<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051030#M22754</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"From what I can see it seems that SSL is never establishing properly.".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;AAA server is using entrust certificate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This might be the &amp;nbsp;ROOT CA (entrust ) not installed (TrustPoint ) in ASA&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 24 May 2017 21:27:44 GMT</pubDate>
    <dc:creator>elite2010</dc:creator>
    <dc:date>2017-05-24T21:27:44Z</dc:date>
    <item>
      <title>asa -aaa</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051028#M22752</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I have an external authentication server , the configuration below&lt;/P&gt;
&lt;P&gt;aaa-server test protocol ldap&lt;BR /&gt;aaa-server test (Outside) host testserver.com &lt;BR /&gt; timeout 60&lt;BR /&gt; server-port 636&lt;BR /&gt; ldap-base-dn dc=xxxxxxxxxxxxxxx,dc=testserver,dc=com&lt;BR /&gt; ldap-naming-attribute cn&lt;BR /&gt; ldap-login-password *****&lt;BR /&gt; ldap-login-dn dc=xxxxxxxxxxxxx,dc=testserver,dc=com&lt;BR /&gt; ldap-over-ssl enable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I have internal dns server running , for resolving dns domain-lookup enabled on Inside interface &lt;BR /&gt;dns domain-lookup Inside&lt;/P&gt;
&lt;P&gt;for some reason the authentication not working ,&lt;/P&gt;
&lt;P&gt;I have captured the traffic to the reomote ldaps sever (output sanitized )&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.1 255.255.255.252&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;TestServer.com : 2.2.2.2 &lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051028#M22752</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2019-03-11T07:44:21Z</dc:date>
    </item>
    <item>
      <title>It appears your pcap only got</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051029#M22753</link>
      <description>&lt;P&gt;It appears your pcap only got part of the session. From what I can see it seems that SSL is never establishing properly.&lt;/P&gt;
&lt;P&gt;Are you sure the LDAPS server is able to accept SSL sessions from clients?&lt;/P&gt;
&lt;P&gt;Is any other client connecting to it via LDAPS?&lt;/P&gt;
&lt;P&gt;Perhaps you can do a capture at the server end and open up the SSL handshake details in the decode.&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 10:33:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051029#M22753</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-24T10:33:00Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051030#M22754</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"From what I can see it seems that SSL is never establishing properly.".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;AAA server is using entrust certificate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This might be the &amp;nbsp;ROOT CA (entrust ) not installed (TrustPoint ) in ASA&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 21:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051030#M22754</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2017-05-24T21:27:44Z</dc:date>
    </item>
    <item>
      <title>That cold very well be the</title>
      <link>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051031#M22755</link>
      <description>&lt;P&gt;That cold very well be the case.&lt;/P&gt;
&lt;P&gt;The detailed protocol decode of SSL handshake might show you conclusively what is happening. (or a debug on the ASA although they can be more challenging to interpret as they are so verbose and all plain text)&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 08:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asa-aaa/m-p/3051031#M22755</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-25T08:03:04Z</dc:date>
    </item>
  </channel>
</rss>

