[Cisco AnyConnect] Certificate on RADIUS authentication
Hello
I use authentication and LDAP authorization certificates and it works fine.
Now, I want to centralize authentication and authorization on the server RADIUS (Cisco ACS in my case)
In the connection profile, we have 3 authentication methods:
- AAA: I can choose RADIUS server group or LDAP--> the user is prompted to enter the username/password credentials
- Certificate: I can't choose AAA server...--> user group will have to provide the certificate
- Both: I choose the RADIUS or LDAP--> the user is prompted for username/password credentials and the user must provide the certificate
If I choose the certificate authentication methods, I can't delegate the authentication and authorization of RADIUS server.
Is there a solution to delegate the authentication of the certificate to the RADIUS?
I have different authorization for each VPN connection profile rules
ASA can send a VPN connection profile to the RADIUS? (in the RADIUS attribute...)
Thanks for your help,
Patrick
Patrick,
The essential in deployments using WLC is begging on client can talk to EAP (including EAP - TLS) so the AAA server can authenticate the certificate.
In the case of Anyconnect, or old IPsec client there is no way to send the full cert to server AAA (not implemented/redundant from the point of view of the customer, or not in the standard).
IOS also gives you a possibility to make calls for authorization of PKI:
AFAIR is no similar mechanism on the SAA.
M.
Tags: Cisco Security
Similar Questions
-
Cisco AnyConnect Client - specify the certificate store in profile
Hi all
Running Cisco AnyConnect Client version 2.5.2019 with Cisco ASA 5510 version 8.4 (1)
I can't get the work certificate (see attached picture) store profile option. I put this to the user, when it is set correctly it spreads to the customer as you can see in the file of configuration on the client computer, but it does not seem to enter into force.
When a user is connected which has admin rights, and thus access to two local stores machine and the user must correctly a certificate store of the local computer. I know that there is a valid certificate in the store of users for these users as if I delete the local cert machine it takes so the cert of the user.
No problem for users without admin rights they do not have access to the local computer store.
Someone has any ideas why this doesn't work?
Jason
Hi Jason
It seems that the ASA is actually still push the old profile to the client.
From the CLI, check:
cache dir: / SC/profiles
more cache: / SC / profiles /.
I guess this will show you the old profile.
How do you have it change exactly? Using the profile in ASDM Editor? You push 'applies' later, do you have errors?
In any case, use "disk0 more:" to verify that the profile on flash is correct (i.e. that there not the serverlist), then force the ASA to re - load this file using:
conf t
WebVPN
SVC profiles disk0: /.Then check "hide: / stc / profiles /" once again to check it took it.
HTH
Herbert
-
authentication with Cisco anyconnect
Hello world
With client anyconnect, how is managed authentication via the web portal? It is dependent on the Explorer (= logoff window) or IP address?
Authentication can invoke an external server (AD or LDAP) to be able to add users or groups?
concerning
Hello
For anyconnect, you will define a tunnel-group. You can set the authentication server in the tunnel group. By default, the authentictaion is made with the local database.
tunnel-group hillvalleyvpn general-attributes
authentication-server-group < authentication server name>
Hope this helps.
Regards,
AnishaP.S.: please mark this thread as answered if you feel your query is resolved. Do rate helpful posts.
-
AnyConnect and Aladdin eToken authentication
Hi all!
First part
I managed the Anyconnect VPN installation in our c2821 using MS Active Directory & Cisco Secure ACS v.4.2 authentication Radius Server for windows clients.
I have successfully install authentication in Windows using Aladdin eToken and logon Samrtcard (connector Microsoft's CA) certificate.
I have successfully the Microsoft certification authority certificate store of eToken.
I would like someone to answer the following questions: How can I use this certificate to authenticate the session on AnyConnect VPN?
Second part
I tried to customize local AnyConnect profile using Cisco AnyConnect Profile Editor. The only result: changed default username and default host. All other customizations have been ignored.
Here is my profile:
one
omitted omitted
omitted
false
true
false
All
true
Native
false
false
false
true
DisconnectOnSuspend
false
HardwareToken
SingleLocalLogon
LocalUsersOnly
false
Automatic
false
Anyone have any ideas?
Hello
You can control the parameters of AnyConnect session only if the activated/enabled 'controllable user' administrator for each XML attribute. For those that are controllable from the user, the user must be able to click on the 'Settings' button very close the list box drop-down server.
