ISE Admin Access Authentication to RADIUS Token Server

Hi all!
I want to use an External  RADIUS Token Server for ISE Admin Access Authentication and Authorization.
Authentication works, but how do I map the users  to Admin Groups? Is there a way  to map a returned RADIUS Attribute  (IETF "Class" or Cisco-AVPair "CiscoSecure-Group-Id") to an Admin Group?
Thanks in advance,
Michael Langerreiter

ISE 1.3 does have an bug: Authentication failed due to zero RBAC Groups.
Cisco Bug: CSCur76447 - External Admin access fails with shadow user & Radius token
Last Modified
Nov 25, 2014
Product
Cisco Identity Services Engine (ISE) 3300 Series Appliances
Known Affected Releases
1.3(0.876)
Description (partial)
Symptom:
ISE 1.3 RBAC fails with shadow user & Radius token
Operations > Reports > Deployment Status > Administrator Logins report shows
Authentication failed due to zero RBAC Groups
Conditions:
RBAC with shadow user & Radius token
View Bug Details in Bug Search Tool
Why Is Login Required?
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
Full Description (including symptoms, conditions and workarounds)
Status
Severity
Known Fixed Releases
Related Community Discussions
Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.

Similar Messages

  • ISE admin access, authentication against external radius

    Please don't ask me why,
    the customer insists and wants to be authenticated on ise (as admin) against an external (microsoft) radius server
    is it possible while retaining internal admin users database in a sequence Internal>external_radius or internal>AD ?
    thank you in advance for whatever may help

    According to Cisco:
    External Authentication AND external Authorisation for Admin acces son the ISE can only be done by using LDAP or AD.
    For Radius Servers there are a solution for external Authentication and internal Authorisation on the ise:
    External Authentication + Internal Authorization
    When configuring Cisco ISE to provide administrator authentication using an external RSA SecurID identity store, administrator credential authentication is performed by the RSA identity store. However, authorization (policy application) is still done according to the Cisco ISE internal database. In addition, there are two important factors to remember that are different from External Authentication + External Authorization:
    You do not need to specify any particular external administrator groups for the administrator.
    You must configure the same username in both the external identity store and the local Cisco ISE database.
    To create a new Cisco ISE administrator that authenticates via the external identity store, complete the following steps:
    Step 1 Choose Administration > System > Admin Access > Administrators > Local Administrators.
    The Administrators window appears, listing all existing locally defined administrators.
    Step 2 Follow the guidelines at Creating a New Cisco ISE Administrator to ensure that the administrator username on the external RSA identity store is also present in Cisco ISE. Be sure to click the External option under Password.
    Note Remember: you do not need to specify a password for this external administrator user ID, nor are you required to apply any specially configured external administrator group to the associated RBAC policy.
    Step 3 Click Save .

  • ISE Admin Access Authentication against multiple AD/LDAP Identity Sources

    Hi all!
    We would like to grant admin cccess to our ISE deplyoment to users stored in multiple Active Directories. Since there is no trust relationship between these ADs, we created an LDAP Identity Source for each AD and also an Identity Source Sequence but in the UI we can only select one Identity Source.
    Any ideas how to solve this problem?
    Thanks in advance!
    Kind regards,
    Michael Langerreiter

    I did check in my lab and yes for admin access we can't select identity store sequence in authentication. We can only pick one external database. However, on the login page you may select the appropriate database before you enter the username and password.
    Jatin Katyal
    - Do rate helpful posts -

  • ACS 4.2 RDBMS Action 105/108 - How to set to something other than default "RADIUS Token Server"

    I'm trying to create an import script for RDBMS to import users, but cannot figure out how to set the "PASS_TYPE_RADIUS_TOKEN" to something other than the default of "RADIUS Token Server".  We have multiple RADIUS Token Server definitions.
    I can create a user with what I need, except external db password is set to "RADIUS Token Server".  How do I set it to (for example) something like "RADIUS Token Server - xxxx"
    We have more than 1 RADIUS Token Server definition called "RADIUS Token Server - xxxx", "RADIUS Token Server - yyyy". 
    Thanks!

    As per my knowledge you have to update 4.2 ACS to
    5.1, because when you go for RDBMS synchronization it wont allow you, I have faced problem in past while primary ACS was 4.1 and secondary I have 4.2, I have updated primary ACS to 4.2 and everything is working fine.

  • Identity Service Engine (ISE) Admin Access

    Is it possible to authenticate the ISE administrator via an external Radius Server? The option I find is that it will not work, 
    The manual reads: 
    In Cisco ISE, you can authenticate administrators via an external identity store such as Active Directory, LDAP, or RSA SecureID. There are two models you can use to provide authentication via an external identity store:
    Is this the case ?

    Sure you can!
    Make sure you have the RADIUS server added to the ISE (Administration > Identity Management > External Identity Sources  Select RADIUS Token from the left menu).
    Then head over to Administration > System > Admin Access.  Change the * Identity Source to your RADIUS Server and click Save
    Log out and you will see an new entry on the log in screen.  Click the dropdown for Identity Source and choose your RADIUS Server.  If this connection gets dropped for any reason, you can always log in using the internal identity source as a fallback.
    Please Rate Helpful posts and mark this question as answered if, in fact, this does answer your question.  Otherwise, feel free to post follow-up questions.
    Charles Moreton

  • Unsucessful ACS to RADIUS token server exchange

    Hello team:
    We are getting a hard time in trying to make our ACS 4.2 talk to an external FreeRadius token server.
    When our ACS sends the Access-Request message, our FreeRadius token server answers with an Access-Accept message with zero atributes on the message. This answer, according to ACS documentation, should be perfectly accepted by ACS when it works as a RADIUS client. However, our ACS considers this answer as an error and so the transaction fails.
    In order to compare with another platform working of radius server of our , we replaced our FreeRadius token server by another CS ACS. With this scenario, everything works! So we sniffed the ACS to ACS transaction and found that two RADIUS attributes are sent with the Access-Accept message:
    (1) Framed-IP = 255.255.255.255
    (2) Class = 0x434143533a302f356662622f37663030303030312f31383133
    We got back to our FreeRadius as the external RADIUS server of our ACS, and managed it to generate and return exactly the previous kind of message to the ACS working as radius client, however when our ACS receives the RADIUS Access-Accept with these attributes, it still rejects the answer and fails.
    So we are missing something.
    ¿Did anyone manage to make ACS query an external RADIUS server with success? We would appreciate any hints!!
    thank you very much in advance
    Rogelio Alvez
    Argentina

    Thanks for the interest Tarik!
    Here you have the debug from both sides ACS 4.2 and Freeradius in the same authentication event:
    ACS Debug from a terminal monitor
    2w1d: AAA/AUTHEN/CONT (4096347873): continue_login (user='(undef)')
    2w1d: AAA/AUTHEN (4096347873): status = GETUSER
    2w1d: AAA/AUTHEN (4096347873): Method=radius (radius)
    2w1d: AAA/AUTHEN (4096347873): status = GETPASS
    2w1d: AAA/AUTHEN/CONT (4096347873): continue_login (user='camara/829113')
    2w1d: AAA/AUTHEN (4096347873): status = GETPASS
    2w1d: AAA/AUTHEN (4096347873): Method=radius (radius)
    2w1d: RADIUS: ustruct sharecount=1
    2w1d: RADIUS: Initial Transmit tty7 id 175 192.168.0.3:1645, Access-Request, len 86
    2w1d:         Attribute 4 6 C0A800CB
    2w1d:         Attribute 5 6 00000007
    2w1d:         Attribute 61 6 00000005
    2w1d:         Attribute 1 15 63616D61
    2w1d:         Attribute 31 15 3139322E
    2w1d:         Attribute 2 18 893A4B64
    2w1d: RADIUS: Received from id 175 192.168.0.3:1645, Access-Reject, len 32
    2w1d:         Attribute 18 12 52656A65
    2w1d: RADIUS: saved authorization data for user 80E8A88C at 0
    2w1d: AAA/AUTHEN (4096347873): status = FAIL
    2w1d: AAA/AUTHEN/ABORT: (4096347873) because Invalid password.
    2w1d: AAA/MEMORY: free_user (0x80E8A88C) user='camara/829113' ruser='' port='tty7' rem_addr='192.168.0.202' authen_type=ASCII service=LOGIN priv=1
    2w1d: AAA: parse name=tty7 idb type=-1 tty=-1
    2w1d: AAA: name=tty7 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=7 channel=0
    2w1d: AAA/MEMORY: create_user (0x80E8B920) user='' ruser='' port='tty7' rem_addr='192.168.0.202' authen_type=ASCII service=LOGIN priv=1
    2w1d: AAA/AUTHEN/START (2072451976): port='tty7' list='pepe' action=LOGIN service=LOGIN
    2w1d: AAA/AUTHEN/START (2072451976): found list pepe
    2w1d: AAA/AUTHEN/START (2072451976): Method=radius (radius)
    2w1d: AAA/AUTHEN (2072451976): status = GETUSER
    Freeradius Debug
    rad_recv: Access-Request packet from host 192.168.0.3 port 3912, id=23, length=94
        User-Name = "camara/829113"
        NAS-IP-Address = 192.168.0.3
        NAS-Port = 6372
        NAS-Identifier = "CiscoSecure ACS v4.2(0.124)"
        User-Password = "\277\241\340t\312/\2303^;\216\233\3618\2179"
    # Executing section authorize from file /etc/freeradius/sites-enabled/vuserver
    +- entering group authorize {...}
    ++[preprocess] returns ok
    [auth_log]     expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/192.168.0.3/auth-detail-20120714
    [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/192.168.0.3/auth-detail-20120714
    [auth_log]     expand: %t -> Sat Jul 14 18:42:32 2012
    ++[auth_log] returns ok
    [IPASS] Looking up realm "camara" for User-Name = "camara/829113"
    [IPASS] Found realm "DEFAULT"
    [IPASS] Adding Stripped-User-Name = "829113"
    [IPASS] Adding Realm = "DEFAULT"
    [IPASS] Authentication realm is LOCAL.
    ++[IPASS] returns ok
    [suffix] Request already proxied.  Ignoring.
    ++[suffix] returns ok
    ++[files] returns noop
    ++[control] returns noop
    rlm_perl: Response: 201: Succeeded
    rlm_perl: Added pair User-Name = camara/829113
    rlm_perl: Added pair User-Password = \277\241\340t\312/\2303^;\216\233\3618\2179
    rlm_perl: Added pair NAS-Identifier = CiscoSecure ACS v4.2(0.124)
    rlm_perl: Added pair Realm = DEFAULT
    rlm_perl: Added pair Stripped-User-Name = 829113
    rlm_perl: Added pair NAS-Port = 6372
    rlm_perl: Added pair NAS-IP-Address = 192.168.0.3
    rlm_perl: Added pair Class = 0x434143533a302f3265662f37663030303030312f31383133
    rlm_perl: Added pair Framed-IP-Address = 255.255.255.255
    rlm_perl: Added pair Auth-Type = Perl
    ++[perl] returns ok
    ++[expiration] returns noop
    ++[logintime] returns noop
    Found Auth-Type = Perl
    # Executing group from file /etc/freeradius/sites-enabled/vuserver
    +- entering group Perl {...}
    rlm_perl: Added pair User-Name = camara/829113
    rlm_perl: Added pair NAS-Identifier = CiscoSecure ACS v4.2(0.124)
    rlm_perl: Added pair User-Password = \277\241\340t\312/\2303^;\216\233\3618\2179
    rlm_perl: Added pair Realm = DEFAULT
    rlm_perl: Added pair NAS-IP-Address = 192.168.0.3
    rlm_perl: Added pair NAS-Port = 6372
    rlm_perl: Added pair Stripped-User-Name = 829113
    rlm_perl: Added pair Framed-IP-Address = 255.255.255.255
    rlm_perl: Added pair Class = 0x434143533a302f3265662f37663030303030312f31383133
    rlm_perl: Added pair Auth-Type = Perl
    ++[perl] returns ok
      WARNING: Empty post-auth section.  Using default return values.
    # Executing section post-auth from file /etc/freeradius/sites-enabled/vuserver
    Sending Access-Accept of id 23 to 192.168.0.3 port 3912
        Framed-IP-Address = 255.255.255.255
        Class = 0x434143533a302f3265662f37663030303030312f31383133
    Finished request 3.
    Going to the next request
    Waking up in 4.9 seconds.
    Cleaning up request 3 ID 23 with timestamp +575
    Ready to process requests.
    Inside the file archive.zip you`ll find
    cap_freeradius.cap (communication sniffed between the ACS and the Freeradius)
    captura2acsOK.pcapng (communication sniffed between the ACS 1 and the ACS 2 where everything its ok)
    If you need more information or output please let me know.
    Rogelio

  • ISE Admin Access with AD Credentials fails after upgrade 1.2.1 to 1.3.0

    Hello,
    After upgrading ISE VM from 1.2.1 to 1.3.0.876, I can't connect on ISE with AD Credentials (Invalid Username or Password). It worked find before upgrading to 1.3.
    On another ISE VM in 1.3.0.876 version (w/o upgrade) with this kind of configuration, it's OK.
    I have double check the Post-upgrade tasks (particularly rejoining Active Directory). Everything worked find after this upgrade except the admin access with AD credentials.
    I don't use user certificate-based authentication for admin access. So I didn't execute application start ise safe CLI.
    My 802.1x wireless users passed authentication with AD credentials. So the ISE had correctly join my AD.
    I didn't find anything related to this admin access with AD credentials failure in the output of show logging application ise and show logging.
    I don't find anything related to this in bug search on Cisco tools.
    I tried to :
    - update the SID of my Admin AD Group, the result is still the same.
    - delete my admin access with AD credentials configuration then make this configuration again, but still the same error.
    Any ideas on this ? Could I find elements in another log ?
    Regards.

    Dear Markus,
    After logging as user "prdadm"
    su - prdadm
    bssltests% bash-3.00$ ls -a
    .                            .dbenv_bssltests.sh-old      .sapenv_bssltests.sh         startdb.log
    ..                           .dbenv_bssltests.sh-old10    .sapenv_bssltests.sh-new     startsap_.log
    .bash_history                .dbsrc_bssltests.csh         .sapenv_bssltests.sh-old10   startsap_DVEBMGS00.log
    .cshrc                       .dbsrc_bssltests.sh          .sapsrc_bssltests.csh        startsap_DVEBMGS01.log
    .dbenv_bssltests.csh         .login                       .sapsrc_bssltests.sh         stopdb.log
    .dbenv_bssltests.csh-new     .profile                     dev_sapstart                 stopsap_.log
    .dbenv_bssltests.csh-old     .sapenv_bssltests.csh        local.cshrc                  stopsap_DVEBMGS00.log
    .dbenv_bssltests.csh-old10   .sapenv_bssltests.csh-new    local.login                  stopsap_DVEBMGS01.log
    .dbenv_bssltests.sh          .sapenv_bssltests.csh-old    local.profile                trans.log
    .dbenv_bssltests.sh-new      .sapenv_bssltests.csh-old10  sqlnet.log
    bash-3.00$
    bash-3.00$
    I have changed envt settings in .dbenv_bssltests.csh & .dbenv_bssltests.sh
    .sapenv_bssltests.sh & .sapenv_bssltests.csh  [4 files]
    Regards,
    Ankita

  • Configuring Cisco ISE for Authorization with External Radius Server attribute

    Hi,
    I'm trying to integrate an external radius server with Cisco ISE.
    I created an External Identity Store>Radius Token Server.
    I created a Identity Store sequence with just one identity store just as creadted above.
    And I was able to authenticate successfully.
    But when it comes to authorization.
    I observed we just have one tab named Authorization while creating Radius Token server.
    And it always refers to ACS:attribute_name.
    If I want to define a IETF radius attribute, (lets say class with attribute id as 25), how could I do it.
    In Cisco ACS we have a direct entry option in authorization tab where we can define the radius (IETF) attribute within Radius token server creation (within radius token server>Directory attribute tab).
    How ever I try to define the IETF attribute here (class,IETF:Class) I am not able to authorize with this attribute value.
    I tried with just one single authorization rule where it could hit.But observed it to go the default(as none of the rules defined matches the condition).
    Can anyone guide me how can we define a IETF radius attribute for authorization within Cisco ISE and what policy could we set it to work as authorization.
    Thanks in advance
    Senthil K

    This is the step of Creating and Editing RADIUS Vendors
    To create and edit a RADIUS vendor, complete the following steps:
    Step 1 From the Administration mega menu, choose Resources > RADIUS  Vendors.
    The RADIUS Vendors page appears with a list of RADIUS vendors that ISE  supports.
    Step 2 Click Create to create a new RADIUS vendor or click the radio  button next to the RADIUS vendor that
    you want to edit and click Edit.
    Step 3 Enter the following information:
    • Name—(Required) Name of the RADIUS vendor.
    • Description—An optional description for the vendor.
    • Vendor ID—(Required) The Internet Assigned Numbers Authority  (IANA)-approved ID for the
    vendor.
    • Vendor Attribute Type Field Length—(Required) The number of bytes  taken from the attribute value
    to be used to specify the attribute type. Valid values are 1, 2, and 4.  The default value is 1.
    • Vendor Attribute Size Field Length—(Required) The number of bytes  taken from the attribute value
    to be used to specify the attribute length. Valid values are 0 and 1.  The default value is 1.
    Step 4 Click Submit to save the RADIUS vendor.

  • 802.1x ACS RSA Secure ID/Safeword Token server

    Hello, We are trying to impliment wireless scurity in our network. We want to issue badges with attached tokens so clients can come into our office and login to our wireless network, They would then be prompted for their login and password which would be their Badge ID an their token credentials.
    We are using an airespace wireless security device, We specify ACS as the 802.1x radius server. Airespace is sending the requests to ACS just fine but ACS does not seem to like what it's seeing. We also imported a custom VSA vendor file for the airespace wireless security device. The log below reflects this.
    We have tested by creating local ACS users, and authentication works and we can get onto our network. But when we specify the AAA servers as our Radius Token Server, Set the unknown user DB to that Server and test auth, We are not granted permission to our WLAN. It's as if Cisco does not recognize the PEAP auth information and rejects it by default. We ARE required to get this working with XPSP1, as we would hate to have to install software on every clients laptop.
    A wireless client of ours DID work when we specified EAP-GTC on the client side, But it will never work when we specify PEAP on the client side, We never seem to see communications from ACS to our Safeword token server regardless of what we do(including the successful EAP-GTC login). Our radius strings are correct etc. Safeword is listening on 1812, But also has protols EASSP-1/2 listening on ports we have set manually(are these relevant to our needs?)
    The failed attempts log show "External DB Auth Failed"
    Here is a snip of the CSRadius/RDS.log when we try to auth, when we sniff traffic we see the eap request and the radius reject on the wire, but we never see ACS ask the token server. If anyone can make any suggestions on how we could troubleshoot further/test or make forward progress in any way please do. Thank you all in advance.
    Cisco RDS log attached.

    The problem could be with your Secure ID RSA server.

  • Authenticated on ISE 1.2 (as admin) against an external radius server

    Hello
    Our customer wants to be authenticated on ISE 1.2 (as admin) against an external radius server (like ACS not microsoft). How could i do that ?
    Is it possible while retaining internal admin users database in a sequence "external_radius or internal"
    thank you in advance.
    Best regards

    External authentication is supported only with internal authorization:
    External Authentication + Internal Authorization
    When configuring Cisco ISE to provide administrator authentication using an external RSA SecurID identity store, administrator credential authentication is performed by the RSA identity store. However, authorization (policy application) is still done according to the Cisco ISE internal database. In addition, there are two important factors to remember that are different from External Authentication + External Authorization:
    You do not need to specify any particular external administrator groups for the administrator.
    You must configure the same username in both the external identity store and the local Cisco ISE database.
    To create a new Cisco ISE administrator that authenticates via the external identity store, complete the following steps:
    Step 1 Choose Administration > System > Admin Access > Administrators > Local Administrators.
    The Administrators window appears, listing all existing locally defined administrators.
    Step 2 Follow the guidelines at Creating a New Cisco ISE Administrator to ensure that the administrator username on the external RSA identity store is also present in Cisco ISE. Be sure to click the External option under Password.
    Note Remember: you do not need to specify a password for this external administrator user ID, nor are you required to apply any specially configured external administrator group to the associated RBAC policy.
    Step 3 Click Save .

  • How to configure AD and Token server (over radius) authentication

    Dear forum,
    I have a scenario where users should be allowed network access after their have given their AD credentials and a token (Blackshield Token server).
    The token server speaks over radius to the cisco ACS appliance. I have managed to get users authenticated by means of their AD credentials. I am how ever not able to use both means in order to have a successfull authentication.
    Does anyone have a configuration example for this scenario? Any help would be greatly appreciated.
    Thanks!!!

    Hi,
    I have had two deployments using this form of authentication.
    Just so we are on the same page, the token servers that I have integrated connect to an Active Directory server running NPS (MS radius), then the user will have to send their password+token and the token software will check the account password, and then the token to see if the users succeeds.
    Let me know if that is the design of your software. If it is, then all you need to do is configure the token software to run on radius and then set the policies up from there. From the network device standpoint it just needs to point to the radius server.
    Thanks,
    Tarik Admani
    *Please rate helpful posts*

  • Cisco Prime Infrastructure 2.1 GUI authentication via RADIUS server (Cisco ISE 1.2 integrated with AD)

    Hi,
    I want to access Cisco PI 2.1 GUI using my AD credentials, so on PI I've enabled RADIUS AAA Mode and added RADIUS servers (two ISE nodes in our case). On ISE I added PI as RADIUS client and configured the same keys. Next, on ISE I created authorization profile PRIME_ADMIN_ACCESS with only attribute settings defined:
    My authentication and authorization rules relating that case are as on following screenshots:
    So when I open GUI of PI and enter my AD credentials to log in I have no success and I receive following message:
    Looking in ISE's Authentication section I can see following:
    Time difference between these two authentication/authorizations is just 25 msecs and clicking on each of them reveals following:
    So at first I can authenticate and authorize (authorization profile has necessary attributes defined for PI management access (NCS:role0=Root, NCS:virtual-domain0=ROOT-DOMAIN)) and after 25 msecs I am getting failure. So what could be cause of such things and how I can successfully log in to PI GUI authenticating via ISE using AD credentials?

    Hi,
    -- Please Go to Administration > Logging > set the Message level to TRACE > Click save
    -- Then try to add the ISE.
    -- Once it fails, collect the logs from Administration > Logging > 
    check the "ncs-0-0.log"  & search the file for "ERROR" & paste the results here. This will give us exact reason.
    - Ashok
    Please rate the post or mark as correct answer as it will help others looking for similar information

  • Using Windows Network Policy Server to authenticate Prime Infrastructure 1.2 admin access

    Dear all,
    How can I authenticate admin access to the Prime infrastructure 1.2 using AAA mode RADIUS with Windows Network Policy Server as RADIUS server? I find some information using ACS as RADIUS server but cannot find how to for Windows NPS.
    I try to configure the NPS but an error prompted when logging in to PI using an account in the NPS server, "No authorization information found for Remote Authenticated User. Please check the correctness of the associated task(s) and Virtual Domain(s) in the remote server"
    Thanks for your help.
    Dennis

    Ok, I was able to resolve this over the weekend.  The actual fix is a little complicated.  You can find the full explination here: http://technologyordie.com/windows-nps-radius-authentication-of-cisco-prime-infrastructure
    The basics are that Prime (1.3 is the version I am using at this point) expects two AV pairs from radius.  They are as as follows:
    NCS:role0=Admin
    NCS:virtual-domain0=ROOT-DOMAIN
    "Admin" is the name of the group you would like your users to have access at and "ROOT-DOMAIN" is the name of the domain you would like them to have access to.
    For TACACS+ I suspect the AV Pairs are going to be the same but I have not been able to test that.

  • ACS5.2 with Radius to RSA token server

    I have a test lab with the eval version of ACS5.2. I am running 802.1x on my switch to the ACS usinf radius and want to use my RSA token server to authenticate my users. I have setup my RSA server under "Radius Identiny Servers" in the external identity stores section of the ACS5.2. I have only selected this RSA server in access policies -> identity. When I plug in my 802.1x enabled laptop into the switch I can see the packets going to my ACS but I cannot see any communication from my ACS to the RSA server. And the error I get in the ACS is 22056 Subject not found in the applicable identity store(s). . It works fine with AD. Any reason why the ACS is not talking to the RSA token server?

    It looks like the RSA token server is not one of the identity stores used by the authentication policies you set up, I would start troubleshooting by looking at them and see what identity store or identity store sequence they are using.

  • Remote Access VPN authentication through RADIUS

    Hi,
    I have configured remote access VPN (IPsec) in my Cisco ASA . Before there was only single username & password to for VPN client. Now I am planning to give access through RADIUS server. I have configured RADIUS server in WIN 2003 server.
    Server configuration:
    1) Administrative Tools > Internet Authentication Service and right-click on RADIUS Client to add a new RADIUS client with ip address of CISCO ASA (inside interface).
    2) Remote Access Policies, right-click on Connections to Other Access Servers, and select Properties.
    3) check Grant Remote Access Permissions is selected.Click Edit Profile and check these settings:On the Authentication tab, check Unencrypted authentication (PAP, SPAP), MS-CHAP,and MS-CHAP-v2.On the Encryption tab, ensure that the option for No Encryption is selected.Click OK when you are finished.
    4.Select Administrative Tools > Computer Management > System Tools > Local Users and Groups, right-click on Users and select New Users to add a user into the local computer account.Add a user and check this profile information:On the General tab, ensure that the option for Password Never Expired is selected instead ofthe option for User Must Change Password.
    On the Dial-in tab, select the option for Allow access
    ASA configuration:
    aaa-server vpn protocol radius
    aaa-server vpn host 10.155.20.25 (RADIUS server IP )
    key cisco321
    tunnel-group vpnacc type ipsec-ra
    tunnel-group vpnacc general-attributes
    authentication-server-group vpn
    but it is not working. Please guide to resolve this issue.
    Regards,
    som

    Also, take a look at your logs on the windows server, and try debugging the asa. Try running wireshark or network monitor on the windows server to see if the requests are coming in. You should be able to figure out pretty quickly what is going on by debugging aaa on the asa and/or checking the logs on the server. Make sure the service is running on the windows box. Make sure that something stupid like windows firewall isnt blocking the connection. You can turn on debugging by typing "debug aaa" and type "logging console debugging" and "term mon". You can test aaa by typing "test aaa-server authentication vpn host x.x.x.x username someusername password somepassword"
    Hopefully this will lead you in the right direction. Oh, one more thing, when you are done, don't forget to turn off the debug by typing "undebug all". Another word of warning, running debugs on a production firewall should be done at your own risk, it is very easy to overwhelm a device to the point it stops responding by running debugs.

Maybe you are looking for

  • How to store text field data from web dynpro application in pcd ?

    Hi Forum, I am new to web Dynpro. I want to store user specific data (a text field value) from a wd application in PCD and access it every time the user runs the application.How can I achieve this? Thanks, Mickey.

  • Itunes cannot connect to iTunes store error 306

    Hi, I think I originally posted this on the wrong forum. So I will repost and hope for the best. Up until recently I used to connect to the internet via airport and everything worked fine. I could connect to iTunes store no problem. The connection wa

  • Can't  translate a selfmade Cube with MouseTranslate!

    hello, 1st i'm very new to java3d, so please forgive me my unexpierience. Why is it impossible to translate (via MouseTranslate) the cube in the middle of the view? MouseRotation seems to be work fine. (i hope the pasted code is not to much, feel fre

  • An error occurred while burning the disc.

    I tried to burn some stuff onto a DVD today with my PowerBook. Here's the info on the burner: MATSHITA DVD-R UJ-845E: Manufacturer: MATSHITA Model: MATSHITA DVD-R UJ-845E Revision: DMP2 Serial Number: Drive Type: CD-RW/DVD-RW Disc Burning: Apple Supp

  • Hundreds of Duplicate Embedded Fonts in PDF Makes it HUGE

    Hello! I have a document (word docx file) that is over 150+ pages long. When I print to Adobe Acrobat Pro - it crashes. When I open the document in Preview, it looks fine - but after saving the file as a PDF, the file size is HUGE (over 250+ mb in si