<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3356184#M1027493</link>
    <description>&lt;P&gt;Let's make it simple:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(w.w.w.w)LAN----Site B (x.x.x.x)=====Tunnel==========(y.y.y.y) Site A-----Ldap server (z.z.z.z)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you set the LDAP server to z.z.z.z on Site B, you need to have the crypto ACL as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site B&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL from x.x.x.x to z.z.z.z&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site A&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL from z.z.z.z to x.x.x.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why is this important - Usually you only have the crypto ACL between the LAN networks on both sides of the tunnel. In this case, you need to have the WAN ip of the Site B in your crypto ACL.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Mar 2018 20:02:59 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2018-03-27T20:02:59Z</dc:date>
    <item>
      <title>Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355541#M1027481</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have a 5506-x at Site B connecting to&amp;nbsp;a 5515 at Site A via a site-to-site VPN tunnel.&amp;nbsp; there is only the one Domain Controller at Site A which&amp;nbsp;i'm trying to setup LDAP authentication from Site B for Anyconnect VPN users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if i&amp;nbsp;setup authentication via LOCAL accounts the Anyconnect session is established and i can ping/rdp to&amp;nbsp;the LDAP server in Site A.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the Interface of the AAA Server group (LDAP server) is set to EXTERNAL (outside) on Site B - assuming this is the correct interface as the traffic needs to route out across the tunnel (FYI i've tried both inside and outside interfaces and both still fail).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i've run debug 255 and get this result&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;debug ldap enabled at level 255&lt;BR /&gt;&lt;BR /&gt;[-2147483638] Session Start&lt;BR /&gt;[-2147483638] New request Session, context 0x00007fd8ac0ad518, reqType = Other&lt;BR /&gt;[-2147483638] Fiber started&lt;BR /&gt;[-2147483638] Creating LDAP context with uri=ldap://10.61.39.2:389&lt;BR /&gt;[-2147483638] Connect to LDAP server: ldap://10.61.39.2:389, status = Failed&lt;BR /&gt;[-2147483638] Unable to read rootDSE. Can't contact LDAP server.&lt;BR /&gt;[-2147483638] Fiber exit Tx=0 bytes Rx=0 bytes, status=-2&lt;BR /&gt;[-2147483638] Session End&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on the LDAP server in Site A, i'm running wireshark to capture traffic but cant see anything in the packet capture.&amp;nbsp; i was filtering by destination port 389 (not sure if the&amp;nbsp;the destination port changes after the tunneling??)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on the firewall log on Site A i&amp;nbsp;can see this entry each time i 'test' the ldap connection from SiteB firewall&lt;/P&gt;
&lt;P&gt;(sorry but i've just removed the first octet in the public IP addresses for some privacy)&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Mar 27 2018&lt;/TD&gt;
&lt;TD&gt;12:24:39&lt;/TD&gt;
&lt;TD&gt;302303&lt;/TD&gt;
&lt;TD&gt;XX.255.12.230&lt;/TD&gt;
&lt;TD&gt;443&lt;/TD&gt;
&lt;TD&gt;10.61.39.2&lt;/TD&gt;
&lt;TD&gt;49561&lt;/TD&gt;
&lt;TD&gt;Built TCP state-bypass connection 99877113 from EXTERNAL:XX.255.12.230/443 (XX.255.12.230/443) to DMZ-PAC:10.61.39.2/49561 (XXX.148.68.142 /49561)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;again, if i connect via Anyconnect VPN via LOCAL authentication, i can connect to the remote LDAP server so would thing routing/natting/ACL is all correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any ideas?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355541#M1027481</guid>
      <dc:creator>bquach001</dc:creator>
      <dc:date>2020-02-21T15:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355544#M1027482</link>
      <description>On site A ASA check show route 10.61.39.2 and make sure that same interface&lt;BR /&gt;is used as LDAP interface&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Mar 2018 03:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355544#M1027482</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-27T03:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355547#M1027483</link>
      <description>&lt;P&gt;Hi Mohammed,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here's a show route of Site A, ASA&lt;/P&gt;
&lt;P&gt;the VPN tunnel is built over interface EXTERNAL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gateway of last resort is XXX.148.68.141 to network 0.0.0.0&lt;/P&gt;
&lt;P&gt;C 10.61.62.0 255.255.255.224 is directly connected, TRUSTED&lt;BR /&gt;C 10.61.61.0 255.255.255.0 is directly connected, DMZ-3&lt;BR /&gt;C 10.61.60.0 255.255.255.0 is directly connected, DMZ-WIFI&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;C 10.61.39.0 255.255.255.0 is directly connected, DMZ-PAC&lt;/FONT&gt;&lt;BR /&gt;S 10.61.32.0 255.255.224.0 [1/0] via 10.61.62.1, TRUSTED&lt;BR /&gt;S 10.61.0.0 255.255.224.0 [1/0] via 10.61.62.1, TRUSTED&lt;BR /&gt;S 10.61.58.79 255.255.255.255 [1/0] via XXX.148.68.141, EXTERNAL&lt;BR /&gt;S 10.61.96.0 255.255.224.0 [1/0] via 10.61.62.1, TRUSTED&lt;BR /&gt;S 10.61.85.0 255.255.255.0 [1/0] via XXX.148.68.141, EXTERNAL&lt;BR /&gt;S 10.61.64.0 255.255.224.0 [1/0] via 10.61.62.1, TRUSTED&lt;BR /&gt;S 10.61.160.0 255.255.224.0 [1/0] via 10.61.62.1, TRUSTED&lt;BR /&gt;C XXX.148.68.140 255.255.255.252 is directly connected, EXTERNAL&lt;BR /&gt;S* 0.0.0.0 0.0.0.0 [1/0] via XXX.148.68.141, EXTERNAL&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 03:23:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355547#M1027483</guid>
      <dc:creator>bquach001</dc:creator>
