SSL VPN SSO with AD/LDAP

Hello

I wonder if it is possible to have SSL VPN users sign on to Active Directory, instead of (ASA) VPN gateway.

Sending a link, if the scenario is possible would be appreciated.

Thank you

Mike

Yes, it is possible.

Here is the sample configuration for your reference:

http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a008067e9ff.shtml

Hope that helps.

Tags: Cisco Security

Similar Questions

  • SSL VPN problems with Internet Explorer

    Well, first of all, you need 64-bit to run Internet Explorer web based VPN devices in the SA500 series (we use SA540). After that we thought that out, we cannot always past SSL VPN Client install on client computers. It keeps reloading the Web page or simply nothing at all. Any ideas?

    In addition, that the CA guys do you use SSL VPN? GoDaddy certificates are not compatible, as I just discovered the hard way.

    Hi Qasim,

    The question seems to be more localized with windows blocks everything. I actually spent much time working on this yesterday to finally make it work with a 64 bit vista and a window 7 64 bit machines.

    The few details that I did have some success;

    Tools-> Internet Options-> security-> trust Sites

    • Move down
    • Disable protected mode
    • Click sites, and then add the SSL VPN page to become a member of trust
    • When adding the trusted site, uncheck 'require a server secure for all sites in this zone.

    Tools-> Internet Options-> Advanced-> Security section

    • Select "Allow downloads to run or install even if the signature is not valid"

    In addition, you must download Microsoft Visual C++ Distribution 2010 and ensure that you are running the latest version of Java.

    These are the things I had to do to allow Windows to allow me to connect. I hope it has some help for you.

    -Tom

  • SSL VPN - ASA - Active Directory LDAP

    Hello

    Scenario: ASA 8.0 (3) running SSL VPN for remote users. LDAP also authenticates access and connect to the ASA.

    For some reason any (we had a power failure, but the problem may be caused by other reasons as well), I can not connect to the ASA, as my login ID does not work, and remote users get connection error when trying to authenticate via SSL VPN web gui.

    I have rebooted the ASA and AD without any change in the situation. This service worked very well before and the problem happened suddenly. No one has all the changes for the configs. Customer do not have a backup configuration. Any suggestion on what would be the best next action to solve this problem? I'm not expert on the Microsoft LDAP configuration, and if anyone knows where I can check in Microsoft windows server 2003 for the possible LDAP problem, that would be greatly appreciated.

    Thank you

    rdianat

    the ldap bind account is just a normal user account. He didn't need even administrative permissions. If you want to use ldap for password changes he needs to password change permissions, but otherwise just a normal user account - make sure it cannot be locked in AD or the password never expires none of this things. you will see the name of the ldap account in the config of the SAA.

    LDAP-login-password *.

    LDAP-connection-dn *.

  • ASA SSL VPN problem with 8.2 (2)

    Hello everyone,

    I have a couple of ASA 5520 image 8.2 (1) running in active failover mode / standby.

    A few months ago, I downloaded the 8.2 (2) on the cisco website and charge to the ASA.
    After loading the new image, they called me for problems
    functioning of the application of webvpn.

    The web app seems to work, but in a mode of read-only, because you could not

    change the content of the files.

    I couldn't find a way to make it work, so I decided to downgrade to 8.2 (1).
    and as I loaded it the old image, the problem disappeared.

    Now I see that it is available the image 8.2 (3).
    To avoid the risk of hard work I tetsted on a piece of spare 5510, and with the disappoint, I found
    the problem was the same.

    Everyone is facing such a problem or can suggest me how to solve?

    Thanks in advance.

    Marco.

    Can you please provide more details about what application does not work through WebVPN interface without client?  Have you tried to activate Smart Tunneling for this application?

  • Cisco ASA AnyConnect SSL VPN - certificates + token?

    Hello

    I'm looking for an answer is it possible such configuration:

    The Cisco AnyConnect SSL VPN service with two-factor - first method is the Microsoft CA certificate local and second method - a token solution Symantec VIP password?

    I don't know if two-factor authentication is user/password from Active Directory + OTP by Symantec VIP there is no problem, because you can send the user + pass with Radius, but with certificates I do not really understand who will check the validity of the certificate, which certificate, we will send you to the RADIUS for the validation server and how the configuration of the point of view of ASA will look like.

    Thank you very much for the help!