However, if you manually change the XML file on the local computer of the client, the next time AnyConnect connect, it will download the original version of the ASA and compares with local XML file. If the checksum does not match, it overrides the local XML file with the newly downloaded XML file.
You can change the preferences.xml file, and that you have discovered, AnyConnect will honor your changes. But the profile has most of the security settings as a Local Lan access, start before logon, Auto reconnection.
Thank you
Kiran
-
IPsec VPN with Cisco AnyConnect and 1921 ISR G2 router
Hello
Is it possible to establish a remote access VPN IPSec using Cisco Anyconnect client with router Cisco ISR G2 1921.
If someone does share it please the sample configuration. as I've been on this topic since last week a.
My Cisco rep recommended I have not try AnyConnect a router ISR or ASR. So I used an Open Source client. Don't say that AnyConnect won't work, just the route I took on my project. I work good known configuration for a 1921 with strongSwan as a Client. It is with IPSEC and IKEV2 using certificates for authentication.
-
Setup for use with Cisco Anyconnect VPN IPsec
So, I had trouble setting up VPN on our ASA 5510. I would use IPsec VPN so that we don't have to worry about licensing issues, but what I have read you can do with and always use Cisco Anyconnect. My knowledge on how to set up VPN especially in iOS version 8.4 is limited, so I've been using a combination of command line and ASDM.
I am finally able to connect from a remote location, but once I log in, nothing else works. What I've read, you can use IPsec for client-to-lan connections. I use a pre-shared for this. Documentation is limited on what should happen after have connected you? Shouldn't be able to local access on the vpn connection computers? I'm trying to implement work. If I have VPN from home, should not be able to access all of the resources at work? According to me, because I used the command-line as ASDM I confused some of the configuration. In addition, I think that some of the default policies are confused me too. So I probably need a lot of help. Here is my current setup with the changed IP address and other things that are not related to deleted VPN.
NOTE: We are still testing this ASA and is not in production.
Any help you can give me is greatly appreciated.
ASA Version 8.4 (2)
!
ASA host name
domain.com domain name
!
interface Ethernet0/0
nameif inside
security-level 100
the IP 192.168.0.1 255.255.255.0
!
interface Ethernet0/1
nameif outside
security-level 0
IP 50.1.1.225 255.255.255.0
!
interface Ethernet0/2
Shutdown
No nameif
no level of security
no ip address
!
interface Ethernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
No nameif
security-level 100
IP 192.168.1.1 255.255.255.0
!
boot system Disk0: / asa842 - k8.bin
passive FTP mode
DNS domain-lookup outside
DNS server-group DefaultDNS
!
permit same-security-traffic intra-interface
!
network of the NETWORK_OBJ_192.168.0.224_27 object
subnet 192.168.0.224 255.255.255.224
!
object-group service VPN
ESP service object
the purpose of the tcp destination eq ssh service
the purpose of the tcp destination eq https service
the purpose of the service udp destination eq 443
the destination eq isakmp udp service object
!
allowed IP extended ip access list a whole
!
mask 192.168.0.225 - 192.168.0.250 255.255.255.0 IP local pool VPNPool
no failover
failover time-out period - 1
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 645.bin
don't allow no asdm history
ARP timeout 14400
NAT (inside, outside) static source any any static destination NETWORK_OBJ_192.168.0.224_27 NETWORK_OBJ_192.168.0.224_27 non-proxy-arp-search to itinerary
!
the object of the LAN network
NAT dynamic interface (indoor, outdoor)
Access-group outside_in in external interface
Route outside 0.0.0.0 0.0.0.0 50.1.1.250 1
Sysopt noproxyarp inside
Sysopt noproxyarp outdoors
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec ikev2 ipsec-proposal OF
encryption protocol esp
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 proposal ipsec 3DES
Esp 3des encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES
Esp aes encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES192
Protocol esp encryption aes-192
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 AES256 ipsec-proposal
Protocol esp encryption aes-256
Esp integrity sha - 1, md5 Protocol
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
Crypto ca trustpoint ASDM_TrustPoint0
registration auto
name of the object CN = ASA
Configure CRL
crypto ca server
Shutdown
string encryption ca ASDM_TrustPoint0 certificates
certificate d2c18c4e
864886f7 0d06092a c18c4e30 308201f3 3082015c a0030201 d 020204 2 0d 010105
0500303e 3110300e 06035504 03130741 53413535 3130312a 2 a 864886 30280609
02161b 41 53413535 31302e64 69676974 616c 6578 7472656d 65732e63 f70d0109
3131 31303036 31393133 31365a 17 323131 30303331 39313331 0d 170d 6f6d301e
365a303e 3110300e 06035504 03130741 53413535 3130312a 2 a 864886 30280609
02161b 41 53413535 31302e64 69676974 616c 6578 7472656d 65732e63 f70d0109
6f6d3081 9f300d06 092 has 8648 86f70d01 01010500 03818d b 30818902-00-818100-2
8acbe1f4 5aa19dc5 d3379bf0 f0e1177d 79b2b7cf cc6b4623 d1d97d4c 53c9643b
37f32caf b13b5205 d24457f2 b5d674cb 399f86d0 e6c3335f 031d54f4 d6ca246c
234b32b2 b3ad2bf6 e3f824c0 95bada06 f5173ad2 329c28f8 20daaccf 04c 51782
3ca319d0 d5d415ca 36a9eaff f9a7cf9c f7d5e6cc 5f7a3412 98e71de8 37150f02
03010001 300 d 0609 2a 864886 f70d0101 05050003 8181009d d2d4228d 381112a 1
cfd05ec1 0f51a828 0748172e 3ff7b480 26c197f5 fd07dd49 01cd9db6 9152c4dc
18d0f452 50f5d0f5 4a8279c4 4c1505f9 f5e691cc 59173dd1 7b86de4f 4e804ac6
beb342d1 f2db1d1f 878bb086 981536cf f4094dbf 36c5371f e1a0db0a 75685bef
af72e31f a1c4a892 d0acc618 888b53d1 9b 888669 70e398
quit smoking
IKEv2 crypto policy 1
aes-256 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 10
aes-192 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 20
aes encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 30
3des encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 40
the Encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
Crypto ikev2 activate out of service the customer port 443
Crypto ikev2 access remote trustpoint ASDM_TrustPoint0
Crypto ikev1 allow outside
IKEv1 crypto policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 10
Console timeout 0
management-access inside
SSL-trust outside ASDM_TrustPoint0 point
WebVPN
allow outside
AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
AnyConnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 2
AnyConnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 3
profiles of AnyConnect VPN disk0: / devpn.xml
AnyConnect enable
tunnel-group-list activate
internal VPN group policy
attributes of VPN group policy
value of server WINS 50.1.1.17 50.1.1.18
value of 50.1.1.17 DNS server 50.1.1.18
Ikev1 VPN-tunnel-Protocol, l2tp ipsec ikev2 ssl-client
digitalextremes.com value by default-field
WebVPN
value of AnyConnect VPN type user profiles
always-on-vpn-profile setting
privilege of xxxxxxxxx encrypted password username administrator 15
VPN1 xxxxxxxxx encrypted password username
VPN Tunnel-group type remote access
General-attributes of VPN Tunnel-group
address (inside) VPNPool pool
address pool VPNPool
LOCAL authority-server-group
Group Policy - by default-VPN
VPN Tunnel-group webvpn-attributes
enable VPN group-alias
Group-tunnel VPN ipsec-attributes
IKEv1 pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
class-map ips
corresponds to the IP access list
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
Review the ip options
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
inspect the http
class ips
IPS inline help
class class by default
Statistical accounting of user
I would recommend buy AnyConnect Essentials. The cost of the license is nominal - list of US $150 for the 5510. (piece number L-ASA-AC-E-5510 =)
Meawwhile you can use the Cisco VPN client inherited with IKEv1 IPSec remote access VPN using profiles *.pcf.
I believe you can also use the client Anyconnect client SSL or DTLS transport access remotely (non-IPsec) without having to buy the license Anyconnect Essentials for your ASA focus.
As an aside, note that if you want to use AnyConnect Mobile (e.g. for iPhone, iPad, Android, Blackberry etc.clients) you will also get the additional license for it (L-ASA-AC-M-5510 =, also price US $150)
-
Cisco Anyconnect and Aladdin eToken
Hello
I want to authenticate Clients on an ASA5510 (8.4. () (2)) with a certificate on an Aladdin eToken.
If I connect with the browser (IE), everything works fine, the eToken software requires the certificate and the password and downloads the client profile. AnyConnect-connection is established.
If I connect directly with the AnyConnect Client (ver. 3.0.4235) no certificate will be used and so it has an Errormessage "no valid certificate available for authentication.
Client is Win7, but the same problem on Windows XP with full admin rights
It seems that the Anyconnect Client cannot find the certificate store.
Any idea?
Thank you.
It is not just with Aladdin eToken, same problem with certificate of local (.pfx) Standard Microsoft software installed in the certificate store
You have configured the profile XML doc section to reference the certificate?
-
CISCO ANYCONNECT VPN CISCO VPN CLIENT
Hi, I was in the process of configuring cisco anyconnect vpn for ip phones to our local obtained the license for them either, the question that I get is that I already have remote configured cisco connect via the old cisco vpn client.
now, if I activate the anyconnect ssl on the same outside the interface both can exist without conflict or maybe I need to migrate users to install the end customer for anyconnect system software to connect.
I also need help with authentication of certification.
concerning
You can run both VPN at the same time without problems.
However, you should try and migrate everyone to the latest technology Anyconnect SSL anyway.
-
Hello world
I want to implement RADIUS authentication for my companies Cisco devices. Could someone give me some examples of configuration of how to point my switches and routers on a RADIUS server, and also to try RADIUS authentication. Only by using a locally configured account if RADIUS fails?
My undertsnading would be to use the following configuration;
AAA new-model
AAA authentication login default local radius group
start-stop radius group AAA accounting network default
RADIUS RADIUS-server host 1.1.1.1 key auth-port 1812 acct-port 1813
RADIUS server retransmit 3
Thanks in advance,
Dan
Hello Dan,.
your configuration seems to be OK...
more information you can find here
-
RADIUS authentication question
Hello world
I'm learning the Radius Authentication. Here are my updated laboratory in place:
R1 (107.107.107.10)-(107.107.107.4) - WIN2008 (RADIUS SERVER)
Here is the config of RADIUS on the R1:
AAA authentication login default local radius group
RADIUS-server host 107.107.107.4 auth-port 1645 acct-port 1646
key cisco RADIUS serverI have a few questions:
(1) above, I do not specify encryption on R1, R1 will use this as the default encryption?
In the attached file, we see the password is encrypted, but there is no config on R1 to use particular encryption
(2) we also see "authenticator", which is I think is R1 host name i.e encrypted with the shared secret. I'm wrong?
Much appreciated and have a great weekend!
Hello
The Protocol Radius encrypts the password for the default user. I think that Radius uses MD5.
The authenticator is a random string generated by the client and is used in the encryption of the password process.
Thank you
John
-
WLAN 4402 for Radius Authentication
Hi guys,.
Please help me on how I can install my WLAN 4402 controller for Radius Authentication, if you have links or procedures that you can share, which will be very appreciated. :-)
Thanks in advance.
It depends on if you are using Cisco ACS or Windows IAS. Controller configuration is the same but the side RADIUS is different.
Also what you are trying to configure, systems users, PEAP etc. through RADIUS
PEAP via ACS is here
PEAP via IAS is here
Hope that helps
-
Using CHAP with RADIUS authentication
Hello
I configured a Cisco 877 router to send the RADIUS requests when a user connects to the console (Console line) or VTY Line using the following configuration:
AAA new-model
Group AAA authentication login default RADIUS
Group AAA authentication ppp default of RADIUS
RADIUS-server host 10.0.0.1 auth-port 1812 acct-port 1812 mysharedkey key
When I connect the RADIUS packets I see the Cisco router sends the initial AccessRequest using PAP.
How can I configure my router to send it's original AccessRequest package with CHAP?
My apologies if this has already been discussed, I searched high and low for an answer.
Thanks in advance.
John
Hi John,.
PPP connection supported by CHAP because a configuration command to activate the CHAP protocol as Protocol of stimulus / response. However, the Console VTY connections and to THE will always go on PAP when using RADIUS authentication. There is no command to activate the CHAP protocol for these types of connections.
Best regards.
-
What VPN Cisco IOS VPN and RADIUS client?
Hello community,
My company are trying to set up the remote user VPN for all of our external collaborators to the help of our existing Cisco router and a RADIUS server in Active Directory.
I did all the AAA config on the router and set up the RADIUS, but I do not know what customer buy Cisco Remote and how to set up.
Anyone who knows this set upwards or it uses can be me help please we don't lose our money (and my boss time!)?
Thanks in advance.