      <dc:date>2018-03-27T03:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355553#M1027484</link>
      <description>Use  DMZ-PAC  as you LDAP interface. Then AnyConnect using LDAP should&lt;BR /&gt;working assuming everything else is configured correctly.&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Mar 2018 03:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355553#M1027484</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-27T03:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355559#M1027486</link>
      <description>&lt;P&gt;so just to clarify&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DMZ-PAC is the 'inside' interface of Site A ASA where the LDAP server is hosted&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyconnect clients connect to Site B ASA, which then attempts to authenticate&amp;nbsp;via the tunnel across to Site A&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so i'm a bit lost when you say 'use the DMZ-PAC as LDAP interface'; in reference to what? what do i need to change/configure and on which Site ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 03:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355559#M1027486</guid>
      <dc:creator>bquach001</dc:creator>
      <dc:date>2018-03-27T03:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355573#M1027488</link>
      <description>&lt;P&gt;i think what Mo is getting at is that you will have to make sure that traffic from site B to A for LDAP authentication is part of the protected traffic on this s2s VPN.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 04:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355573#M1027488</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-03-27T04:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355581#M1027490</link>
      <description>Thanks for clarifying it Dennis. Sometimes the language doesn't help me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Mar 2018 04:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355581#M1027490</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-27T04:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355584#M1027491</link>
      <description>Hi Dennis,&lt;BR /&gt;can you kindly explain what i need to check for specifically? how can i ensire LDAP authentication is part of protected traffic on teh s2s?&lt;BR /&gt;&lt;BR /&gt;(this part you'll hate)... most of my config ability is done via ASDM, so you can appreciate my lack of knowledge here&lt;BR /&gt;&lt;BR /&gt;from what i can gather, i've allowed all IP traffic between the two sites and at risk of sounding like a broken record, when connected (via LOCAL authentication), i have full access from the PC connected via Anyconnect into Site B,  to connect to the LDAp server in Site A.  further this LDAP server serves as a DNS server and i can readily lookup hosts within my internal domain via this same server.&lt;BR /&gt;&lt;BR /&gt;it's obviously the issue of authentication before the connection is my problem &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;</description>
      <pubDate>Tue, 27 Mar 2018 04:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3355584#M1027491</guid>
      <dc:creator>bquach001</dc:creator>
      <dc:date>2018-03-27T04:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3356184#M1027493</link>
      <description>&lt;P&gt;Let's make it simple:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(w.w.w.w)LAN----Site B (x.x.x.x)=====Tunnel==========(y.y.y.y) Site A-----Ldap server (z.z.z.z)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you set the LDAP server to z.z.z.z on Site B, you need to have the crypto ACL as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site B&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL from x.x.x.x to z.z.z.z&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site A&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL from z.z.z.z to x.x.x.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why is this important - Usually you only have the crypto ACL between the LAN networks on both sides of the tunnel. In this case, you need to have the WAN ip of the Site B in your crypto ACL.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 20:02:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3356184#M1027493</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-03-27T20:02:59Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3356273#M1027495</link>
      <description>&lt;P&gt;Thank you Rahul!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;perfect.&amp;nbsp; i just added the ACL and NAT rules to both sides as you suggested and it works!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i'm so ever grateful! i've been trying to work this out for over a week.&amp;nbsp; i should have just come to the forums earlier! haha thanks again&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 00:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3356273#M1027495</guid>
      <dc:creator>bquach001</dc:creator>
      <dc:date>2018-03-28T00:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Site-to-Site tunnel)</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3356291#M1027706</link>
      <description>&lt;P&gt;points for you then&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 01:51:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/3356291#M1027706</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-03-28T01:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect authentication to LDAP server at remote site (across Si</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/4467791#M1083745</link>
      <description>&lt;P&gt;Is there any way to force the ASA to make the requests using its LAN IP on the inside interface?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Sep 2021 17:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-authentication-to-ldap-server-at-remote-site-across/m-p/4467791#M1083745</guid>
      <dc:creator>Jason Lista</dc:creator>
      <dc:date>2021-09-16T17:48:57Z</dc:date>
    </item>
  </channel>
</rss>

