:date>
    </item>
    <item>
      <title>Ezvpn ISAKMP authorization (mode config) on IOS using ACS issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ezvpn-isakmp-authorization-mode-config-on-ios-using-acs-issue/m-p/1913975#M209025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've tried using IOS CA rsa-sig for ISAKMP instead of pre-shared keys, and it works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is still the same though. Since the OU in the client certificate has to match the ezvpn group name (and corresponding ACS user), xauth is meaningless. There will always be a well known username who must have "cisco" as password. Anyone getting hold of a company laptop can get VPN access to corporate resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm starting to think that ISAKMP authorization with RADIUS is very insecure and should not be used under any circumstance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I right in thinking that local ISAKMP authorization is the way to go for ezvpn?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 09:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ezvpn-isakmp-authorization-mode-config-on-ios-using-acs-issue/m-p/1913975#M209025</guid>
      <dc:creator>Erik Ingeberg</dc:creator>
      <dc:date>2012-03-02T09:38:50Z</dc:date>
    </item>
  </channel>
</rss>

