03-01-2019 02:43 AM - edited 03-01-2019 02:52 AM
Hello All
I'm running two Firepower ASA with the ASA code for AnyConnect VPN Access. The Radius servers are Windows Server 2008r2 and Server 2012r2 with the NPS role. The Active Directory servers were running Server 2012r2 and were now replaced with Server 2019.
Once the new AD servers were running, VPN authentication through the NPS servers broke. Wireless, also authenticated with the same radius servers continued to work.
I got it now working by disabling the flag mschapv2-capable from the NPS servers. For whatever reason, with the new AD servers the authentication always failed with "wrong username or password" while mschapv2-capable was enabled.
Please note, I have password-management enabled.
I don't anymore remember why I have MSCHAPv2-capable enabled, but I think I did that years ago to allow umlaut characters in passwords, which wasn't possible without.
Please also note, the new DC servers had various old encryption variants, like TLS1.0, now disabled.
Anybody else had that experience?
Thanks
Patrick
[edit]
Corrected the text about password management, which is enabled. And I checked my internal logs, I indeed enabled this for allowing öäü and % sign in passwords.
05-08-2019 06:29 AM
I had the same issue and this helped:
05-08-2019 06:48 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide