<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect and ISE with DUO MFA strange issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/5238092#M593858</link>
    <description>&lt;P&gt;Hello Francesco Molino,&lt;/P&gt;
&lt;P&gt;your answer and specially this part: "using ise for authentication, this same radius server give authorization through the same flow and no need to resend an authorization to ISE".&lt;/P&gt;
&lt;P&gt;ISE3.2p7/ASA9.20.7.3/POSTURE:&lt;/P&gt;
&lt;P&gt;if you get CoA-NAK from ASA.&lt;/P&gt;
&lt;P&gt;ASA: auth method: cert + AAA&lt;/P&gt;
&lt;P&gt;ISE for posture: I was getting CoA-NAK always until the moment when I removed authorization from required tunnel-group.&lt;/P&gt;
&lt;P&gt;The question is why it is not documented well and you are saying no need, but I would say you MUST NOT DO THAT !&lt;/P&gt;</description>
    <pubDate>Tue, 17 Dec 2024 21:16:55 GMT</pubDate>
    <dc:creator>stayd</dc:creator>
    <dc:date>2024-12-17T21:16:55Z</dc:date>
    <item>
      <title>Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3801280#M485172</link>
      <description>&lt;P&gt;I am using the ASA to primary auth against Cisco ISE servers and then secondary authentication to DUO proxy servers using DUO_auth Only.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am seeing some strange things in the ISE radius logs. I see a successful auth followed by a rejected auth, but I still get one and still have access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First session says 5200 authentication succeeded.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR class="content_table_steps_highlight"&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24343&lt;/TD&gt;
&lt;TD&gt;RPC Logon request succeeded - stevenwilliams@eftdomain.net&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24402&lt;/TD&gt;
&lt;TD&gt;User authentication against Active Directory succeeded - All_AD_Join_Points&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;22037&lt;/TD&gt;
&lt;TD&gt;Authentication Passed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24423&lt;/TD&gt;
&lt;TD&gt;ISE has not been able to confirm previous successful machine authentication&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15036&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Evaluating Authorization Policy&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15004&lt;/TD&gt;
&lt;TD&gt;Matched rule - IT&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15016&lt;/TD&gt;
&lt;TD&gt;Selected Authorization Profile - SSLVPN_IT&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11022&lt;/TD&gt;
&lt;TD&gt;Added the dACL specified in the Authorization Profile&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;22081&lt;/TD&gt;
&lt;TD&gt;Max sessions policy passed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;22080&lt;/TD&gt;
&lt;TD&gt;New accounting session created in Session cache&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11002&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Accept&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So that looks good. RADIUS looks good also.&amp;nbsp; Then the second log says RADIUS failed due to incorrect password.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Event&lt;/TD&gt;
&lt;TD width="69%"&gt;5400 Authentication failed&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Failure Reason&lt;/TD&gt;
&lt;TD width="69%"&gt;24408 User authentication against Active Directory failed since user has entered the wrong password&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Resolution&lt;/TD&gt;
&lt;TD width="69%"&gt;Check the user password credentials. If the RADIUS request is using PAP for authentication, also check the Shared Secret configured for the Network Device&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Root cause&lt;/TD&gt;
&lt;TD width="69%"&gt;User authentication against Active Directory failed since user has entered the wrong password&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Username&lt;/TD&gt;
&lt;TD width="69%"&gt;stevenwilliams&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24323&lt;/TD&gt;
&lt;TD&gt;Identity resolution detected single matching account&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24344&lt;/TD&gt;
&lt;TD&gt;RPC Logon request failed - STATUS_WRONG_PASSWORD,ERROR_INVALID_PASSWORD,stevenwilliams@eftdomain.net&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;24408&lt;/TD&gt;
&lt;TD&gt;User authentication against Active Directory failed since user has entered the wrong password - All_AD_Join_Points&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;22057&lt;/TD&gt;
&lt;TD&gt;The advanced option that is configured for a failed authentication request is used&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;22061&lt;/TD&gt;
&lt;TD&gt;The 'Reject' advanced option is configured in case of a failed authentication request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11003&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I do not get it. The only thing I am thinking is this is happening due to incorrect configuration at the authentication policy area. What are these "suppose" to be how are they "suppose" to be configured? When do they need to be modified?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-02-13 at 1.52.03 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30041i200980A1C5762E92/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-02-13 at 1.52.03 PM.png" alt="Screen Shot 2019-02-13 at 1.52.03 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 19:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3801280#M485172</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-13T19:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3801510#M485173</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Does your authentication goes to ise first?&lt;BR /&gt;Have you deployed duo auth proxy?&lt;BR /&gt;&lt;BR /&gt;Personally, i configure asa to send requests to duo proxy and then duo will forward it to ise for auth and authorization.</description>
      <pubDate>Thu, 14 Feb 2019 05:53:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3801510#M485173</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-02-14T05:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3801912#M485174</link>
      <description>ASA auths to ISE first and Duo is secondary Auth. The ASA uses DUO radius to a duo proxy. We cant use duo proxy for both authentication and authorization as the we are using dACLs which uses CoA and the duo proxy will not pass on the CoA to ISE so this is the way it has to be done per Duo and Cisco support.</description>
      <pubDate>Thu, 14 Feb 2019 14:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3801912#M485174</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-14T14:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802011#M485249</link>
      <description>&lt;P&gt;Does DUO auth proxy also tie to the backend AD? IF yes, I believe you can set ISE as only your authorization server. What this should do is authenticate against DUO (with AD and push/passcode) and check authorization against ISE. Authorization is what gives you the DACL's, so your CoA/posture should work normally.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So DUO can be set up as this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://duo.com/docs/cisco-alt" target="_blank"&gt;https://duo.com/docs/cisco-alt&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And then you add ISE as authz server as seen below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="duo-ise.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30098i91ECC06083685944/image-size/large?v=v2&amp;amp;px=999" role="button" title="duo-ise.PNG" alt="duo-ise.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Feb 2019 16:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802011#M485249</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2019-02-14T16:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802023#M485250</link>
      <description>No, Duo proxy is doing DUO only, no ad_client is used. Proxy looks to duo api only.</description>
      <pubDate>Thu, 14 Feb 2019 16:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802023#M485250</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-14T16:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802085#M485251</link>
      <description>&lt;P&gt;Ok, makes sense.&amp;nbsp;Can you paste the ASA side config for that tunnel-group?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, do you have the ASA radius debug output that you can sanitize and share? My thought is that since the username looks to be shared between the primary and secondary auth, the second failure is when the ASA uses the secondary creds (duo) also for authorization, causing a failure on ISE.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Feb 2019 17:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802085#M485251</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2019-02-14T17:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802300#M485252</link>
      <description>Ok it wasn't mentioned about dACL.&lt;BR /&gt;Normally your ASA should reach ISE as radius server.&lt;BR /&gt;Then you have on ISE:&lt;BR /&gt; - external radius token which will be your duo auth proxy server&lt;BR /&gt; - identity source sequence which has DUO radius token only as source identity&lt;BR /&gt; - create a policy-set VPN (just assumption here)&lt;BR /&gt; - authentication going to identity source sequence previously created&lt;BR /&gt; - authorization policy with your authz profile (dACL,...)&lt;BR /&gt;&lt;BR /&gt;On your duo auth proxy, you have radius_server_auto section (which has ISE IP) + you can have radius_client (your ISE IP as well) to validate users credentials.&lt;BR /&gt;&lt;BR /&gt;Or have you configured it another way?&lt;BR /&gt;I'm testing FTD (FDM) 6.4 and tested it with success. (not tested dACL right now) but it shouldn't affect as DUO is part of authentication process only and then authorization is between ISE and ASA</description>
      <pubDate>Thu, 14 Feb 2019 22:05:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802300#M485252</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-02-14T22:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802315#M485253</link>
      <description>That method is the way we have it now and it causes way too many issues, timing issues, miss pushes, etc, etc. So Duo and Cisco have told us to redesign.</description>
      <pubDate>Thu, 14 Feb 2019 22:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802315#M485253</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-14T22:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802328#M485254</link>
      <description>Ok weird I always deploy that way and never ended with such big issues.&lt;BR /&gt;Then you are in the old fashion way with 1st authentication from ASA to ISE and 2nd authentication to Duo right? Or I missed something here.&lt;BR /&gt;The 2nd auth is using DUO-LDAP straight to internet or going to local duo-proxy?&lt;BR /&gt;&lt;BR /&gt;Then why the 2nd auth is sent to ISE which triggers a failed. Normally when ISE replies with an access-accept the 1st time, then ASA should request the 2nd auth server (DUO) to validate the passcode or push the popup.&lt;BR /&gt;&lt;BR /&gt;If using proxy, can you share the authproxy cfg file (remove all passwords) + ASA config ?&lt;BR /&gt;Can you also please share ISE config (Identity Source Sequence) and the full log of authentication (both: accept and failed)?</description>
      <pubDate>Thu, 14 Feb 2019 23:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802328#M485254</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-02-14T23:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802339#M485255</link>
      <description>&lt;P&gt;I've done it on my LAB and it works fine. Here my config&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 746px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30156i3FF87B77DA68FC6C/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 745px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30157i8C08150617F7B0ED/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 570px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30158i8AC24134D6FA26B8/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 542px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30159i302A1356712B94D3/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 544px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30160i0FBD1C3EE3F3A6A8/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It works like a charm!&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 00:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802339#M485255</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-02-15T00:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802347#M485256</link>
      <description>&lt;P&gt;ASA:&lt;/P&gt;
&lt;P&gt;AAA Server Group = ISE Server&lt;/P&gt;
&lt;P&gt;-&amp;gt; Secondary Authentication = DUO-RADIUS -&amp;gt; Use Primary Username&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;;[radius_server_auto]&lt;BR /&gt;;ikey=&lt;BR /&gt;;skey=&lt;BR /&gt;;api_host=&lt;BR /&gt;;radius_ip_1=&lt;BR /&gt;;radius_secret_1=&lt;BR /&gt;;failmode=safe&lt;BR /&gt;;client=ad_client&lt;BR /&gt;;port=1812&lt;/P&gt;
&lt;P&gt;[duo_only_client]&lt;/P&gt;
&lt;P&gt;[radius_server_duo_only]&lt;BR /&gt;ikey=DI2DTOC8S*****&lt;BR /&gt;skey=qrVyCPhvfkczB7****&lt;BR /&gt;api_host=api-7****.duosecurity.com&lt;BR /&gt;failmode=safe&lt;BR /&gt;radius_ip_1=10.53.0.251&lt;BR /&gt;radius_secret_1=****an2nv6ehz9P***&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 00:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802347#M485256</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-15T00:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802348#M485257</link>
      <description>Cant see anything here.&lt;BR /&gt;</description>
      <pubDate>Fri, 15 Feb 2019 00:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802348#M485257</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-15T00:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802356#M485259</link>
      <description>Sorry screenshot are now accessible</description>
      <pubDate>Fri, 15 Feb 2019 00:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802356#M485259</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-02-15T00:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802357#M485260</link>
      <description>Ya I am not doing duo ldap. So the asa talks to the duo proxy and proxy talks to duo cloud api...so not sure what that changes. what does your ISE policy look like?</description>
      <pubDate>Fri, 15 Feb 2019 00:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802357#M485260</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-15T00:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802362#M485261</link>
      <description>&lt;P&gt;Very basic config. Take a look at the pictures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I changed to use my duo proxy and it works the same way.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="6D33D1B1-604B-4345-B823-D3BEF84D5168.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30162i5362468D175D6972/image-size/large?v=v2&amp;amp;px=999" role="button" title="6D33D1B1-604B-4345-B823-D3BEF84D5168.jpeg" alt="6D33D1B1-604B-4345-B823-D3BEF84D5168.jpeg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E1BBE6CF-CD07-4DAB-A405-F67C89F98171.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30164i01A676155D9C6662/image-size/large?v=v2&amp;amp;px=999" role="button" title="E1BBE6CF-CD07-4DAB-A405-F67C89F98171.jpeg" alt="E1BBE6CF-CD07-4DAB-A405-F67C89F98171.jpeg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="D46948A0-3CDD-4680-9FD7-B0C0A424D15D.jpeg" style="width: 986px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30161iE6281334CF52D738/image-size/large?v=v2&amp;amp;px=999" role="button" title="D46948A0-3CDD-4680-9FD7-B0C0A424D15D.jpeg" alt="D46948A0-3CDD-4680-9FD7-B0C0A424D15D.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 00:26:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802362#M485261</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-02-15T00:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802364#M485262</link>
      <description>Something is wrong then. I am using a identity sequence for all ad joint points. because I have multiple domains. and ISE is seeing what looks like multiple authentication requests...Its strange...Nothing is talking radius to ISE except the ASA.</description>
      <pubDate>Fri, 15 Feb 2019 00:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802364#M485262</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-15T00:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802368#M485263</link>
      <description>&lt;P&gt;Then, create an ISQ with only 1 AD for testing and see if it works.&lt;/P&gt;
&lt;P&gt;Maybe it’s an issue with your multi-domain ISQ.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 00:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802368#M485263</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-02-15T00:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802793#M485264</link>
      <description>whats the debug for this and is it ok to do during the day?</description>
      <pubDate>Fri, 15 Feb 2019 14:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802793#M485264</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-15T14:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802797#M485265</link>
      <description>&lt;P&gt;The issue has to be with the ASA and/or ISE. I made the secondary authentication DUO-LDAP which will send the request right out to DUO cloud and I still get one success login and one denied login:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-02-15 at 8.51.14 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30217iA66C3C867F8C0E66/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-02-15 at 8.51.14 AM.png" alt="Screen Shot 2019-02-15 at 8.51.14 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 14:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802797#M485265</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-15T14:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect and ISE with DUO MFA strange issue</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802801#M485266</link>
      <description>&lt;P&gt;Here is the failed authentication output&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 14:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-and-ise-with-duo-mfa-strange-issue/m-p/3802801#M485266</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-02-15T14:57:44Z</dc:date>
    </item>
  </channel>
</rss>

