<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Direct Authentication Problem (Might be SSL related) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784443#M56659</link>
    <description>&lt;P&gt;*SOLVED*&lt;/P&gt;
&lt;P&gt;-After upgrading from&amp;nbsp;&lt;SPAN&gt;&lt;SPAN&gt;8.4(3) to 8.4(7)23 it started working. &amp;nbsp;There must have been a bug with the version of code we were running.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hey folks!&lt;/P&gt;
&lt;P&gt;I'm trying to do direct authentication on a 5510 and running into some problems. &amp;nbsp;It works in another area of our network with a 5505, and I have a suspicion it's SSL related, but I'm not sure. &amp;nbsp;I'm hoping you experts can shed some light on this. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;When I try to authenticate against the ASA to start the direct authentication process, I get presented with a certificate warning (expected), but when I tell it to proceed, it just keeps "spinning" and doesn't give me the login prompt - never returns a timeout or anything. &amp;nbsp;Here is the relevent config:&lt;/P&gt;
&lt;P&gt;aaa authentication listener https UNTRUSTED port 3456 redirect&lt;/P&gt;
&lt;P&gt;aaa authentication match DIRECT_AUTH_UNTRUSTED UNTRUSTED MY-RADIUS&lt;/P&gt;
&lt;P&gt;access-list DIRECT_AUTH_UNTRUSTED extended permit tcp object-group UNTRUSTED_SUBNET any object-group HTTP_HTTPS_TCP&lt;BR /&gt;access-list DIRECT_AUTH_UNTRUSTED extended permit udp object-group UNTRUSTED_SUBNET object-group GOOGLE_DNS eq domain&lt;BR /&gt;access-list DIRECT_AUTH_UNTRUSTED extended permit tcp object-group UNTRUSTED_SUBNET host 10.0.240.1 eq 3456&lt;/P&gt;
&lt;P&gt;Here is the output of show logg. &amp;nbsp;10.0.240.65 is the interface that is listening for direct authentication attempts and .66 is the client machine trying to get access:&lt;/P&gt;
&lt;P&gt;HQ-FW1# show logg | inc 10.0.240.65&lt;BR /&gt;Nov 17 2015 16:54:17: %ASA-6-302014: Teardown TCP connection 6478 for LIMITED_ACCESS:10.0.240.66/6628 to identity:10.0.240.65/3456 duration 0:57:11 bytes 902 TCP Reset-I&lt;BR /&gt;Nov 17 2015 16:54:21: %ASA-6-302013: Built inbound TCP connection 6890 for LIMITED_ACCESS:10.0.240.66/7211 (10.0.240.66/7211) to identity:10.0.240.65/3456 (10.0.240.65/3456)&lt;BR /&gt;Nov 17 2015 16:54:21: %ASA-6-302014: Teardown TCP connection 6890 for LIMITED_ACCESS:10.0.240.66/7211 to identity:10.0.240.65/3456 duration 0:00:00 bytes 843 TCP Reset-I&lt;BR /&gt;Nov 17 2015 16:54:23: %ASA-6-302015: Built inbound UDP connection 6891 for LIMITED_ACCESS:10.0.240.66/68 (10.0.240.66/68) to identity:10.0.240.65/67 (10.0.240.65/67)&lt;BR /&gt;Nov 17 2015 16:54:25: %ASA-6-302013: Built inbound TCP connection 6893 for LIMITED_ACCESS:10.0.240.66/7216 (10.0.240.66/7216) to identity:10.0.240.65/3456 (10.0.240.65/3456)&lt;BR /&gt;Nov 17 2015 16:54:25: %ASA-6-302014: Teardown TCP connection 6893 for LIMITED_ACCESS:10.0.240.66/7216 to identity:10.0.240.65/3456 duration 0:00:00 bytes 843 TCP Reset-I&lt;BR /&gt;Nov 17 2015 16:54:25: %ASA-6-302013: Built inbound TCP connection 6894 for LIMITED_ACCESS:10.0.240.66/7217 (10.0.240.66/7217) to identity:10.0.240.65/3456 (10.0.240.65/3456)&lt;/P&gt;
&lt;P&gt;Here is the output of show asp table socket:&lt;/P&gt;
&lt;P&gt;HQ-FW1# show asp table sock&lt;/P&gt;