Paul
Paul,
AnyConnect lets connect you using IKEv2/IPsec and SSLVPN for IOS network head.
There are countless examples of configuration.
Alternatively, some clients of IKEv1/IPsec 3rd party exists and are able to connect, however is those who are not TAC (Cisco) supported. You can check the feature called ezvpn
M.
-
VPN Site to Site Secret shared and can co-exist RADIUS authenticated VPN?
Hello
I have a setup VPN site to site between two offices on 515Es PIX (v.6.2 software) and has recently added a vpngroup/shared secret based VPN remote access to one of the offices. Given that just forced me to add a number of different policies to my existing crypto card, it was a plant direct and easily implemented. For more security, I want to use a RADIUS server to give to each remote user their own connections and profiles rather than a group on all password is configured. To do this, however, it seems that I have to add the following additional commands to my existing crypto card:
client configuration address map mymap crypto initiate
client card crypto mymap RADIUS authentication
These do not correspond to the policy number (my site-to-site is 10, and remote access policy is political 20), so I don't know what the effect would be if I added the. It would cause my connection from site to site for authentication RADIUS request (a very bad thing)? If so, do I need another interface to bind a new encryption card to? The answer to this would be greatly appreciated!
Also, if anyone knows an example configuration for a similar configuration, I can look at, please let me know! Thank you.
-A.Hsu
For the site to site connection, you change line isakmp keys and add the parameters of "No.-xauth No.-config-mode" at the end of this one, which tells the PIX not to do the auth RADIUS or assign an IP address, etc. for the specific site-to-site tunnel.
Example of config is here:
http://www.Cisco.com/warp/public/110/37.html
Note that there is no command options I have just said, I just sent an email to the web guys to fix this. Basically, your config will look with the options "No.-xauth No.-config-mode" on the line «isakmp x.x.x.x key...» "for LAN-to-LAN tunnel.
-
Cisco AnyConnect secure mobility Client - totally lost Newbie
We currently have an ASA 5505 Firewall VPN configured services. The system runs ASA Version 9.0.0 and ADSDM 7.0.2. I installed the 'Cisco AnyConnect none mobility Client' Version 3.1.01065 on my PC to Windows 7 Ultimate. When I try to connect to my VPN service I ge the following message is displayed:
Security Warning: no reliable VPN server certificate! AnyConnect cannot check the VPN server: XXX.XXX. XX. XX
Certifiate does not match the name of the server
Certificate comes from an untrusted source.
Certificate is not identified for this purpose.
Without buying a certificate from a 3rd party provider, is it possible to record a 'self' generated by certificate to get rid of this message? If so, are there any "detailed" (e.g., simplified or not in the language of Cisco-eeze) instructions on how to configure the firewall to 'push' the certificate to the VPN client, so the message doesn't look for the user?
I can have wrongly assumed your never worked WHAT VPN remote access.
By comparing your error message with that I get when I tell my client to block connections to untrusted servers shows I get a unique, different warning screen (below). I suspect you may have more than just the question aside customer. You can share your configuration?
Maybe you are looking for
-
Satellite L300-256 - webcam not working no-presentation of black color.
Hello I use laptop model Toshiba L300-256 and my web cam worked for a few months and today I opened it and it seems there have stopped working. CHICONY USB 2.0 webcam As a first step, it shows that "some application prevents his work." So I uninstall
-
HP Envy 17-2110en: could not find a recovery media? No Solution don't Please HELP!
Hi guys,. I have HP Envy 17 - 2110en LS594EA I lost my dvd recovery and accidentally deleted the recovery partition. Now, I find anywhere the recovery media. Hp support on the drivers section page there is no recovery media. How can I manage this pro
-
long pull down the menu with no vertical scroll bar
People, It's been 3.5 years ago when we had to learn that there is no way to have a long drop down menu control without a vertical scroll bar. See http://forums.NI.com/NI/board/message?board.ID=170&message.ID=217428&query.ID=395029#M217428 Now, after
-
Cisco Catalyst 6509 and 6513 running config backup to their respective disk0: / Script
We use a Cisco Catalyst 6509 and 6513 switches in our network LAN and Man. Please help me and share the script to take backup of all respective running to their disk0 configuration switches: / per week. Kind regards Vinay
-
Hello Looking for advice on the page 'Custom HTTP Response' - its possible to display the reason why access to the site is blocked! as: site you are trying to visit is in the prohibited category "nameonfcategory".