Cisco VPN client and error 413 (user authentication failed) with RSA SecurID

I have an ASA 5510 that I use to provide VPN access to my HQ network.  The authentication for the VPN users is handled by an RSA SecurID appliance.  Ever since we started using SecurID for auth (we previously used AD) we've had some issues with the auth failing if you try to connect more than once.

For example, if I connect to VPN it works fine, but if I disconnect and attempt to reconnect, it immediately gives me error 413 - user authentication failed.  If I close the VPN client and relaunch it, it will work again.  This also happens if I launch the VPN client, click connect, press cancel when it prompts for auth, and then click connect again...instead of prompting for auth, it immediately says auth failed.   Again, closing and relaunching the VPN client is all that is needed to resolve the issue, but a lot of our users don't think to try this, so it leads to a lot of calls to the helpdesk.

If we use AD for auth, this problem goes away, so it must be something to do with the SecurID system and the way the ASA talks to it.  We're running version 5.0.00.0340 of the Cisco IPSec VPN client, and the same problem also occurs with version 4.6.  We use the SDI auth protocol between the ASA and SecurID appliance.  We have support agreements for both devices, but Cisco and RSA each say the problem is with the other device.
LVL 3
FWestonAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Cyclops3590Commented:
at my company I know each SecurID OTP changes every minute and can ONLY be used once per minute.  Does your ID change to a different OTP when you log in again?  Try waiting until the OTP changes again without relaunching the client.

you still may want to check your SecurID settings though to see if something is set so you're only allowed to login so many times within a certain amount of time.
0
FWestonAuthor Commented:
Sorry, I guess I wasn't clear.  It does this even if I cancel the connect before putting in a password and then try to reconnect.  The ASA shouldn't even be sending a request for AAA authentication to the SecurID appliance yet, so it's gotta be some kind of Cisco/SDI issue..
0
Cyclops3590Commented:
what do the logs on the ASA say when you move it to debug level and repeat the process.  Sounds like it gets cached.
0
cartoonbabeCommented:
We had the 413 error problem using Cisco VPN version 5.0.0 and versions 4.6 and 4.7.  Cisco recommended we move to version 5.0.03.0560.  That was only part of the solution.  The ASA 5540 concentrators also had to be upgraded to 8.0.4 code.  That eliminated the problem.  What you are describing is exactly what we experienced.  The 413 error appeared when you clicked connect.  Didn't even get prompted for a login and that error message appeared.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
VPN

From novice to tech pro — start learning today.