<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA stopped after implementing BVI in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3875160#M6018</link>
    <description>What version of code are you running? Is it possible you are hitting the following bug ?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf26463/?reffering_site=dumpcr" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf26463/?reffering_site=dumpcr&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 18 Jun 2019 15:08:06 GMT</pubDate>
    <dc:creator>GRANT3779</dc:creator>
    <dc:date>2019-06-18T15:08:06Z</dc:date>
    <item>
      <title>AAA stopped after implementing BVI</title>
      <link>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3874405#M6012</link>
      <description>&lt;P&gt;I recently modified our Cisco ASA 5516-X firewall (in routed mode), changing the "inside" interface from one of the GigabitEthernets to a BVI (IP 10.0.0.1).&amp;nbsp; After doing so, I seem to have lost access to our Windows (DC) Domain Controller (IP 10.1.1.50), which maintains our internal DNS and DIT (Directory Information Tree) for authentication.&amp;nbsp; In other words, AnyConnect VPN users can no longer authenticate and, therefore, cannot use internal resources.&amp;nbsp; I have created some new ACLs to go with this setup (temporarily any-any), but am stumped as to why AAA doesn't work.&lt;/P&gt;&lt;P&gt;The ASA is connected to a L3 switch (SVI IPs 10.0.0.2 and 10.1.1.2), to which the servers connect.&amp;nbsp; I can ping the DC from the router and the router from the DC; however, I can't seem to connect to it for AAA or DNS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;router# ping 10.1.1.50
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.50, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/PRE&gt;&lt;PRE&gt;PS C:\Users\cerealkiller&amp;gt; ping 10.0.0.1

Pinging 10.0.0.1 with 32 bytes of data:
Reply from 10.0.0.1: bytes=32 time&amp;lt;1ms TTL=254
Ping statistics for 10.0.0.1:
    Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
Control-C&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I try to test the AAA server from the ASDM, I receive the following error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Authentication test to host 10.1.1.50 failed.&amp;nbsp; Following error occurred -

ERROR: Authentication Server not responding: AAA Server has been removed&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the router's CLI, I added debugging info for ldap and watched:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;router# debug ldap 255
debug ldap enabled at level 255
router#
[-2147483622] Session Start
[-2147483622] New request Session, context 0x00007fb1814879f8, reqType = Authentication
[-2147483622] Fiber started
[-2147483622] Creating LDAP context with uri=ldap://10.1.1.50:389
[-2147483622] Connect to LDAP server: ldap://10.1.1.50:389, status = Failed
[-2147483622] Unable to read rootDSE. Can't contact LDAP server.
[-2147483622] Fiber exit Tx=0 bytes Rx=0 bytes, status=-2
[-2147483622] Session End&lt;/PRE&gt;&lt;P&gt;Because the AAA server is also our internal DNS, I tested name resolution as well, which failed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;router# ping SERVER_NAME
              ^
ERROR: % Invalid Hostname&lt;/PRE&gt;&lt;P&gt;Pinging a public address yields the same result:&lt;/P&gt;&lt;PRE&gt;router# ping google.com
              ^
ERROR: % Invalid Hostname&lt;/PRE&gt;&lt;P&gt;I am not sure if this is something to do with using the BVI or what.&amp;nbsp; Do I need to revert back to using the physical interface?&amp;nbsp; Does anyone know the source address when the ASA sends an AAA request?&amp;nbsp; Any help is greatly appreciated in this.&amp;nbsp; The following ASA config should be all the necessary options, but please let me know if I can get more information.&amp;nbsp; Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;interface GigabitEthernet1/1
&amp;nbsp;description WAN link from ISP
&amp;nbsp;nameif outside
&amp;nbsp;security-level 0
&amp;nbsp;ip address PUB.LIC.IP.ADDR SUB.NET.MA.SK
!
interface GigabitEthernet1/2
&amp;nbsp;bridge-group 1
&amp;nbsp;nameif inside_1
&amp;nbsp;security-level 100
!
interface BVI1
&amp;nbsp;description Bridge Interface
&amp;nbsp;nameif inside
&amp;nbsp;security-level 100
&amp;nbsp;ip address 10.0.0.1 255.255.255.0
!
dns domain-lookup outside
dns domain-lookup inside
dns server-group DefaultDNS
 name-server 10.1.1.50 inside
 name-server PUBLIC_DNS1 outside
 name-server PUBLIC_DNS2 outside
 domain-name domain.tld&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface
!&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_1_access_in extended permit ip any any&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;!
nat (inside_1,outside) source dynamic internal-nets interface
!
access-group outside_access_in in interface outside
access-group inside_1_access_in in interface inside_1
access-group inside_access_in in interface inside
access-group global_access global&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ISP_GATEWAY 1&lt;BR /&gt;route inside 10.1.1.0 255.255.255.0 10.0.0.2 1
!
aaa-server ldap-servers protocol ldap
&amp;nbsp;realm-id 1
aaa-server ldap-servers (inside) host 10.1.1.50
&amp;nbsp;ldap-base-dn DC=DOMAIN,DC=TLD
&amp;nbsp;ldap-scope subtree
&amp;nbsp;ldap-naming-attribute sAMAccountName
&amp;nbsp;ldap-login-password *****
&amp;nbsp;ldap-login-dn CN=LDAP USER,OU=ORG_UNIT,DC=DOMAIN,DC=TLD
&amp;nbsp;server-type microsoft
!
group-policy AnyConnectPolicy internal
group-policy AnyConnectPolicy attributes
&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client
&amp;nbsp;split-tunnel-policy tunnelspecified
&amp;nbsp;split-tunnel-network-list value anyconnect-vpn
&amp;nbsp;address-pools value anyConnectPool
!
tunnel-group DefaultRAGroup general-attributes
&amp;nbsp;address-pool anyConnectPool
&amp;nbsp;authentication-server-group ldap-servers LOCAL
&amp;nbsp;default-group-policy AnyConnectPolicy
tunnel-group DefaultWEBVPNGroup general-attributes
&amp;nbsp;address-pool anyConnectPool
&amp;nbsp;authentication-server-group ldap-servers LOCAL
&amp;nbsp;default-group-policy AnyConnectPolicy&lt;/PRE&gt;&lt;P&gt;UPDATE: The above has been edited to show the correct route.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3874405#M6012</guid>
      <dc:creator>misterDub</dc:creator>
      <dc:date>2020-02-21T17:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: AAA stopped after implementing BVI</title>
      <link>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3874986#M6015</link>
      <description>&lt;P&gt;I would test by amending the following -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no&amp;nbsp;route inside 10.1.1.0 255.255.255.0 10.1.1.2 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route inside 10.1.1.0 255.255.255.0 10.0.0.2&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 11:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3874986#M6015</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-06-18T11:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: AAA stopped after implementing BVI</title>
      <link>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3875100#M6016</link>
      <description>&lt;P&gt;Good catch.&amp;nbsp; I must admit I did a bit of doctoring with the IP addresses; I suppose I should've just left them alone and not introduce the possibility of more errors.&amp;nbsp; I actually _do_ have the line you suggested in the config.&amp;nbsp; I will edit that post to clarify as well.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3875100#M6016</guid>
      <dc:creator>misterDub</dc:creator>
      <dc:date>2019-06-18T13:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: AAA stopped after implementing BVI</title>
      <link>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3875160#M6018</link>
      <description>What version of code are you running? Is it possible you are hitting the following bug ?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf26463/?reffering_site=dumpcr" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf26463/?reffering_site=dumpcr&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Jun 2019 15:08:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3875160#M6018</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-06-18T15:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: AAA stopped after implementing BVI</title>
      <link>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3875248#M6020</link>
      <description>&lt;P&gt;I think that very well may be the case: I am running version 9.8(2).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much.&amp;nbsp; I will revert back to using a L3 interface and let you know if my issue resolves.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 16:59:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3875248#M6020</guid>
      <dc:creator>misterDub</dc:creator>
      <dc:date>2019-06-18T16:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: AAA stopped after implementing BVI</title>
      <link>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3876104#M6022</link>
      <description>&lt;P&gt;I went back to using GigabitEthernet1/2 instead of the BVI for my inside interface, and I was able to successfully authenticate with my AD server again.&amp;nbsp; I have to assume at this point that the bug affecting version 9.8(1) also affects 9.8(2), which is what I'm running.&amp;nbsp; Thanks, GRANT3779, for the assistance!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 14:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-stopped-after-implementing-bvi/m-p/3876104#M6022</guid>
      <dc:creator>misterDub</dc:creator>
      <dc:date>2019-06-19T14:45:55Z</dc:date>
    </item>
  </channel>
</rss>

