<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access- ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131021#M914155</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure, you have something like this on configuration,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-SERVER protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-SERVER (&lt;INTERFACE&gt;) host &lt;ACS-IP&gt; &lt;SHAREDKEY&gt;&lt;/SHAREDKEY&gt;&lt;/ACS-IP&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group PAK-TEL general-attributes&lt;/P&gt;&lt;P&gt; authentication-server-group RADIUS-SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that you are using Radius protocol for authentication and ACS is configured accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to use following test command to ensure that authentication is working against the ACS server,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;test aaa-server authentication &lt;AAA-SERVER tag=""&gt; host &lt;ACS-IP&gt;&lt;/ACS-IP&gt;&lt;/AAA-SERVER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g., &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;test aaa-server authentication RADIUS host 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Aug 2008 21:36:19 GMT</pubDate>
    <dc:creator>Premdeep Banga</dc:creator>
    <dc:date>2008-08-21T21:36:19Z</dc:date>
    <item>
      <title>Remote Access- ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131018#M914145</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Moving from VPN Concentrator to ASA for Remote Access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested the following configuration but no luck, user accounts are created on ACS and cannot get authenticated.... I am missing something still....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========Remote-Access-Config=======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool JK 192.168.10.1-192.168.10.150 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy PAK-TEL internal&lt;/P&gt;&lt;P&gt;group-policy PAK-TEL attributes&lt;/P&gt;&lt;P&gt;wins-server value 192.168.1.100&lt;/P&gt;&lt;P&gt;dns-server value 192.168.1.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group PAK-TEL type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group PAK-TEL general-attributes&lt;/P&gt;&lt;P&gt;address-pool JK&lt;/P&gt;&lt;P&gt;default-group-policy PAK-TEL&lt;/P&gt;&lt;P&gt;tunnel-group PAK-TEL ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;telnet timeout 1440&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131018#M914145</guid>
      <dc:creator>Amin Shaikh</dc:creator>
      <dc:date>2019-03-11T13:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access- ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131019#M914148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have something like?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip &lt;LOCAL.NETWORK&gt; 192.168.10.0 255.255.255.0&lt;/LOCAL.NETWORK&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Aug 2008 20:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131019#M914148</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-08-21T20:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access- ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131020#M914152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I have local-user on ASA ; it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But how could the traffic forward to ACS Server...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Aug 2008 21:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131020#M914152</guid>
      <dc:creator>Amin Shaikh</dc:creator>
      <dc:date>2008-08-21T21:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access- ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131021#M914155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure, you have something like this on configuration,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-SERVER protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS-SERVER (&lt;INTERFACE&gt;) host &lt;ACS-IP&gt; &lt;SHAREDKEY&gt;&lt;/SHAREDKEY&gt;&lt;/ACS-IP&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group PAK-TEL general-attributes&lt;/P&gt;&lt;P&gt; authentication-server-group RADIUS-SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that you are using Radius protocol for authentication and ACS is configured accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to use following test command to ensure that authentication is working against the ACS server,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;test aaa-server authentication &lt;AAA-SERVER tag=""&gt; host &lt;ACS-IP&gt;&lt;/ACS-IP&gt;&lt;/AAA-SERVER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g., &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;test aaa-server authentication RADIUS host 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Aug 2008 21:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131021#M914155</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2008-08-21T21:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access- ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131022#M914159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;I dont see any failed/passed info under Reports-logging on ACS..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ACS the following is done&lt;/P&gt;&lt;P&gt;ASA added under AAA client with shared key&lt;/P&gt;&lt;P&gt;Radius authentication&lt;/P&gt;&lt;P&gt;rename group5 on ACS as PAK-TEL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No Luck so far...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Aug 2008 08:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131022#M914159</guid>
      <dc:creator>Amin Shaikh</dc:creator>
      <dc:date>2008-08-22T08:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access- ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131023#M914162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Renaming Group to PAK-TEL is not required, its only for your management comfort only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question, are you able to authentication using the current ACS against any other device ? Or is ASA is the only one that you are trying to authenticate. Could be that ACS is not configured properly, by that I mean "Proxy Distribution Table" is not configured properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the first time you are trying to authenticate on ACS, then please enable Passed Reports as it is disabled by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The very first thing that should be successful, in order to get VPN users authenticated is, to ensure that the "test aaa...." command is successful from the ASA, if that does not succeed, then no point in testing using VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that nothing is blocking the Radius traffic in between i.e b/w ASA and ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the result of the test command, is it,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"ERROR: Authentication Server not responding: No error" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or something else ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if it helps! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Aug 2008 11:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-asa/m-p/1131023#M914162</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2008-08-22T11:56:43Z</dc:date>
    </item>
  </channel>
</rss>

