ā12-03-2023 12:48 PM
Hi,
Over the weekend we have upgraded a Firepower 1010 to 7.2.5.1-29 from 7.2.5-208 and since then RADIUS has stopped working for our remote access VPN.
The NPS server sits in Azure so we have a tunnel between the Firepower and Azure and all is working fine with traffic passing and other functions working as they should.
If we run the test from the identity sources configuration page it also works except it comes from the management interface IP but if we update the NPS to accept that as a client it passes fine.
In the identity sources configuration we have it set to use the inside interface as the source. Once we try to connect the remote access VPN the request never reaches the NPS server in Azure despite that the test function worked albeit on a different IP/interface. We've run Wireshark to validate that the traffic never makes it there as well.
Packet tracer doesn't appear to show any issues either and shows as though it should go via the ipsec-tunnel.
I've tried doing a packet capture from the CLI as well but whatever method I tried I didn't get any packets matched.
I'm not really sure why it would have stopped working with this patch, as it's been working for a number of months prior. Are there any suggestions on what I can check or try or is there a way to rollback the patch?
Solved! Go to Solution.
ā12-04-2023 07:51 AM
We use unnat when traffic IN go OUT and we have NAT apply to OUT
Here with route based VPN
Traffic IN go VTI and there is no NAT in VTI.
What happened the traffic route based on noNAT not based on RIB.
MHM
ā12-03-2023 12:54 PM
So you config management access for interface you use to connect to radius over s2s vpn?
MHM
ā12-03-2023 02:35 PM
As far as I'm aware you can only do that for HTTPS and SSH connections but not RA-VPN. Or at least in the management access section those are the only 2 options.
When we set this up originally we had to create a flex config object with "management-access inside" and after that it worked and that command is still in effect post upgrade.
ā12-03-2023 02:40 PM
ā12-03-2023 11:44 PM
Thank you, however this doesn't appear to be applicable in our scenario. The closest I can do is setting the source interface of the RADIUS connection to be from the outside interface which I gave a try just in case however that doesn't work as it then sources it from the public IP.
In the workaround the reason that works is because with the commands like http, ssh, snmp-server, etc although you specify the outside interface you are also specifying the IP from which it should work however in the case of RADIUS it's specifying the source interface to use to communicate.
In the workaround they also show that they are getting drops however in our case packet-tracer shows that things are passed. Unfortunately I couldn't get an actual packet capture to work to properly verify this though.
One other thing I did start trying as well was a route based VPN as I wondered with it properly in the routing table and the RADIUS connection set to use routes lookup instead whether that would work however once I established the VPN I could only get it to work from Azure to the Firepower and traffic from the Firepower to Azure failed. It came up with suboptimal route lookup and then resorted to using the public gateway instead. Posting this here in case that's another option that it may be worth resolving as at the moment I put it back to policy based.
Phase: 14
Type: SUBOPTIMAL-LOOKUP
Subtype: suboptimal next-hop
Result: ALLOW
Elapsed time: 465 ns
Config:
Additional Information:
Input route lookup returned ifc azure-vpn-vti is not same as existing ifc outside
Doing adjacency lookup on existing ifc outside
Phase: 15
Type: NEXTHOP-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP
Subtype: Lookup Nexthop on interface
Result: ALLOW
Elapsed time: 1860 ns
Config:
Additional Information:
Found next-hop 91.X.X.1 using egress ifc outside(vrfid:0)
ā12-04-2023 12:50 AM
Just as another test I found some people were suggesting that to perform RADIUS over VPN you should use the diagnostic interface so I've added another subnet to that and added it to the traffic selectors for the VPN and can see an SA for it in Azure however traffic fails to pass on it.
Packet-tracer shows "Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000564fd8242788 flow (NA)/NA" even though I've allowed traffic to and from the diagnostic subnet.
ā12-04-2023 06:55 AM
SUBOPTIMAL-LOOKUP
This issue come from NAT lookup' so your no-nat of ipsec vpn do NAT lookup or not?
Also share
Show route management only
Let see the route in this table.
MHM
ā12-04-2023 07:07 AM
ā12-04-2023 07:14 AM
If management access is OK the inside interface must appear in table.
I still thinking it issue that mgmt-access not work.
For workaround for bug I share before' indeed we use outside but see the acl of vpn it have new entry which have permit host OUT to host Radius
MHM
ā12-04-2023 07:35 AM
There are a few different scenarios in my details though.
1) Access from inside interface which worked for many months prior to the update. Packet tracer shows this passing correctly but the traffic never makes it over the VPN.
2) Attempt to configure routed VPN instead of policy VPN for which the SUBOPTIMAL-LOOKUP relates to so traffic ends up getting sent to WAN rather than through the VTI that's set in the static route.
3) Attempt to use the diagnostic interface to which the route information for management-only relates to. This us what shows in packet tracer as the ACL drop.
ā12-04-2023 07:38 AM
2) Attempt to configure routed VPN instead of policy VPN for which the SUBOPTIMAL-LOOKUP relates to so traffic ends up getting sent to WAN rather than through the VTI that's set in the static route.
This solution' as I mentioned suboptimal is cause by NAT' do you config NAT? If yes why you need NAT?
NAT need only for policy based VPN
MHM
ā12-04-2023 07:48 AM
We configured an UN-NAT policy for the traffic I think just out of habit. Should we remove this?
ā12-04-2023 07:51 AM
We use unnat when traffic IN go OUT and we have NAT apply to OUT
Here with route based VPN
Traffic IN go VTI and there is no NAT in VTI.
What happened the traffic route based on noNAT not based on RIB.
MHM
ā12-04-2023 08:26 AM
Thanks. I think it was actually there because we moved from policy based to route based so that's what threw things. I've removed that rule and traffic now works in both directions on the route based VPN. It did then fail RADIUS still but at least I got traffic which showed me the failure was just as the source changed to the VTI.
Updated the policy to the VTI IP and all works again now.
Thank you!
ā12-04-2023 08:29 AM
You are so welcome
Glad your issue solved
Have a nice day
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide