cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1091
Views
0
Helpful
1
Replies

VPN SAML Connection Fails when Cisco Umbrella Is Enabled

Carrs
Level 1
Level 1

Hi everyone,

I'm experiencing an issue with a WatchGuard VPN that uses SAML authentication (via Azure AD / Entra ID). The VPN connection works perfectly under the following conditions:

  • Cisco Umbrella Roaming Client is disabled

However, when Cisco umbrella is enabled, the VPN connection fails right after the SAML authentication completes successfully. Here's what happens:

  1. The SAML authentication flow completes (SAML Auth OK)
  2. The OpenVPN client initiates the connection
  3. The TLS handshake with the VPN server succeeds
  4. Then, the client receives:
    AUTH: Received control message: AUTH_FAILED

I’ve already tried the following:

  • Whitelisting all relevant domains in Umbrella
  • Disabling HTTPS inspection
  • Modifying the OrgInfo.json to include bypassDomains for DNS
  • Confirming with the firewall admin that no traffic is being blocked server-side

Despite all this, the issue only occurs when Umbrella is active. It seems that Umbrella is interfering with the SAML token exchange or the final authentication step, even though the TLS connection is established.

Has anyone encountered a similar issue or found a way to configure Umbrellato fully bypass VPN-related traffic?

Any help or guidance would be greatly appreciated!

Thanks

1 Reply 1

wajidhassan
Level 4
Level 4

Root Cause: Umbrella’s SAML Proxy Interference

  • Cisco Umbrella uses a SAML proxy (cookie/IP surrogate) to associate DNS and web traffic with user identities.

  • While SAML succeeds and TLS handshake completes for VPN, Umbrella intercepts subsequent traffic, injects its proxy, and likely drops or alters critical tokens — causing the VPN’s AUTH_FAILED.


Recommended Fixes

1. Enable IP Surrogates for SAML in Umbrella

Ensure Umbrella uses IP surrogates, not cookie-based only:

This prevents Umbrella from injecting cookie-based proxy into your VPN flow.


2. Create a SAML Bypass Rule for VPN Traffic

Cisco now supports the “SAML Bypass” destination list:


3. Whitelist VPN Server & SAML Endpoints

Continue to whitelist:

  • VPN server’s public IP/FQDN.

  • Azure AD/Entra login URLs.

  • Any intermediate endpoints (token, metadata URLs).

But note: simple whitelisting may not override the SAML proxy unless combined with bypass rules above.


️ Step-by-Step Summary

  1. Map tunnel to Site (Umbrella configuration).

  2. Enable IP Surrogates for that Site.

  3. Add SAML Bypass for VPN server domains/IPs.

  4. Whitelist relevant SAML/Azure AD URLs.

  5. Test VPN under Umbrella — the TLS handshake should pass, and AUTH should succeed