12-31-2018 04:29 AM - edited 03-12-2019 04:18 AM
Hi;
I'm trying to configure remote access VPN to Cisco FTD 6.2.2. My internal RADIUS is ISE 2.4 (patch 5). The remote access VPN establishes successfully; but some interesting things happens:
I get double logs on ISE, one shows failed attempt and the 2nd one shows successful attempt.
The details for the failed logs is like this (briefed):
And the details of the successful log is like this (Briefed):
The connection details on FTD shows every flows "allowed" to pass through firewall. I even installed the Wireshark and captured packets on a internal server. But the issue is after successful establishment of remote access VPN on a sample public client, I cannot reach any internal clients. As I said I got "allowed" connection logs on FTD, showing every packet passed through firewall. On internal client, I got entries showing that remote access VPN client has sent packets to the internal server but interesting part is, none of the packets have been replied. I mean, internal server gets all of the remote access VPN packets, but doesn't send any response at all. The default gateway of the internal server is FTD and it can reach all of the networks but doesn't send any response to the packets it received from remote access VPN client.
Any idea?
12-31-2018 05:17 AM - edited 12-31-2018 05:24 AM
Its seem you ISE policy had an issue as you match two policy at the same time. what EAP protocol you using for authentication. and what setting apply on end point?
could you please share your policy setting in regards to VPN setup.
also code 24408 point your user name is locked out. the best get back to AD and unlock this account.
12-31-2018 05:20 AM
Its seem you ISE policy had an issue as you match two policy at the same time. what EAP protocol you using for authentication,and what setting apply on end point
could you please share your policy setting in regards to VPN setup.
12-31-2018 08:40 AM
01-03-2019 01:41 AM - edited 01-03-2019 01:42 AM
I'm using Default Network Access without any change.
The details of this policy set is as below, which shows there is only one Default authentication policy, nothing more.
And there is only one authorization policy, as simple as the following:
So as seen there is no complex thing on the ISE and if there were any misconfiguration, it would not be the ISE. Also both of these 2 simultaneously logs (failed-login log and successful-login log) shows the matching auth/athZ rules correctly. I mean both logs shows that the user "xadmin1" matches with auth/authZ rules TRAVPN. So why one of them uses the same auth/authZ rules cannot pas authentication with the same AD as the other successful one uses!
I even reset the password for the user "xadmin1" despite that there should be no relevance (because if the password for that user was wrong, why the same user with the same password was able to pass the auth/authz which is displayed in the successful-login log?!
These are the log files on the VPN Client inside the AnyConnect VPN:
11:45:25 AM Contacting x.x.x.x.
11:45:37 AM User credentials entered.
11:45:38 AM Establishing VPN session...
11:45:38 AM The AnyConnect Downloader is performing update checks...
11:45:38 AM Checking for profile updates...
11:45:38 AM Checking for product updates...
11:45:38 AM Checking for customization updates...
11:45:38 AM Performing any required updates...
11:45:38 AM The AnyConnect Downloader updates have been completed.
11:45:50 AM Establishing VPN session...
11:45:50 AM Establishing VPN - Initiating connection...
11:45:50 AM Establishing VPN - Examining system...
11:45:50 AM Establishing VPN - Activating VPN adapter...
11:45:54 AM Establishing VPN - Configuring system...
11:45:54 AM Establishing VPN...
11:45:54 AM Connected to x.x.x.x.
So as seen, I've gotten any specific error on the client side too.
It might be something related to the Anyconnect I think.
01-03-2019 01:57 AM
i think the issue could be your Authentication Policy where you mention Default=All_User_ID_Stores, it would
be ideal if you create a seprate identity source sequence and put your only AD in it and then test it.
01-03-2019 02:13 AM
01-03-2019 02:26 AM
well done :)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide