<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD issue with Anyconnect authenticating via AD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239293#M1118373</link>
    <description>&lt;P&gt;You've got the internal root cert on the FTD, but no intermediate. Do you have an intermediate root CA cert that you need on the FTD?&lt;/P&gt;</description>
    <pubDate>Fri, 20 Dec 2024 11:28:56 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-12-20T11:28:56Z</dc:date>
    <item>
      <title>FTD issue with Anyconnect authenticating via AD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239263#M1118370</link>
      <description>&lt;P&gt;Hi Guys&lt;/P&gt;&lt;P&gt;I am having an issue authenticating users on our anyconnect to our LDAP servers.&lt;/P&gt;&lt;P&gt;The users and groups show on the realm in CDO and the test to the server connects successfully.&lt;/P&gt;&lt;P&gt;The issue arises when I try to log into Anyconnect, I put in the password and it just fails.&lt;/P&gt;&lt;P&gt;I have done a debug on the firewall and I am seeing the below&lt;/P&gt;&lt;P&gt;%FTD-7-725013: SSL server inside:172.24.35.2/28482 to 172.24.32.50/636 chooses cipher ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;%FTD-7-717025: Validating certificate chain containing 2 certificate(s).&lt;BR /&gt;%FTD-7-717029: Identified client certificate within certificate chain. serial number: XXXXXXXXXXXXXXXXXX, subject name: CN=DC01.XXX&lt;BR /&gt;%FTD-3-717009: Certificate validation failed. serial number: 4000000006F7AC1F67376FB64D000000000006, subject name: CN=XXX-Issuing-CA,DC=XXX,DC=XXX.&lt;BR /&gt;%FTD-3-717027: Certificate chain failed validation. Generic validation failure occurred.&lt;BR /&gt;%FTD-7-725014: SSL lib error. Function: tls_process_client_certificate Reason: certificate verify failed&lt;BR /&gt;%FTD-6-113014: AAA authentication server not accessible : server = 172.24.32.50 : user = *****&lt;BR /&gt;%FTD-2-113022: AAA Marking LDAP server XXX in aaa-server group XXX as FAILED&lt;BR /&gt;%FTD-2-113023: AAA Marking LDAP server 172.24.32.50 in aaa-server group XXX as ACTIVE&lt;BR /&gt;%FTD-6-302014: Teardown TCP connection 942107 for inside:172.24.32.50/636 to identity:172.24.35.2/28482 duration 0:00:00 bytes 438 TCP Reset-O from identity&lt;BR /&gt;%FTD-7-711001: [107] TLS Connection to LDAP server: ldaps://172.24.32.50:636, status = Failed&lt;BR /&gt;%FTD-7-710005: TCP request discarded from 172.24.32.50/636 to inside:172.24.35.2/28482&lt;BR /&gt;%FTD-7-711001: [107] Unable to read rootDSE. Can't contact LDAP server.&lt;BR /&gt;%FTD-7-711001: callback_aaa_task: status = -3, msg =&lt;BR /&gt;%FTD-7-711001: [67] AAA FSM: In aaa_backend_callback&lt;BR /&gt;%FTD-7-711001: aaa_backend_callback: Handle = 67, pAcb = 0x000014b4eacf7640&lt;BR /&gt;%FTD-7-711001: [107] Fiber exit Tx=0 bytes Rx=0 bytes, status=-3&lt;BR /&gt;%FTD-7-711001: [107] Session End&lt;BR /&gt;%FTD-7-711001: AAA task: aaa_process_msg(0x000014b4c56e5b10) received message type 1&lt;BR /&gt;%FTD-7-711001: [67] AAA FSM: In AAA_ProcSvrResp&lt;/P&gt;&lt;P&gt;Can anyone help here please? I am really struggling to sort this&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 10:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239263#M1118370</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2024-12-20T10:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD issue with Anyconnect authenticating via AD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239266#M1118371</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320506"&gt;@carl_townshend&lt;/a&gt; from your logs "%FTD-3-717009: Certificate validation failed." &lt;/P&gt;
&lt;P&gt;Do both the FTD and anyconnect clients trust the CA? For the FTD you will need to create a trustpoint with the Inter/Root CA and enrol on the FTD. The anyconnect client will need to have the Inter/Root CA distributed by GPO.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/syslogs8.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/syslogs8.html&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="ariaid-title168" class="title topictitle3"&gt;717009&lt;/H3&gt;
&lt;SECTION class="body conbody"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Error Message&lt;/STRONG&gt; &lt;CODE class="ph codeph"&gt;%&lt;SPAN class="ph"&gt;FTD&lt;/SPAN&gt;-3-717009: Certificate validation failed. Reason: &lt;EM class="ph i"&gt;reason_string&lt;/EM&gt; . &lt;/CODE&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Explanation&lt;/STRONG&gt; A certificate validation failed, which might be caused by a validation attempt of a revoked certificate, invalid certificate attributes, or configuration issues.&lt;/P&gt;
