Remote Access- ASA

Unanswered Question
Aug 21st, 2008

Hi,

Moving from VPN Concentrator to ASA for Remote Access.

I tested the following configuration but no luck, user accounts are created on ACS and cannot get authenticated.... I am missing something still....

==========Remote-Access-Config=======

ip local pool JK 192.168.10.1-192.168.10.150 mask 255.255.255.0

group-policy PAK-TEL internal

group-policy PAK-TEL attributes

wins-server value 192.168.1.100

dns-server value 192.168.1.100

crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map

crypto map outside_map interface outside

crypto isakmp enable outside

crypto isakmp policy 10

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

tunnel-group PAK-TEL type ipsec-ra

tunnel-group PAK-TEL general-attributes

address-pool JK

default-group-policy PAK-TEL

tunnel-group PAK-TEL ipsec-attributes

pre-shared-key *

telnet timeout 1440

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 4 (1 ratings)
Loading.
acomiskey Thu, 08/21/2008 - 13:06

Do you have something like?

access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0

nat (inside) 0 access-list inside_nat0_outbound

Amin Shaikh Thu, 08/21/2008 - 14:20

Yes, I have this...

when I have local-user on ASA ; it works.

But how could the traffic forward to ACS Server...

Premdeep Banga Thu, 08/21/2008 - 14:36

Are you sure, you have something like this on configuration,

aaa-server RADIUS-SERVER protocol radius

aaa-server RADIUS-SERVER () host

tunnel-group PAK-TEL general-attributes

authentication-server-group RADIUS-SERVER

Assuming that you are using Radius protocol for authentication and ACS is configured accordingly.

Try to use following test command to ensure that authentication is working against the ACS server,

test aaa-server authentication host

e.g.,

test aaa-server authentication RADIUS host 1.2.3.4

Regards,

Prem

Amin Shaikh Fri, 08/22/2008 - 01:02

Thanks.

I dont see any failed/passed info under Reports-logging on ACS..

On ACS the following is done

ASA added under AAA client with shared key

Radius authentication

rename group5 on ACS as PAK-TEL

No Luck so far...

Premdeep Banga Fri, 08/22/2008 - 04:56

Renaming Group to PAK-TEL is not required, its only for your management comfort only.

One question, are you able to authentication using the current ACS against any other device ? Or is ASA is the only one that you are trying to authenticate. Could be that ACS is not configured properly, by that I mean "Proxy Distribution Table" is not configured properly.

If this is the first time you are trying to authenticate on ACS, then please enable Passed Reports as it is disabled by default.

The very first thing that should be successful, in order to get VPN users authenticated is, to ensure that the "test aaa...." command is successful from the ASA, if that does not succeed, then no point in testing using VPN client.

Make sure that nothing is blocking the Radius traffic in between i.e b/w ASA and ACS.

What is the result of the test command, is it,

"ERROR: Authentication Server not responding: No error" ?

Or something else ?

Regards,

Prem

Please rate if it helps!

Actions

This Discussion