<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3772066#M132624</link>
    <description>&lt;P&gt;I'm using Default Network Access without any change.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise03.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26967iBFA0487198E8E918/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise03.jpg" alt="ise03.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The details of this policy set is as below, which shows there is only one Default authentication policy, nothing more.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise04.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26968i5CC9F74DC1BDA323/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise04.jpg" alt="ise04.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And there is only one authorization policy, as simple as the following:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise05.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26970i22039BB8C1860267/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise05.jpg" alt="ise05.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So as seen there is no complex thing on the ISE and if there were any misconfiguration, it would not be the ISE. Also both of these 2 simultaneously logs (failed-login log and successful-login log) shows the matching auth/athZ rules correctly. I mean both logs shows that the user "xadmin1" matches with auth/authZ rules TRAVPN. So why one of them uses the same auth/authZ rules cannot pas authentication with the same AD as the other successful one uses!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise06.jpg" style="width: 398px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26972i3C5EED89E3E27911/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise06.jpg" alt="ise06.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise07.jpg" style="width: 440px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26973iB40E4F4E527AD997/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise07.jpg" alt="ise07.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I even reset the password for the user "xadmin1" despite that there should be no relevance (because if the password for that user was wrong, why the same user with the same password was able to pass the auth/authz which is displayed in the successful-login log?!&lt;/P&gt;
&lt;P&gt;These are the log files on the VPN Client inside the AnyConnect VPN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;11:45:25 AM Contacting x.x.x.x.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:37 AM User credentials entered.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Establishing VPN session...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM The AnyConnect Downloader is performing update checks...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Checking for profile updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Checking for product updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Checking for customization updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Performing any required updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM The AnyConnect Downloader updates have been completed.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN session...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN - Initiating connection...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN - Examining system...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN - Activating VPN adapter...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:54 AM Establishing VPN - Configuring system...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:54 AM Establishing VPN...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:54 AM Connected to x.x.x.x.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So as seen, I've gotten any specific error on the client side too.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It might be something related to the Anyconnect I think.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jan 2019 09:42:30 GMT</pubDate>
    <dc:creator>ciscoworlds</dc:creator>
    <dc:date>2019-01-03T09:42:30Z</dc:date>
    <item>
      <title>Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3770786#M132620</link>
      <description>&lt;P&gt;Hi;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to configure remote access VPN to Cisco FTD 6.2.2. My internal RADIUS is ISE 2.4 (patch 5). The remote access VPN establishes successfully; but some interesting things happens:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I get double logs on ISE, one shows failed attempt and the 2nd one shows successful attempt.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26838iEECABD2752E4A0F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise.jpg" alt="ise.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The details for the failed logs is like this (briefed):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise01.jpg" style="width: 712px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26839i475885C0063D9BB8/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise01.jpg" alt="ise01.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And the details of the successful log is like this (Briefed):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise02.jpg" style="width: 451px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26840iCC8202B66F82D538/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise02.jpg" alt="ise02.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The connection details on FTD shows every flows "allowed" to pass through firewall. I even installed the Wireshark and captured packets on a internal server. But the issue is after successful establishment of remote access VPN on a sample public client, I cannot reach any internal clients. As I said I got "allowed" connection logs on FTD, showing every packet passed through firewall. On internal client, I got entries showing that remote access VPN client has sent packets to the internal server but interesting part is, none of the packets have been replied. I mean, internal server gets all of the remote access VPN packets, but doesn't send any response at all. The default gateway of the internal server is FTD and it can reach all of the networks but doesn't send any response to the packets it received from remote access VPN client.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any idea?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 11:18:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3770786#M132620</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2019-03-12T11:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3770807#M132621</link>
      <description>&lt;P&gt;Its seem you ISE policy had an issue as you match two policy at the same time. what EAP protocol you using for authentication. and what setting apply on end point?&lt;/P&gt;&lt;P&gt;could you please share your policy setting in regards to VPN setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also code 24408 point your user name is locked out. the best get back to AD and unlock this account.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2018 13:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3770807#M132621</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-31T13:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3770809#M132622</link>
      <description>&lt;P&gt;Its seem you ISE policy had an issue as you match two policy at the same time. what EAP protocol you using for authentication,and what setting apply on end point&lt;/P&gt;&lt;P&gt;could you please share your policy setting in regards to VPN setup.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2018 13:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3770809#M132622</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-31T13:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3770870#M132623</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You have an authentication policy called TRAVPN which has multiple statements. The first statement authenticates against AD which is failing as the error states. The default statement passes the authentication but you aren't posting the entire logs to see what identity source is used for successful authentication. Because ISE performs multiple lookups you see duplicate logs. To avoid this either resolve the problem of AD authentication if you are using AD for VPN users, or configure a statement above AD statement which matches AnyConnect VPN clients as source and authenticates them against the required identity source (which is used in the default statement and passes the authentication).</description>
      <pubDate>Mon, 31 Dec 2018 16:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3770870#M132623</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-12-31T16:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3772066#M132624</link>
      <description>&lt;P&gt;I'm using Default Network Access without any change.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise03.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26967iBFA0487198E8E918/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise03.jpg" alt="ise03.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The details of this policy set is as below, which shows there is only one Default authentication policy, nothing more.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise04.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26968i5CC9F74DC1BDA323/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise04.jpg" alt="ise04.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And there is only one authorization policy, as simple as the following:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise05.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26970i22039BB8C1860267/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise05.jpg" alt="ise05.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So as seen there is no complex thing on the ISE and if there were any misconfiguration, it would not be the ISE. Also both of these 2 simultaneously logs (failed-login log and successful-login log) shows the matching auth/athZ rules correctly. I mean both logs shows that the user "xadmin1" matches with auth/authZ rules TRAVPN. So why one of them uses the same auth/authZ rules cannot pas authentication with the same AD as the other successful one uses!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise06.jpg" style="width: 398px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26972i3C5EED89E3E27911/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise06.jpg" alt="ise06.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise07.jpg" style="width: 440px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26973iB40E4F4E527AD997/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise07.jpg" alt="ise07.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I even reset the password for the user "xadmin1" despite that there should be no relevance (because if the password for that user was wrong, why the same user with the same password was able to pass the auth/authz which is displayed in the successful-login log?!&lt;/P&gt;
&lt;P&gt;These are the log files on the VPN Client inside the AnyConnect VPN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;11:45:25 AM Contacting x.x.x.x.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:37 AM User credentials entered.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Establishing VPN session...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM The AnyConnect Downloader is performing update checks...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Checking for profile updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Checking for product updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Checking for customization updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM Performing any required updates...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:38 AM The AnyConnect Downloader updates have been completed.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN session...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN - Initiating connection...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN - Examining system...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:50 AM Establishing VPN - Activating VPN adapter...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:54 AM Establishing VPN - Configuring system...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:54 AM Establishing VPN...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; 11:45:54 AM Connected to x.x.x.x.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So as seen, I've gotten any specific error on the client side too.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It might be something related to the Anyconnect I think.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 09:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3772066#M132624</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2019-01-03T09:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3772083#M132625</link>
      <description>&lt;P&gt;i think the issue could be your Authentication Policy where you mention Default=All_User_ID_Stores, it would&lt;BR /&gt;be ideal if you create a seprate identity source sequence and put your only AD in it and then test it.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 09:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3772083#M132625</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-03T09:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3772095#M132627</link>
      <description>Note: I found the reason! I removed the SGT from the ISE authZ rule and now reachability is restored!</description>
      <pubDate>Thu, 03 Jan 2019 10:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3772095#M132627</guid>
      <dc:creator>ciscoworlds</dc:creator>
      <dc:date>2019-01-03T10:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Access issue</title>
      <link>https://community.cisco.com/t5/network-security/access-issue/m-p/3772099#M132629</link>
      <description>&lt;P&gt;well done &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 10:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-issue/m-p/3772099#M132629</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-03T10:26:24Z</dc:date>
    </item>
  </channel>
</rss>

