cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3231
Views
0
Helpful
0
Comments
dhr.tech1
Spotlight
Spotlight

Introduction

In this blog we will configure Remote Access VPN on cisco ASA with authentication using Certificate but Authorization using ISE via Active Directory.

Video lab demo: https://youtu.be/UJWUk3ria88

Certificate based authentication in conjunction with Anyconnect VPN, the certificate authentication process terminates on the ASA. Since the ASA terminates the authentication process without passing the certificate to ISE, So when the request comes to ISE it tries to process a full authentication.  There is no password in the TCP packet, thus authentication fails.

Thus, we need to bypass Authentication on the ISE for such communication.

 

dhrtech1_0-1681647323481.pngdhrtech1_1-1681647334262.png

 

TOPOLOGY

dhrtech1_2-1681647390482.png

Below is the pre-Build configuration for ASA.

dhrtech1_3-1681647419673.png

Task 1: Certificate Based Authentication

Step 1 of 3: Install the Root CA certificate into ASA

dhrtech1_4-1681647505651.png

Step 2 of 3 – Setup Tunnel Group

!

tunnel-group sales.w365.vpnet.com type remote-access
tunnel-group sales.w365.vpnet.com general-attributes
address-pool sales
default-group-policy GroupPolicy_sales.w365.vpnet.com
tunnel-group sales.w365.vpnet.com webvpn-attributes
authentication certificate
group-alias sales.w365.vpnet.com enable

!

dhrtech1_5-1681647567323.png

 

Step 3 of 3 – Setup Tunnel Group

!

group-policy GroupPolicy_sales.w365.vpnet.com internal
group-policy GroupPolicy_sales.w365.vpnet.com attributes
wins-server none
dns-server value 192.168.111.5
vpn-tunnel-protocol ikev2 ssl-client ssl-clientless
group-lock value sales.w365.vpnet.com
split-tunnel-policy tunnelspecified
split-tunnel-network-list value split-acl
default-domain value cisco.com
split-dns value cisco.com
address-pools value sales
webvpn
anyconnect keep-installer installed
anyconnect profiles value sales.w365.vpnet.com_client_profile type user
always-on-vpn profile-setting

!

Testing

•User Attempt to connect

dhrtech1_6-1681647627256.png

•Certification Based Authentication is performed.

dhrtech1_7-1681647655306.png

•User is successfully connected.

dhrtech1_8-1681647690656.png

Task 2: Setup Authorization

•Task 2: Part 1- Setup ASA for Authorization

Part 1: Step 1 of 2 -Setup ASA for Authorization

•Following extra configuration must be added into ASA

!

aaa-server ISE protocol radius

 interim-accounting-update

aaa-server ISE (management) host 192.168.111.6

 key *****

!

Part 1: Step 2 of 2 -Setup ASA for Authorization

!

tunnel-group sales.w365.vpnet.com type remote-access

tunnel-group sales.w365.vpnet.com general-attributes

 address-pool sales

 authorization-server-group ISE

 default-group-policy GroupPolicy_sales.w365.vpnet.com

 authorization-required

tunnel-group sales.w365.vpnet.com webvpn-attributes

 authentication certificate

 group-alias sales.w365.vpnet.com enable

!

 

•Task 2: Part 2- Setup ISE for Authorization

Part 2: ISE: Step 1 of 6

dhrtech1_9-1681647819105.png

 

Part 2: ISE: Step 2 of 6

•Perform Active Directory Integration and fetch the AD Groups.

dhrtech1_10-1681647857027.png

dhrtech1_11-1681647872930.png

Part 2: ISE: Step 3 of 6

•Create right Authorization Profile

dhrtech1_12-1681647912046.png

 

 

Part 2: ISE: Step 4 of 6

•Create Access Policy

dhrtech1_13-1681647947315.png

Part 2: ISE: Step 5 of 6

•Authentication Policy

dhrtech1_14-1681647989399.png

 

Part 2: ISE: Step 6 of 6

•Authorization Policy

dhrtech1_15-1681648023802.png

 

Packet Capture Analysis

dhrtech1_16-1681648061251.png

Packet 1: 

dhrtech1_17-1681648088662.png

Packet 2:

dhrtech1_18-1681648138486.png

Packet 3:

dhrtech1_19-1681648162676.png

Packet 4: 

dhrtech1_20-1681648188030.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: