<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASAv to Azure AD Authentication issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/4645225#M1091654</link>
    <description>&lt;P&gt;Thanks, that is one option I have considered but it is simply the time it takes to complete.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue I have with this approach, is that even if it fixes the issue, how do I know it will not occur again in the future?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jul 2022 17:44:45 GMT</pubDate>
    <dc:creator>jamesholley</dc:creator>
    <dc:date>2022-07-06T17:44:45Z</dc:date>
    <item>
      <title>ASAv to Azure AD Authentication issue</title>
      <link>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/4645165#M1091640</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;I am struggling with something on our Azure setup.&lt;/P&gt;&lt;P&gt;I have created public load balancer with two ASAv's behind it running active/standby HA.&lt;/P&gt;&lt;P&gt;I am fairly sure that when I set them up and configured HA, that it was working OK. But a few weeks later, the secondary firewall stopped communicating and went into a disabled state for HA.&lt;/P&gt;&lt;P&gt;The primary can reach the AD ok and authenticate, but the secondary seems to be getting rejected by the AD.&lt;/P&gt;&lt;P&gt;This is the output from show fail history&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;16:12:42 UTC Jul 6 2022: Error Connection - No response to access token request from &lt;A href="https://login.microsoftonline.com/" target="_blank"&gt;https://login.microsoftonline.com/&lt;/A&gt;&lt;BR /&gt;16:12:47 UTC Jul 6 2022: Info Connection - Checking Authentication&lt;BR /&gt;16:12:47 UTC Jul 6 2022: Error Connection - No response to access token request from &lt;A href="https://login.microsoftonline.com/" target="_blank"&gt;https://login.microsoftonline.com/&lt;/A&gt;&lt;BR /&gt;16:12:52 UTC Jul 6 2022: Info Connection - Checking Authentication&lt;BR /&gt;16:12:52 UTC Jul 6 2022: Error Connection - No response to access token request from &lt;A href="https://login.microsoftonline.com/" target="_blank"&gt;https://login.microsoftonline.com/&lt;/A&gt;&lt;BR /&gt;16:12:57 UTC Jul 6 2022: Info Connection - Checking Authentication&lt;BR /&gt;16:12:57 UTC Jul 6 2022: Error Connection - No response to access token request from &lt;A href="https://login.microsoftonline.com/" target="_blank"&gt;https://login.microsoftonline.com/&lt;/A&gt;&lt;BR /&gt;16:13:02 UTC Jul 6 2022: Info Connection - Checking Authentication&lt;BR /&gt;16:13:02 UTC Jul 6 2022: Error Connection - No response to access token request from &lt;A href="https://login.microsoftonline.com/" target="_blank"&gt;https://login.microsoftonline.com/&lt;/A&gt;&lt;BR /&gt;16:13:07 UTC Jul 6 2022: Info Connection - Checking Authentication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;p8-1b# sh fail&lt;BR /&gt;Failover On&lt;BR /&gt;Failover Mode: Cloud&lt;BR /&gt;Failover Unit: Secondary&lt;BR /&gt;Failover State: Disabled&lt;BR /&gt;Internal State: Starting&lt;BR /&gt;Last Failover at: never&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked and the config is exactly the same for failover as the primary, and I am using the management interface to route traffic to the AD.&lt;/P&gt;&lt;P&gt;A packet capture on each firewall reveals that traffic is reaching the AD and we see a two-way tcp conversation. Both captures look identical.&lt;/P&gt;&lt;P&gt;So what am I missing and what area should I be looking at to try and troubleshoot this issue? I cannot find any documentation on this at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 16:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/4645165#M1091640</guid>
      <dc:creator>jamesholley</dc:creator>
      <dc:date>2022-07-06T16:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv to Azure AD Authentication issue</title>
      <link>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/4645182#M1091641</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I have seen such abnormalities in ASAv in Azure. Try to redeploy the VM&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Jul 2022 16:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/4645182#M1091641</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2022-07-06T16:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv to Azure AD Authentication issue</title>
      <link>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/4645225#M1091654</link>
      <description>&lt;P&gt;Thanks, that is one option I have considered but it is simply the time it takes to complete.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue I have with this approach, is that even if it fixes the issue, how do I know it will not occur again in the future?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 17:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/4645225#M1091654</guid>
      <dc:creator>jamesholley</dc:creator>
      <dc:date>2022-07-06T17:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv to Azure AD Authentication issue</title>
      <link>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/5352716#M1123772</link>
      <description>&lt;P&gt;Dropping in a reply here to assist anyone else who faces this issue.&lt;BR /&gt;&lt;BR /&gt;As per the usual design based on Azure ASAv HA Template the management interface acts as the default gateway, and also the default interface for HA Control and LB Probes. ASA also uses this interface to reach Azure Entra for authentication requests.&amp;nbsp;&lt;BR /&gt;The messages you have mentioned seem to imply that ASA is not receiving replies on the intended interface. This is common for deployment where an alternative interface is used as the default GW.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Refer step 5 of this guide to clear these issues :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa923/configuration/general/asa-923-general-config/ha-failover-cloud.html#task_875CAEA5DC3B43EFA5E84DD566B0072D" target="_blank"&gt;Configure Failover Criteria and Other Settings&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 17:16:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-to-azure-ad-authentication-issue/m-p/5352716#M1123772</guid>
      <dc:creator>mnagakum</dc:creator>
      <dc:date>2025-12-05T17:16:08Z</dc:date>
    </item>
  </channel>
</rss>

