I've trayed to configure on the asa 8.3 authentication from outside by virtual telnet /proxy-auth/ with radius server inside.
During the try to get access by the outside interface asa on my pc /cmd telnet 10.14.3.280/ can't open a dos window with prompt to logon, after that I have a /my pc - 10.14.32.1/: "C:\>telnet 10.14.32.80 Connecting To 10.14.32.80...Could not open connection to the host, on port 23: C onnect failed"
the same on the asa console a log:
"%ASA-2-106001: Inbound TCP connection denied from 10.14.32.1/1078 to 10.14.32.80/23 flags SYN on interface outside"
co hitcnt to acls:
ciscoasa# sh access-list access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300 access-list IFS_UAUTH_RADIUS; 1 elements; name hash: 0x7e35116f access-list IFS_UAUTH_RADIUS line 1 extended permit tcp any host 10.14.32.80 (hitcnt=0) 0xe61531cc access-list ACL-IN; 1 elements; name hash: 0x44d1c580 access-list ACL-IN line 1 extended permit tcp any host 10.14.32.80 eq telnet (hitcnt=0) 0xc9a1e426
somple configuration from my lab /bolded important/:
There is a bug filed for this problem in ASA 8.3 (CSCth82006) that hasn't been fixed yet. You can try to enable the 'same-security-traffic permit intra-interface' command, which seems to be a workaround for the bug.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :