Link to home
Start Free TrialLog in
Avatar of CoKzoo
CoKzooFlag for United States of America

asked on

Cisco ASA SSL VPN produces 2 webpages

We have our ASA using the Anyconnect VPN and it seems to be working fine. If you navigate to the IP address of our ASA's Outside interface, we get the correct login screen. It asks for the Username, Password and to choose a Group. I have it setup to use our Radius server for authentication. I can type in my Active Directory credentials and it logs me in and checks for the Anyconnect client on my PC.

We moved forward with registering a FQDN for this EXACT same IP address, but when we try and user this FQDN, the ASA brings up a different webpage. This webpage only has a Username and Password field. There is no option to select a VPN Group. If I try and use my AD credentials, it fails authentication.

I confirmed that the FQDN is using the correct IP by pinging it.

Has anyone seen this before?
Avatar of geergon
geergon
Flag of Costa Rica image


OK lets do this:

Connect using the IP and the FQDN:

And check the the status of the connection:
show vpn-sessiondb svc
(the idea is to check the group-policy and the tunnel-group selected)

is the name of the ASA as the FQDN?

Also try to do this:
"revert webvpn all"


ASKER CERTIFIED SOLUTION
Avatar of CoKzoo
CoKzoo
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of CoKzoo

ASKER

Resolved my own issue.