&lt;P&gt;Protocol Socket Local Address Foreign Address State&lt;BR /&gt;SSL 0000869f 10.0.240.1:3456 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 0001208f 10.0.240.65:3456 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 0002087f 10.0.55.10:443 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 0002b97f 10.255.255.22:443 0.0.0.0:* LISTEN&lt;BR /&gt;TCP 000309ef 10.0.55.10:22 0.0.0.0:* LISTEN&lt;BR /&gt;TCP 0003f62f 10.255.255.22:22 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 000ded8f 10.0.240.249:3456 0.0.0.0:* LISTEN&lt;BR /&gt;TCP 001a78f8 10.255.255.22:22 10.1.250.243:53275 ESTAB&lt;/P&gt;
&lt;P&gt;For what it's worth, accessing the GUI over 443 works perfectly fine. &amp;nbsp;I"m not sure what other show or debug commands would be useful, but please let me know and I can provide them.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;mitch&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 06:14:58 GMT</pubDate>
    <dc:creator>mitchell helton</dc:creator>
    <dc:date>2019-03-11T06:14:58Z</dc:date>
    <item>
      <title>Direct Authentication Problem (Might be SSL related)</title>
      <link>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784443#M56659</link>
      <description>&lt;P&gt;*SOLVED*&lt;/P&gt;
&lt;P&gt;-After upgrading from&amp;nbsp;&lt;SPAN&gt;&lt;SPAN&gt;8.4(3) to 8.4(7)23 it started working. &amp;nbsp;There must have been a bug with the version of code we were running.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hey folks!&lt;/P&gt;
&lt;P&gt;I'm trying to do direct authentication on a 5510 and running into some problems. &amp;nbsp;It works in another area of our network with a 5505, and I have a suspicion it's SSL related, but I'm not sure. &amp;nbsp;I'm hoping you experts can shed some light on this. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;When I try to authenticate against the ASA to start the direct authentication process, I get presented with a certificate warning (expected), but when I tell it to proceed, it just keeps "spinning" and doesn't give me the login prompt - never returns a timeout or anything. &amp;nbsp;Here is the relevent config:&lt;/P&gt;
&lt;P&gt;aaa authentication listener https UNTRUSTED port 3456 redirect&lt;/P&gt;
&lt;P&gt;aaa authentication match DIRECT_AUTH_UNTRUSTED UNTRUSTED MY-RADIUS&lt;/P&gt;
&lt;P&gt;access-list DIRECT_AUTH_UNTRUSTED extended permit tcp object-group UNTRUSTED_SUBNET any object-group HTTP_HTTPS_TCP&lt;BR /&gt;access-list DIRECT_AUTH_UNTRUSTED extended permit udp object-group UNTRUSTED_SUBNET object-group GOOGLE_DNS eq domain&lt;BR /&gt;access-list DIRECT_AUTH_UNTRUSTED extended permit tcp object-group UNTRUSTED_SUBNET host 10.0.240.1 eq 3456&lt;/P&gt;
&lt;P&gt;Here is the output of show logg. &amp;nbsp;10.0.240.65 is the interface that is listening for direct authentication attempts and .66 is the client machine trying to get access:&lt;/P&gt;
&lt;P&gt;HQ-FW1# show logg | inc 10.0.240.65&lt;BR /&gt;Nov 17 2015 16:54:17: %ASA-6-302014: Teardown TCP connection 6478 for LIMITED_ACCESS:10.0.240.66/6628 to identity:10.0.240.65/3456 duration 0:57:11 bytes 902 TCP Reset-I&lt;BR /&gt;Nov 17 2015 16:54:21: %ASA-6-302013: Built inbound TCP connection 6890 for LIMITED_ACCESS:10.0.240.66/7211 (10.0.240.66/7211) to identity:10.0.240.65/3456 (10.0.240.65/3456)&lt;BR /&gt;Nov 17 2015 16:54:21: %ASA-6-302014: Teardown TCP connection 6890 for LIMITED_ACCESS:10.0.240.66/7211 to identity:10.0.240.65/3456 duration 0:00:00 bytes 843 TCP Reset-I&lt;BR /&gt;Nov 17 2015 16:54:23: %ASA-6-302015: Built inbound UDP connection 6891 for LIMITED_ACCESS:10.0.240.66/68 (10.0.240.66/68) to identity:10.0.240.65/67 (10.0.240.65/67)&lt;BR /&gt;Nov 17 