Solved

Cisco Router with Radius authentication for VPN with ASA in the middle

Posted on 2014-02-18
1
52 Views
Last Modified: 2015-12-10
Hello,

I have an interesting situation which I have not seen before. Maybe someone can help. We have a Cisco 2921 with IOS 15.1 connected to the internet on Gi0/0. The 2921 is doing NAT as that is the border router.

Gi0/1 of the 2921 is connected to a Cisco ASA 5505 on Eth0/0 (outside). Eth0/1 of ASA is connected to a Layer 3 switch (3750).

This is a very common deployment scenario. Now the problem:

We are using a radius server behind the ASA on the inside interface to authenticate our VPN users. VPN termination is NOT done on the ASA instead on the 2921. ASA is running in routed mode.

The interesting thing I am noticing is when Windows Server 2008 receives an authentication request from the router, the source address in the packet capture is the ASA's inside address. So obviously the server responds back to that address with success however that request never reaches the router. The 2921 keeps waiting for a response from Radius and then times out.

However if i ping from the 2921 to this Radius server and check the packet capture using Wireshark, the source ip on the packet is correct (2921's gi0/1). Since the ASA is not doing NAT (no nat-control) looks like somewhere on the ASA there is a problem.

We don't have any outbound ACL's on the ASA and for testing I opened up everything using permit ip any any and still the same result. Since ping's can reach from the 2921 to the radius server, i did rule out ACL.

Thoughts?
0
Comment
Question by:bbwonders
1 Comment
 
LVL 12

Accepted Solution

by:
Henk van Achterberg earned 500 total points
ID: 39872519
This is indeed weird behaviour. When you run the packet capture on the ASA itself do you see if the packets are sent back?

Can you post a sanitized config of your ASA?

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/110117-asa-capture-asdm-config.html

https://supportforums.cisco.com/docs/DOC-17814
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

There are many useful and sometimes not well documented or forgotten IOS or ASA/PIX commands. See IPE article here , there was also one on PacketU and on Cisco Tips & Tricks. Below are my favorites. I give also a few most often used for Cisco IPS an…
Overview The Cisco PIX 501, PIX 506e, ASA 5505 and ASA 5510 (most if not all of this information will be relevant to the PIX 515e but I do not have a working configuration handy to verify the validity) are primarily used within small to medium busi…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now