Hello,
I'm trying to configure ASA 5515-X as authenticator for VPN RA connections. ASA device + switches are on-prem.
DC and RADIUS are on Windows Server 2016 installled as VM in Azure.
I have working 'Route based' site-to-site VPN tunnel with Azure (VTI interface). I can reach this VM on Azure (ping, rdp, etc..).
My problem is that i can't set up AAA Server on ASA. In Radius configuration window, there is no option to choose VTI interface.
I found similar topic here: https://community.cisco.com/t5/vpn/radius-via-azure-vpn/m-p/3803634
,but in my scenario i don't have public IP assigned to Radius server. I'm trying to set Radius with 'Outside' interface and local IP of Radius on Azure.
I have static route to network with WinServer VM.
I’ve added command: management-access outside , but this won't help - in ASDM, ASA says that management interface can't be with lowest security level. In config i have line with management-access outside, so ASA accept it.
Radius has configured 'ASA client' with my public (IP of 'Outside' interface).
I know from other topic, that this connection is possible but i'm running out of ideas.
Can anybody help me?
Kind Regards,
Damian