10-23-2014 04:25 AM - edited 02-21-2020 07:53 PM
Hi
I have a strange issue with anyconnect. Anyconnect is based on radius credientials. When I login through portal it's working correctly, I can connect to vpn without any problems. But when I want to connect directly from anyconnect client it asking for credentials and don't want to connect. Credientials arfe valid.
[2014-10-23 13:04:02] Ready to connect.
[2014-10-23 13:06:20] Contacting 77.65.5.226.
[2014-10-23 13:06:45] Please enter your username and password.
[2014-10-23 13:06:53] User credentials entered.
[2014-10-23 13:07:28] Please enter your username and password.
[2014-10-23 13:22:55] User credentials entered.
[2014-10-23 13:23:49] Please enter your username and password.
[2014-10-23 13:23:55] User credentials prompt cancelled.
[2014-10-23 13:23:55] Ready to connect.
What could cause this issue, do I missed something in configuration?
Thanks in advance
Regards
10-24-2014 04:34 AM
I am guessing you have the following configured for the relevant tunnel-group?
tunnel-group ExampleGroup1 general-attributes
authentication-server-group <SERVER GROUP>
Would you be able to post a sanitised running config for us to look over?
--
Please remember to select a correct answer and rate helpful posts
10-24-2014 05:49 AM
Thanks for response
I guess this is config form ASA, I have anyconnect on 1921 router. Config:
webvpn gateway gateway_1
ip address XXX
http-redirect port 80
ssl trustpoint TP-self-signed-1662321223
inservice
!
webvpn context webvpn
secondary-color white
title-color #669999
text-color black
virtual-template 6
aaa authentication list ciscocp_vpn_xauth_ml_1
gateway gateway_1
!
ssl authenticate verify all
inservice
!
policy group policy_1
functions svc-enabled
svc address-pool "SDM_POOL_1" netmask 255.255.255.255
svc default-domain "XXX"
svc keep-client-installed
--svc split include 192.168.55.0 255.255.255.0
svc split include 192.168.66.0 255.255.255.0
svc dns-server primary 192.168.55.12
svc dns-server secondary 192.168.55.41
default-group-policy policy_1
aaa authentication login ciscocp_vpn_xauth_ml_1 group sdm-vpn-server-group-1 local
10-25-2014 12:01 PM
10-27-2014 07:24 AM
I found issue. In configuration were two radius servers, first of them was unavailable.
Regards
09-13-2017 05:48 AM
Hi,
I am also having the same problem. what was your resolution for this
06-20-2018 12:00 AM
I am sure you would have figured out the issue but I faced the same issue and found my license had expired.
11-08-2018 02:40 PM
I faced same problem. There was an error in the authorization policy on ACS. We use cisco-av-pair and there was a mistake in one rule of de ACL on Radius attribute.
After correct that, client VPN could connect.
09-16-2019 04:22 AM
When I received this same message while attempting to login via VPN, it turned out that I simply needed to reactivate my two-factor authentication account. Once reactivated, I was able to login without issue.
03-04-2021 12:49 AM
I had the same issue with one our client and his AD password were expired. After resetting his password which worked fine.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide