03-06-2018 12:51 PM - edited 03-12-2019 05:05 AM
Running the latest 9.6.x code with the updated anyconnect clients. We use Centrify as our MFA cloud vendor. The local radius server is also Centrify. It is talking to the inside interface of the Asa 5508-X.
Our Anyconnect profile is set to use split-tunnel.
When trying to use MFA, any response that we try to put in the anyconnect client MFA box, doesn't seem to be transmitted back.
Example, I can select "SMS Text" in the MFA box, I get a text, click on the link on my phone Centrify webpage says "authorized", but the anyconnect vpn client doesn't finish the login process.
If I change my Anyconnect Client profile to "Tunnel all", then everything works, Google Authenticator, SMS Text message.
For MFA to work with anyconnect, do I have to have "tunnel all"? My testing seems to prove that.
reason we want split-tunnel is to allow external users to 1) use their bandwidth to stream video/audio 2) to print to wired and wireless devices on the local network.
What am I missing here?
03-06-2018 02:15 PM
That is strange. The Split-tunnel setting should not really matter here because it only takes effect after a successful connection attempt. Till that point, you are still not connected to the VPN, so you do not receive any routes from the ASA to install on your client machine. I did not see Centrify mention any restrictions on their page. I have also not seen other MFA vendors require this.
From your symptoms, it looks like you receive the challenge/response from Centrify but your MFA server never notifies the ASA or the ASA never notifies the end client. Can you share a sanitized config and output of "debug radius all" when you test this?
03-07-2018 12:27 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide