12-20-2013 10:57 AM - edited 02-21-2020 07:24 PM
Cisco AnyConnect kept getting a “ log in denied. Your environment does not meet the access criteria defined by your administrator” Windows 7 32 or 64 bit
I will appreciate your assistance on this. Any info found on google.com doesn't help me. Please assist.
11-28-2014 06:45 PM
That message is usually caused by a Dynamic Access Policy (DAP) check being configured on the ASA that terminates the VPN having a policy whose criteria your client does not meet. Have you checked the ASA configuration (or asked the admin to do so) to see what policies it is enforcing?
It can also in some cases be caused by a bug in DAP, depending on the version of ASA software. In that case it would affect all AnyConnect users.
11-28-2014 06:46 PM
Hello Marvin,
I had similar kind of issue reported. I do not have DAP with Network ACL being blocked for the reported Users, however i still have few users reporting this kind of issue. While the others are working good. Do you still see this as DAP issue ??
11-30-2014 07:40 PM
Rajtilak,
We'd have to take a look at your configuration to say for sure. Can you share a sanitized version?
12-08-2014 05:44 AM
Marvin
Thanks i couldnt reply in time. My issue has been resolved. The problem was host scan image. User was not using the desired version. However i did not find that in that log.
08-10-2016 10:54 AM
Hi, All
I'm currently having a similar problem:
1) Using AnyConnect I connect to my office network from home (ISP=Bell, WIFI router).
2) Using my office laptop (Win 7, McAfee A.V. corporate) all works well.
3) Using my home laptop (Win 10 home, McAfee A.V. from Bell) all worked well until 2 weeks ago.
4) Using my home laptop (no visible changes) no longer working with the message:
Cisco AnyConnect. Login denied. Your VPN is terminated because either your PC does not meet the security requirements, or your Anyconnect profile is not setup correctly.
I understand that something must have changed somewhere - problem is: how do find what changed and then how to fix it?
It's not always practical/possible to carry the office laptop and I often need to be able to work from home.
Any help would be greatly appreciated.
Gene Kouras
08-10-2016 01:46 PM
Can you check with the admin of your office ASA and see if they have a DAP setup? That's the most likely cause of what you're seeing.
08-10-2016 02:20 PM
Hi, Marvin. Thanks for looking into it.
The problem is that it's impossible to find out in the office - who actually is the admin - you know with all the outsourcing.
So I was hoping that I can diagnose it from my end and find some log - so I can fix my settings by myself.
08-10-2016 04:30 PM
Unfortunately if it is DAP that's causing the problem, the client cannot see why on their own.
That's by design - if we exposed exactly what the ASA policy wanted to the end user then they could do an end run around the security policy by spoofing the desired result.
Even with a DART diagnostics log, you only see things like the following:
Line: 7921
Performing CSD prelogin verification.
Line: 7925
CSD prelogin verification finished with return code 0
08-11-2016 06:18 AM
OK, understood. I'll try to reach out to whoever administers this functionality.
Thanks for you quick response.
Gene
08-25-2016 07:13 AM
Kudos to Martin ^^ Stung me this week
08-07-2020 10:46 PM
12-02-2014 07:54 AM
Hello Josue,
This is happening because as Marvin says you have a DAP policy applied, and if you don,t any DAP configured, go ahead and check if you have the "DfltAccessPolicy" terminating the connections.
Go ahead and attach the following:
- sh run dynamic-access-policy-record
- debug menu dap 2
- debug dap trace
- debug dap error
- Show version
Regards,
David Castro,
11-01-2018 01:02 PM
We ran into the same issue. we tried all that is mentioned in the thread but no luck.
Below is the logs from the ASDM:
4 |
Oct 31 2018 |
22:13:15 |
717037 |
Tunnel group search using certificate maps failed for peer certificate: serial number: 1500000DE24156085FB83864F8000000000DE2, subject name: e=xxxx@yyy.com,cn=xxxx\, xxxx,ou=Users,ou=Accounts,ou=yyyy,dc=yyy,dc=int, issuer_name: cn=yyy-SSCA01A-CA,dc=yyy,dc=int. |
Explanation:
%ASA-4-717037: Tunnel group search using certificate maps failed for
peer certificate: certificate_identifier.
The peer certificate identified by the certificate identifier was processed through the configured certificate maps to attempt a possible tunnel group match, but no match can be found.
Recommended action:
Make sure that the warning is expected based on the received peer certificate and the configured crypto CA certificate map rules.
Solution:
The Kaspersky antivirus was blocking the certificate. Antivirus team did some changes and issue is fixed.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide