01-13-2021 01:25 PM
Hello,
Openned a case for this but though someone might now the answer.
Later, when ISE issues CoA, it sends it to DUO Proxy and it seems like DUO proxy doesn’t know what to do with it and just drops it. It never forwards it to ASA. I did a packet capture on DUO Proxy and I see that it actually receives it.
I guess one possible way would be for ASA to send request to ISE and ISE send to DUO Proxy… Unfortunately, in my case, ISE has to do primary authentication, and I don’t think I can use [duo_client_only] in this scenario.
Any ideas on how to make DUO Proxy forward CoA to ASA or if there is a way to make it work so when ISE sends CoA it actually gets to the ASA?
01-19-2021 08:15 AM
I was able to get this type of configuration working by putting ISE in the path between the ASA and the Duo Proxy. ISE is configured to forward RADIUS requests to the Duo Proxy in the Auth policy. The Duo Proxy then process the AD lookup and the user gets the push auth. Duo sends the result back to ISE which then is configured to continue for an Authz match.
Configure External RADIUS Servers on ISE
I found that implementing SAML was a more elegant solution. I found the following Cisco TAC documentation to be helpful. Depending on your enviornment this may be an option.
Integrate Duo SAML SSO with Anyconnect Secure Remote Access using ISE Posture
11-30-2021 12:52 PM
Hi GaryUsyk, but in this case, the order of the servers is changed. Is there any option that Duo “proxies” the CoA to the NAS/NAD? In the case we are reviewing, there’s no option to put the ISE in front of Duo
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide