cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
342
Views
0
Helpful
3
Replies

dACL causing RA VPN connection to fail

DannyDulin
Level 1
Level 1

When I attempt to connect via AnyConnect to VPN, I get through authentication, but the ASA never responds that connection is complete.

If I change the dACL to permit IP Any Any, the connection works just fine. However, as soon as I add any other lines in the dACL, the problem happens again. I understand that once I add a line, there is an implicit deny.

What I'm trying to discover here is:

1. Is there something I have to configure in the ASA connection profile (Tunnel-group) to make this work?

2. Is there a line I'm missing in the dACL?

3. Is there something in the Authorization Profile that I'm missing?

1 Accepted Solution

Accepted Solutions

DannyDulin
Level 1
Level 1

Karsten Iwen wrote 

There are different limitations that can apply based on RADIUS and the switch-model:

  • The whole dACL can not exceed 4000 characters as it has to fit into one RADIUS packet.
  • up to 64 lines in a single dACL (you should have far less lines in practice).
  • The total amount of ACEs the switch can store in it's TCAM. That can range from only a few hundreds on the low end switches and a few thousands on the more expensive models. This can often be adjusted by choosing the right SDM-template.

https://community.cisco.com/t5/network-access-control/dacls-in-ise/td-p/2869666

View solution in original post

3 Replies 3

@DannyDulin is the syntax of the DACL correct?

Turn on debugs and provide the output - debug aaa authorization

Thanks Rob.

I think I found the solution. There seems to be a size limit to the dACL. I systematically removed rules until it started to work. I had a lot of spacing and a lot of Remarks, when I adjusted everything connectivity started to work as expected.

 

DannyDulin
Level 1
Level 1

Karsten Iwen wrote 

There are different limitations that can apply based on RADIUS and the switch-model:

  • The whole dACL can not exceed 4000 characters as it has to fit into one RADIUS packet.
  • up to 64 lines in a single dACL (you should have far less lines in practice).
  • The total amount of ACEs the switch can store in it's TCAM. That can range from only a few hundreds on the low end switches and a few thousands on the more expensive models. This can often be adjusted by choosing the right SDM-template.

https://community.cisco.com/t5/network-access-control/dacls-in-ise/td-p/2869666