&lt;UL id="con_4777343__ul_176F958E55804D1E9CC4F86A3EC7B4B4" class="ul"&gt;
&lt;LI id="con_4777343__li_0D95DA4810A941759863F28355B56DBD" class="li"&gt;
&lt;P class="p"&gt;&lt;EM class="ph i"&gt;reason_string&lt;/EM&gt; —The reason that the certificate validation failed&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Recommended Action&lt;/STRONG&gt; Make sure the configuration has a valid trustpoint configured for validation if the reason indicates that no suitable trustpoints were found. Check the &lt;SPAN class="ph"&gt;Secure Firewall Threat Defense device&lt;/SPAN&gt; time to ensure that it is accurate relative to the certificate authority time. Check the reason for the failure and correct any issues that are indicated. If certificate validation fails due to the CA key size being too small or a weak crypto being used, you can use the &lt;SPAN class="ph"&gt;enable weak crypto option for the device in the management center&lt;/SPAN&gt; to override these restrictions.&lt;/P&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Fri, 20 Dec 2024 10:18:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239266#M1118371</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-20T10:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: FTD issue with Anyconnect authenticating via AD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239279#M1118372</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;The FTD has a public cert applied for the anyconnect clients to connect from outside.&lt;/P&gt;&lt;P&gt;I have also added the internal root CA cert to it for our internal domain, this is where the LDAP server sits.&lt;/P&gt;&lt;P&gt;I think the issue is somewhere with the internal cert when talking to the internal LDAP server.&lt;/P&gt;&lt;P&gt;As you can see below, there are 2 certs applied to the FTD, one public for the Anyconnect, the other one is internal CA root for the LDAP&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="carl_townshend_0-1734692034749.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/236298iDBF33CC747C62B51/image-size/medium?v=v2&amp;amp;px=400" role="button" title="carl_townshend_0-1734692034749.png" alt="carl_townshend_0-1734692034749.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;What am I missing here ?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 10:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239279#M1118372</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2024-12-20T10:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: FTD issue with Anyconnect authenticating via AD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239293#M1118373</link>
      <description>&lt;P&gt;You've got the internal root cert on the FTD, but no intermediate. Do you have an intermediate root CA cert that you need on the FTD?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 11:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239293#M1118373</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-20T11:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD issue with Anyconnect authenticating via AD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239298#M1118374</link>
      <description>&lt;P&gt;Hi, I do have a copy of the full chain, should I delete the existing internal root CA and replace with that ?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 11:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239298#M1118374</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2024-12-20T11:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTD issue with Anyconnect authenticating via AD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239300#M1118375</link>
      <description>&lt;P&gt;You can just add the intermediate as another trustpoint and enrol on the FTD.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 11:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239300#M1118375</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-20T11:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTD issue with Anyconnect authenticating via AD</title>
      <link>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239355#M1118380</link>
      <description>&lt;P&gt;Hi Rob, this seems have done the trick, thanks for that, I added to the LDAP directory as well as device certificates.&lt;/P&gt;&lt;P&gt;Is it a requirement that it has the full&amp;nbsp; / intermediate also ? I could not see that anywhere in any documentation&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 14:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-issue-with-anyconnect-authenticating-via-ad/m-p/5239355#M1118380</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2024-12-20T14:26:09Z</dc:date>
    </item>
  </channel>
</rss>

