01-15-2025 04:56 AM
Hi,
I already have configure the ldap and it is working on VPN perfectly, but when I configure LDAPs i'm getting login error with the following error on the logs:
"AAA unable to complete the request error reason memory error"
I have done the following:
If i rollback to ldap without SSL it starts working fine
Solved! Go to Solution.
01-16-2025 05:41 AM
As https://bst.cisco.com/quickview/bug/CSCwd25602 it was a misleading message. it was a DNS problem on the FTD. on the FMC was good but the FTD could not reach the domain controller by the name.
This was the error i identify:
New request Session, context 0x000015487ec50de8, reqType = Authentication
%FTD-sys-7-711001: [3539578] Fiber started
%FTD-sys-7-711001: [3539578] Failed to convert ip address 0.0.0.0
%FTD-sys-7-711001: [3539578] Fiber exit Tx=0 bytes Rx=0 bytes, status=-2
%FTD-sys-7-711001: [3539578] Session End
Thank you Guys
01-15-2025 05:47 AM
Share output of
Debug ldap 255
MHM
01-15-2025 07:37 AM
Why are you using LDAP at all? What is the MFA strategy here?
01-15-2025 07:45 AM - edited 01-15-2025 07:47 AM
@ahollifield I'm trying to allow user to change their AD password on the AnyConnect client when they are working from home. I think it is a requirement to hava LDAP ove SSL to accomplish that.
I'm using AAA and Client Certificate to accomplish the MFA.
01-15-2025 07:52 AM
Yeah IMHO that's not really MFA. MFA would be a token, SMS, push notification, etc. in addition to the Certificate and credential. Certificate + SAML would be far more secure and scalable than Certificate + LDAP. I would highly recommend doing this through a SAML flow instead. The user can reset their password through the IDP directly within the SAML flow instead of relying on exposing your VPN headend directly to LDAP (which I assume is an AD server).
01-15-2025 08:01 AM
Do you think DUO with SAML will work?
01-15-2025 08:07 AM
01-15-2025 08:46 AM
I already have duo with the radius gateway with a different RAVPN profile, I will test moving to SAML it seems the better and scalable option.
01-15-2025 07:37 AM
@MHM Cisco World so far i have this logs:
%FTD-auth-2-113022: AAA Marking LDAP server Mydomain.local in aaa-server group Mydomain as FAILED\cf1\highlight2
%FTD-auth-2-113022: AAA Marking LDAP server mydomain2.local in aaa-server group Mydomain as FAILED\cf1\highlight2
%FTD-auth-6-113013: AAA unable to complete the request Error : reason = Memory error : user = user\cf1\highlight2
I don't know if this other part have something to do with the issue.
New request Session, context 0x000015487ec50de8, reqType = Authentication
<167>:Jan 15 15:35:23 UTC: %FTD-sys-7-711001: [3539578] Fiber started
<167>:Jan 15 15:35:23 UTC: %FTD-sys-7-711001: [3539578] Failed to convert ip address 0.0.0.0
<167>:Jan 15 15:35:23 UTC: %FTD-sys-7-711001: [3539578] Fiber exit Tx=0 bytes Rx=0 bytes, status=-2
<167>:Jan 15 15:35:23 UTC: %FTD-sys-7-711001: [3539578] Session End
01-15-2025 07:50 AM
I will send you PM
MHM
01-15-2025 08:29 AM
https://bst.cisco.com/quickview/bug/CSCwd25602 <<- check this
MHM
01-15-2025 07:48 AM
To me it does seem a buggy behaviour and probably you are hitting a software bug. What version of software you are running?
01-15-2025 08:04 AM
i'm Using 7.4.2 on the FMC and 7.4.2 on the FTD
01-15-2025 08:07 AM
01-15-2025 08:42 AM
I will plan the upgrade to the cisco suggested version, I think it is the 7.4.2.1 and let you guys knows. It seems a buggy behavior
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide