cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
867
Views
0
Helpful
0
Replies

[Anyconnect] Certificate map error

vtribut01
Community Member

Hi all,

 

I am configuring a VPN based on Anyconnect and I would like to use a certificate-map to split internal and external users into two tunnel groups.

The objective is to redirect internal users (with a certificate signed by a specific CA) to the tunnel-group CP_internal, and all other users to the default tunnel-group.

 

Here is the current configuration:

 

crypto ca certificate map CM_internal 10

 issuer-name attr cn eq MyCompanyCA

crypto ca certificate map CM_default 20

 

webvpn

certificate-group-map CM_internal 10 CP_internal

certificate-group-map CM_default 20 DefaultVPNGroup  

 

tunnel-group CP_internal general-attributes

 authorization-required

tunnel-group CP_internal webvpn-attributes

 authentication certificate

 

tunnel-group DefaultVPNGroup  general-attributes

 authorization-required

tunnel-group DefaultVPNGroup  webvpn-attributes

 authentication certificate

 

When I try to connect with any device I get the message “Certificate Validation Failure”, but if I remove remove the “authorization-required” and “authentication certificate” commands from the DefaultVPNGroup, then I am always redirected to DefaultVPNGroup.

 

Here are few additional information to help troubleshooting:

  • The authentication is not based on certificates in order to allow external users to connect.
  • I added a Trustpoint for the internal CA
  • The “debug crypto ca” and “debug aaa” are very quiet or not relevant.
  • The “debug webvpn” command indicates that the certificate map is taken into account : “Certificate mapping found for webvpn group CP_internal”. I get the same message after removing “authorization-required” and “authentication certificate” commands everywhere.
  • I am asked to choose a personal certificate when trying to connect

 

I was wondering if the feature can work when the authentication itself is not based on certificates but it seems that the certificate is correctly collected according to the logs.

Any thoughts ?

 

Thanks a lot.

0 Replies 0