Cisco Adaptive Security Appliance Software Version 8.4(1)
Device Manager Version 6.4(1)
We have an ASA 5505 on all our sites. The ASA is connected to a secondary ISP for redundancy. It has an IPSec VPN connection back to HQ.
Issue: We have TACACS and FreeRADIUS implemented on a server back at HQ. I will add in a rule to the INSIDE interface that allows tacacs and radius respectively. When I test my tacacs authentication, its successful. When I go to test my radius, it fails. Both services are on the same server. I have moved the radius ACL up to the top of the ACL list, still not working. I have added a rule in my crypto map, still not working. Packet tracer just says an implicit rule is denying but it wont say which one. I'm at a loss. It seems it has to do with UDP protocol for radius because Tacacs works fine. I have added rules all over the place and it has been denied.
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...