10-19-2018 07:08 AM
I don't think DUO Proxy matters in this case, but how does radius token Primary and failover server work. I can never get the authentication to access the secondary server. Timeout on primary is 60 seconds. Do I need to lower this?
Policy says "if process fails [DROP]" I assume this means it would query the secondary server in the radius token. Doesnt seem to ever get there.
Solved! Go to Solution.
10-19-2018 08:06 AM
11-14-2018 09:22 AM
Remote Access VPN using Cisco AnyConnect VPN module to a Cisco ASA head-end has different ways to use DUO as the MFA. If using SAML, then ISE only used in authorization but not in authentication. If using RADIUS, it depends on how DUO policies configured in Duo Admin panel, the configuration on the Duo Auth Proxy, and then the configuration of Network Access policies and elements on ISE.
Thus, please provide details how it's setup so the community may comment better how to adjust it, etc.
10-19-2018 07:11 AM
Did you make sure to crank up your RADIUS timeout from the network device to ISE to something like 120 seconds? Is the first Duo really not responding? Put a fake IP address in for the first Duo to simulate a not responding. The timeout going to Duo needs to be 60 seconds+ because you need to allow time for the user to do MFA.
10-19-2018 07:15 AM
I stop the DUO proxy service on the primary server. The ASA VPN device is set for 60 seconds time out to ISE.
10-19-2018 07:18 AM
The ASA timeout has to be longer than the timeout going to the Duo servers to allow for the failover. Otherwise the ASA will timeout and start the process over and then ISE starts the process over. I would set ASA to 120 seconds and the time out to Duo 60 seconds. You have both Duos tied together into an identity source sequence? Did you abandon the dual AD individual authentication rule setup?
10-19-2018 07:22 AM
So what ended up working was the Radius username attribute looking for domainA\ go to Duo Proxy 1 on port 1812 and then if user not found continue then hits a policy that says look for domainB\ and go to Duo Proxy 1 on port 18120 and if user not found then continue and the last policy is deny access. Thats the identity sequence.
There are two instances of RADIUS tokens, One for port 1812 and one for port 18120 and inside each token there is primary and secondary DUO proxy servers. Ideally it would be nice to get these behind my F5 to LB it and I will get there but have to get this going for now.
10-19-2018 07:34 AM
10-19-2018 07:38 AM
10-19-2018 07:55 AM
10-19-2018 08:00 AM
10-19-2018 08:06 AM
11-14-2018 08:30 AM
So back to this mind breaking topic.
Just recently discovered that if a user is configured in AD and NOT in Duo, they can login to the Anyconnect VPN without any issues. I assume its a design issue or a policy issue with how users are authenticated.
There needs to be something that says if the user belongs to AD but doesnt have a DUO account then deny access but cant figure out how to do this with ISE? Is it a matter of the ASA needs to point to the Duo Proxy server and then Duo queries ISE for AD membership?
11-14-2018 09:22 AM
Remote Access VPN using Cisco AnyConnect VPN module to a Cisco ASA head-end has different ways to use DUO as the MFA. If using SAML, then ISE only used in authorization but not in authentication. If using RADIUS, it depends on how DUO policies configured in Duo Admin panel, the configuration on the Duo Auth Proxy, and then the configuration of Network Access policies and elements on ISE.
Thus, please provide details how it's setup so the community may comment better how to adjust it, etc.
11-14-2018 09:48 AM
ASA radius servers are set to ISE. Duo Proxies are set as radius tokens in ISE.
In Duo admin panel, I have the vpn application set to use simple username normalization.
Duo Proxies are configured with ISE Server IP as Radius server.
ISE Policy is set as follows:
Some of the challenges with this was we are authenticating users from two separate forest domains and the forests have a two way trust, So each user has to use their domain\username for it work for each domain. I couldn't get it to work with just username since the ISE server sits in one domain.
If a user is not configured in DUO but tries to authenticate to the anyconnect VPN they can successfully authenticate and connect as long as they exist in the domain and ISE verifies that. I assume this is because the ASA looks to ISE directly so DUO verification is only after the user is verified in the Domain. Not sure though.
11-14-2018 09:43 AM
Just to add...
In case you are using Duo Auth Proxy, then the RADIUS application in Duo Admin Panel may enforce a new user policy to deny access to any users not enrolled.
11-14-2018 09:50 AM
That is set to Deny.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide