<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote Access VPN authentication through RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121537#M374413</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured remote access VPN (IPsec) in my Cisco ASA . Before there was only single username &amp;amp;  password to for VPN client. Now I am planning to give access through RADIUS server. I have configured RADIUS server in WIN 2003 server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)	Administrative Tools &amp;gt; Internet Authentication Service and right-click on RADIUS Client to add a new RADIUS client with ip address of CISCO ASA (inside interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      2) Remote Access Policies, right-click on Connections to Other Access Servers, and select Properties.&lt;/P&gt;&lt;P&gt;      3) check Grant Remote Access Permissions is selected.Click Edit Profile and check these settings:On the Authentication tab, check Unencrypted authentication (PAP,  SPAP), MS-CHAP,and MS-CHAP-v2.ï&amp;#128;&amp;nbsp;On the Encryption tab, ensure that the option for No Encryption is selected.Click OK when you are finished.&lt;/P&gt;&lt;P&gt;      4.Select Administrative Tools &amp;gt; Computer Management &amp;gt; System Tools &amp;gt; Local Users and Groups, right-click on Users and select New Users to add a user into the local computer account.Add a user and check this profile information:On the General tab, ensure that the option for Password Never Expired is selected instead ofthe option for User Must Change Password.&lt;/P&gt;&lt;P&gt;On the Dial-in tab, select the option for Allow access &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol radius&lt;/P&gt;&lt;P&gt;aaa-server vpn host 10.155.20.25  (RADIUS server IP )&lt;/P&gt;&lt;P&gt;key cisco321&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group vpnacc type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group vpnacc general-attributes&lt;/P&gt;&lt;P&gt;authentication-server-group vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but it is not working. Please guide to resolve this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;som&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 23:10:23 GMT</pubDate>
    <dc:creator>somnath21</dc:creator>
    <dc:date>2019-03-10T23:10:23Z</dc:date>
    <item>
      <title>Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121537#M374413</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured remote access VPN (IPsec) in my Cisco ASA . Before there was only single username &amp;amp;  password to for VPN client. Now I am planning to give access through RADIUS server. I have configured RADIUS server in WIN 2003 server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)	Administrative Tools &amp;gt; Internet Authentication Service and right-click on RADIUS Client to add a new RADIUS client with ip address of CISCO ASA (inside interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      2) Remote Access Policies, right-click on Connections to Other Access Servers, and select Properties.&lt;/P&gt;&lt;P&gt;      3) check Grant Remote Access Permissions is selected.Click Edit Profile and check these settings:On the Authentication tab, check Unencrypted authentication (PAP,  SPAP), MS-CHAP,and MS-CHAP-v2.ï&amp;#128;&amp;nbsp;On the Encryption tab, ensure that the option for No Encryption is selected.Click OK when you are finished.&lt;/P&gt;&lt;P&gt;      4.Select Administrative Tools &amp;gt; Computer Management &amp;gt; System Tools &amp;gt; Local Users and Groups, right-click on Users and select New Users to add a user into the local computer account.Add a user and check this profile information:On the General tab, ensure that the option for Password Never Expired is selected instead ofthe option for User Must Change Password.&lt;/P&gt;&lt;P&gt;On the Dial-in tab, select the option for Allow access &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol radius&lt;/P&gt;&lt;P&gt;aaa-server vpn host 10.155.20.25  (RADIUS server IP )&lt;/P&gt;&lt;P&gt;key cisco321&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group vpnacc type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group vpnacc general-attributes&lt;/P&gt;&lt;P&gt;authentication-server-group vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but it is not working. Please guide to resolve this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;som&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121537#M374413</guid>
      <dc:creator>somnath21</dc:creator>
      <dc:date>2019-03-10T23:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121538#M374414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Did you add the asa to the list of nas in RADIUS server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Massimiliano.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Nov 2008 15:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121538#M374414</guid>
      <dc:creator>massimiliano.serafino</dc:creator>
      <dc:date>2008-11-06T15:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121539#M374415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how to add that one...plz guide..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;som&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Nov 2008 12:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121539#M374415</guid>
      <dc:creator>somnath21</dc:creator>
      <dc:date>2008-11-10T12:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121540#M374416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using a Cisco Secure ACS for your radius authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Nov 2008 18:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121540#M374416</guid>
      <dc:creator>craig.eyre</dc:creator>
      <dc:date>2008-11-10T18:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121541#M374417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I m using Windows 2003...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Nov 2008 04:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121541#M374417</guid>
      <dc:creator>somnath21</dc:creator>
      <dc:date>2008-11-11T04:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121542#M374418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume by your answer of Windows 2003 that you are using the ISA server for Radius authentication then?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Nov 2008 16:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121542#M374418</guid>
      <dc:creator>craig.eyre</dc:creator>
      <dc:date>2008-11-12T16:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121543#M374419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You dont say which version of ASA code you are running, but I dont see your specification of interface on your aaa statement.  Wouldnt it look something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server vpn (INSIDE) host x.x.x.x key xxxxxxx?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is how mine look on 8.0(4)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 18:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121543#M374419</guid>
      <dc:creator>mike.keller</dc:creator>
      <dc:date>2008-11-13T18:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN authentication through RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121544#M374420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, take a look at your logs on the windows server, and try debugging the asa.  Try running wireshark or network monitor on the windows server to see if the requests are coming in.  You should be able to figure out pretty quickly what is going on by debugging aaa on the asa and/or checking the logs on the server.  Make sure the service is running on the windows box.  Make sure that something stupid like windows firewall isnt blocking the connection.  You can turn on debugging by typing "debug aaa" and type "logging console debugging" and "term mon".  You can test aaa by typing "test aaa-server authentication vpn host x.x.x.x username someusername password somepassword"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this will lead you in the right direction.  Oh, one more thing, when you are done, don't forget to turn off the debug by typing "undebug all".  Another word of warning, running debugs on a production firewall should be done at your own risk, it is very easy to overwhelm a device to the point it stops responding by running debugs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 18:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-access-vpn-authentication-through-radius/m-p/1121544#M374420</guid>
      <dc:creator>mike.keller</dc:creator>
      <dc:date>2008-11-13T18:25:18Z</dc:date>
    </item>
  </channel>
</rss>