2015 16:54:25: %ASA-6-302013: Built inbound TCP connection 6893 for LIMITED_ACCESS:10.0.240.66/7216 (10.0.240.66/7216) to identity:10.0.240.65/3456 (10.0.240.65/3456)&lt;BR /&gt;Nov 17 2015 16:54:25: %ASA-6-302014: Teardown TCP connection 6893 for LIMITED_ACCESS:10.0.240.66/7216 to identity:10.0.240.65/3456 duration 0:00:00 bytes 843 TCP Reset-I&lt;BR /&gt;Nov 17 2015 16:54:25: %ASA-6-302013: Built inbound TCP connection 6894 for LIMITED_ACCESS:10.0.240.66/7217 (10.0.240.66/7217) to identity:10.0.240.65/3456 (10.0.240.65/3456)&lt;/P&gt;
&lt;P&gt;Here is the output of show asp table socket:&lt;/P&gt;
&lt;P&gt;HQ-FW1# show asp table sock&lt;/P&gt;
&lt;P&gt;Protocol Socket Local Address Foreign Address State&lt;BR /&gt;SSL 0000869f 10.0.240.1:3456 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 0001208f 10.0.240.65:3456 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 0002087f 10.0.55.10:443 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 0002b97f 10.255.255.22:443 0.0.0.0:* LISTEN&lt;BR /&gt;TCP 000309ef 10.0.55.10:22 0.0.0.0:* LISTEN&lt;BR /&gt;TCP 0003f62f 10.255.255.22:22 0.0.0.0:* LISTEN&lt;BR /&gt;SSL 000ded8f 10.0.240.249:3456 0.0.0.0:* LISTEN&lt;BR /&gt;TCP 001a78f8 10.255.255.22:22 10.1.250.243:53275 ESTAB&lt;/P&gt;
&lt;P&gt;For what it's worth, accessing the GUI over 443 works perfectly fine. &amp;nbsp;I"m not sure what other show or debug commands would be useful, but please let me know and I can provide them.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;mitch&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784443#M56659</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2019-03-11T06:14:58Z</dc:date>
    </item>
    <item>
      <title>Good job on solving your own</title>
      <link>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784444#M56660</link>
      <description>&lt;P&gt;Good job on solving your own problem and also thank you for taking the time to come back and post the solution here!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since your issue is resolved, you should mark the thread as "answered" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Nov 2015 05:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784444#M56660</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-11-22T05:41:37Z</dc:date>
    </item>
    <item>
      <title>Believe it or not, I tried to</title>
      <link>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784445#M56661</link>
      <description>&lt;P&gt;Believe it or not, I tried to do that but couldn't figure out how. &amp;nbsp;How can I mark this as resolved? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2015 13:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784445#M56661</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2015-11-23T13:59:01Z</dc:date>
    </item>
    <item>
      <title>Hmm, I can't rate your your</title>
      <link>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784446#M56662</link>
      <description>&lt;P&gt;Hmm, I can't rate your your initial comment either...(+5) on your second comment. It has been a while since I have posted so it looks like some things have changed. Perhaps, a Security VIP can do that for us?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2015 21:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/direct-authentication-problem-might-be-ssl-related/m-p/2784446#M56662</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-11-23T21:20:30Z</dc:date>
    </item>
  </channel>
</rss>

