<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't authenticate Mac VPN client from RADIUS server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509563#M1055336</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm a real noob here so please bear with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been able to configure my PIX 515E to allow VPN connections onto my network, but what I need to do is set up some sort of user authentication to control access at a user level. From what I've read here and in the Configuration Guide I should be able to do this authentication with a RADIUS server. I'm running a Corriente Networks Elektron Security server which has RADIUS server capabilities. It is running on my (inside) interface at IP 192.168.10.26. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that I had everything configured properly but it never seems to authenticate. I connect, the XAUTH window pops up, I add my username and password as it's configured on my RADIUS server, but when I click OK it just cycles the progress bar at the bottom and eventually times out. The client log doesn't show me anything and the log on the RADIUS server shows me nothing. Any ideas? this seems like it should be simple because I can connect until I attempt to authenticate to the RADIUS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA for any direction you can provide me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Christine&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:43:43 GMT</pubDate>
    <dc:creator>cbonthron</dc:creator>
    <dc:date>2020-02-21T08:43:43Z</dc:date>
    <item>
      <title>Can't authenticate Mac VPN client from RADIUS server</title>
      <link>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509563#M1055336</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm a real noob here so please bear with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been able to configure my PIX 515E to allow VPN connections onto my network, but what I need to do is set up some sort of user authentication to control access at a user level. From what I've read here and in the Configuration Guide I should be able to do this authentication with a RADIUS server. I'm running a Corriente Networks Elektron Security server which has RADIUS server capabilities. It is running on my (inside) interface at IP 192.168.10.26. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that I had everything configured properly but it never seems to authenticate. I connect, the XAUTH window pops up, I add my username and password as it's configured on my RADIUS server, but when I click OK it just cycles the progress bar at the bottom and eventually times out. The client log doesn't show me anything and the log on the RADIUS server shows me nothing. Any ideas? this seems like it should be simple because I can connect until I attempt to authenticate to the RADIUS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA for any direction you can provide me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Christine&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509563#M1055336</guid>
      <dc:creator>cbonthron</dc:creator>
      <dc:date>2020-02-21T08:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Can't authenticate Mac VPN client from RADIUS server</title>
      <link>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509564#M1055337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it helps, here is my config with a some of the non-related bits deleted:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security50&lt;/P&gt;&lt;P&gt;enable password ********* encrypted&lt;/P&gt;&lt;P&gt;passwd ******* encrypted&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name acme.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol http 82&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip host 192.168.10.26 192.168.10.192 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip host 192.168.10.69 192.168.10.192 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_20 permit ip any 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_40 permit ip any 192.168.10.192 255.255.255.224 &lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip address outside 207.XXX.XXX.130 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address DMZ 192.168.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;multicast interface inside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool CBI_VPN_Pool 192.168.10.201-192.168.10.220&lt;/P&gt;&lt;P&gt;pdm location 192.168.10.50 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm group CBI_Servers inside&lt;/P&gt;&lt;P&gt;pdm logging warnings 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 200 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 200 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 200 192.168.10.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 207.XXX.XXX.150 192.168.10.27 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) 207.XXX.XXX.132 192.168.10.26 dns netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 207.XXX.XXX.129 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server radius-authport 1812&lt;/P&gt;&lt;P&gt;aaa-server radius-acctport 1812&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS (inside) host 192.168.10.26 ************* timeout 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.10.3 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication RADIUS&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 3600&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN address-pool CBI_VPN_Pool&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN dns-server 142.77.2.101 142.77.2.36&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN default-domain acme.com&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN authentication-server RADIUS&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN user-authentication&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN user-idle-timeout 1200&lt;/P&gt;&lt;P&gt;vpngroup Test_VPN password ********&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.10.100-192.168.10.254 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 142.77.2.101 142.77.2.36&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2006 21:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509564#M1055337</guid>
      <dc:creator>cbonthron</dc:creator>
      <dc:date>2006-02-21T21:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Can't authenticate Mac VPN client from RADIUS server</title>
      <link>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509565#M1055338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What does this do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Mar 2006 23:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509565#M1055338</guid>
      <dc:creator>bjames</dc:creator>
      <dc:date>2006-03-13T23:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Can't authenticate Mac VPN client from RADIUS server</title>
      <link>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509566#M1055339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"access-group 100 in interface outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No luck with that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Mar 2006 16:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-authenticate-mac-vpn-client-from-radius-server/m-p/509566#M1055339</guid>
      <dc:creator>cbonthron</dc:creator>
      <dc:date>2006-03-14T16:10:19Z</dc:date>
    </item>
  </channel>
</rss>

