05-20-2024 06:04 AM
Hello, community!
I am using Enable Failed Authentication Protection for radius ravpn in ISE to prevent Active Directory User Lockout. The maximum password less than the maximum bad password attempts configured as the value of the badPwdCount attribute in the Active Directory and for Authentication Policy use the specific Active Directory join point (not scope mode) but it doesn't work correctly. User gets locked out even when the lockout prevention for Active Directory is enabled.
I cannot understand what the reason could be. What needs to be configured or checked for a solution?
05-20-2024 10:59 AM
Use certificate or SAML auth instead. How are you enabling MFA on your RAVPN solution?
05-20-2024 08:33 PM
Thanks for answer, ahollifield
05-20-2024 11:08 PM
05-20-2024 11:24 PM
The reason why Prevent Active Directory account lockout didn't work. Currently NAS-Port-Type value in access-request from cisco asa = virtual and Prevent Active Directory account lockout feature in ISE doesn't work with NAS-Port-Type=virtual so i have question is it possible to override value NAS-Port-Type attribute using asa or maybe cisco ISE?
05-21-2024 12:06 AM
05-21-2024 02:04 AM
"What is the use/case for simple username/password?" - what does it mean
MFA is used
Prevent Active Directory account lockout is good solution which does not affect users
05-21-2024 03:07 AM
05-21-2024 06:13 AM
AD(first) + OTP scheme
05-08-2025 11:53 PM
Hello @ahollifield
You mean to implementation certificate-based as first authentication on FTD and set expired date? Even external user / non-domain devices try to use this certificate but cannot promised and failed authentication stage? And not lead to be AD account locked out even attacker known AD user? thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide