<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: L2TP/IPSec with PIX using EAP-TLS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/l2tp-ipsec-with-pix-using-eap-tls/m-p/638646#M422491</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Cisco Secure PIX Firewall Software Release 6.0 supports VPN connections from the Cisco VPN Client 3.5 for Windows.Refer the following URL for more information&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/hw/vpndevc/ps2030/products_configuration_example09186a00800b6099.shtml#configuringthepixfirewall" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/hw/vpndevc/ps2030/products_configuration_example09186a00800b6099.shtml#configuringthepixfirewall&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Nov 2006 15:33:58 GMT</pubDate>
    <dc:creator>s.jankowski</dc:creator>
    <dc:date>2006-11-16T15:33:58Z</dc:date>
    <item>
      <title>L2TP/IPSec with PIX using EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/l2tp-ipsec-with-pix-using-eap-tls/m-p/638645#M422490</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have big problems with using my PIX515 (SW 7.2.1) for L2TP/IPSec VPN-Connections using EAP-TLS. With the option EAP-Proxy activated on PIX a RADIUS Access-Request Message reaches the configured RADIUS-SERVER (IAS2003), but the request is rejected by Radius. I did inspection of the packets with a sniffer and see following strange behavior:&lt;/P&gt;&lt;P&gt;- There is a Tunnel-Client-Endpoint AVP with no value and, even stranger, an existing AVP titled User-Password with an encrypted value.&lt;/P&gt;&lt;P&gt;I dont understand where the encrypted Password comes from in the first RADIUS Access-Request message received from the PIX, since the authentication method should be certificate-based (EAP-TLS). And I dont know either if the Tunnel-Client-Endpoint MUST be present in the message. Fact is the RADIUS responds with an Access-Reject Message.&lt;/P&gt;&lt;P&gt;The other AVPs in the request seem to be OK, and there is an existend AVP titled EAP-Message (79) that seems alright...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other detail: In the event log on the IAS the request is logged as Type "PAP" (and not EAP as it should be!) and the log tells me about a problem with wrong username/password.&lt;/P&gt;&lt;P&gt;Tested the same client and Radius configuration using a RRAS-Server from Microsoft instead of the PIX and it worked fine! Could this be a bug of the Pix EAP-Proxy function?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EAP-Proxy should pass all EAP packets unmodified to the Radius, right? This seems not to be the case. Comparing the RADIUS Access-Request Message received from the Pix (which fails) with the RADIUS Access-Request Message received from the RRAS-Server (which successes) shows significant differences.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Every help appreciated. Please ask me for further infos if needed or if you would like me to post the Packet Capture file (Ethereal format)/Configuration information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Matthias&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/l2tp-ipsec-with-pix-using-eap-tls/m-p/638645#M422490</guid>
      <dc:creator>matthiaseller</dc:creator>
      <dc:date>2019-03-10T21:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: L2TP/IPSec with PIX using EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/l2tp-ipsec-with-pix-using-eap-tls/m-p/638646#M422491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Cisco Secure PIX Firewall Software Release 6.0 supports VPN connections from the Cisco VPN Client 3.5 for Windows.Refer the following URL for more information&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/hw/vpndevc/ps2030/products_configuration_example09186a00800b6099.shtml#configuringthepixfirewall" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/hw/vpndevc/ps2030/products_configuration_example09186a00800b6099.shtml#configuringthepixfirewall&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2006 15:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/l2tp-ipsec-with-pix-using-eap-tls/m-p/638646#M422491</guid>
      <dc:creator>s.jankowski</dc:creator>
      <dc:date>2006-11-16T15:33:58Z</dc:date>
    </item>
  </channel>
</rss>