    Hi Alex,

    I don't see a problem with having certificate + token to connect to the VPN. Certificate authentication must be performed on the SAA, see an example below:

    https://supportforums.Cisco.com/blog/152941/AnyConnect-certificate-based-authentication

    Authentication token can be specified as primary/secondary (authentication SDI) on the SAA, an example below:

    http://www.Cisco.com/c/en/us/TD/docs/security/vpn_client/AnyConnect/anyconnect31/Administration/Guide/anyconnectadmin31/ac11authenticate.html#pgfId-1060345

    It may be useful

    -Randy-

  • SSL VPN on license 1900 series

    Hello

    I bought a 1921-SEC-k9 so I installed the Security license:

    Technology for the Module package license information: "c1900".

    -----------------------------------------------------------------

    Technology-technology-package technology

    Course Type next reboot

    ------------------------------------------------------------------

    IPBase ipbasek9 ipbasek9 Permanent

    Security securityk9 Permanent securityk9

    given none none none

    Now, I would like to know if SSL VPN comes with this license or I have to buy an additional license of SSL VPN to use? If Yes... I had just use IPsec... I need to Setup client-to-site... can you point me to a tutorial or just a Basic... as for ipsec config, I just find tutorials from site to site on the internet.

    Hello Luka

    By this document, it will continue to work until a realod... If the router realods the function under the terms of evaluation license will stop working

    http://www.Cisco.com/en/us/prod/collateral/routers/ps10616/white_paper_c11_556985_ps10536_Products_White_Paper.html

    Harish.

  • Order SSL VPN with Cisco Cloud Web Security

    We have implemented Cisco Cloud Web Security with the connector of the ASA and transfer all traffic port 80 and 443 to the Tower of the CCW. We have enabled HTTPS inspection, and I was wondering if there was anything, we can add in the configuration that would allow us to control (allow/block) SSL VPN?

    #Clientless SSL VPN is not supported with Cloud Security Web; don't forget to exempt all SSL VPN traffic without client service ASA for Cloud Web Security Strategy.

    Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/gu...

  • ASA SSL VPN with RSA authentication

    All those implemented SSL VPN on a device of the ASA using remote Securid tokens? The technical sheets indicate native RSA can be used for authentication, but this works with SSL VPN?

    Thank you

    Try this link

    http://www.Cisco.com/en/us/products/ps6120/prod_release_note09186a0080688004.html

  • Setting up an SSL VPN with Windows 7 Pro

    I recently replaced the client with a system Win7 Pro laptop, and I need to configure the VPN. They had on the previous system, WinXP and OpenVPN establish the tunnel. I would use built in features if possible VPN Win7, but I can't seem to find
    all SSL options that would be corralate with the OpenVPN config. How can I set up a SSL VPN connection in WIn7?

    I recently replaced the client with a system Win7 Pro laptop, and I need to configure the VPN. They had on the previous system, WinXP and OpenVPN establish the tunnel. I would use built in features if possible VPN Win7, but I can't seem to find
    all SSL options that would be corralate with the OpenVPN config. How can I set up a SSL VPN connection in WIn7?

    All I KNOW is not possible. You must install an OpenVPN client on the Win 7 machine. In the past I used the OpenVPN for Windows GUI, although its quite old now and I cannot say if it will run on Windows 7. There is also the normal OpenVPN client...

    http://OpenVPN.NET/index.php/open-source/downloads.html MS - MVP Windows Desktop Experience, "when everything has failed, read the operating instructions.

  • Router WAN double with SSL VPN inaccessible for customers

    I have a configured in a Dual WAN setup Cisco 888. There is an ADSL link connected to the VLAN 100 and a SDSL link associated with the Dialer0. The customer wishes to use the ADSL link to the normal navigation and external SSL VPN users to complete on the SDSL connection. I tried to configure the link failover for the ADSL SDSL.

    What works:

    -Access to the Internet for clients the

    What does not work:

    -The ADSL SDSL connection failover.

    -Access SSL VPN for customers. Surf to the external IP address will cause only a page by default HTTP. Specification webvpn.html results in a 404 not found error.

    Here is my configuration:

    version 15.0

    no service button

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    host name x

    !

    boot-start-marker

    boot-end-marker

    !

    logging buffered 51200 warnings

    enable secret 5 x

    !

    AAA new-model

    !

    !

    AAA authentication login local sslvpn

    !

    !

    !

    !

    !

    AAA - the id of the joint session

    iomem 10 memory size

    !

    Crypto pki trustpoint TP-self-signed-3964912732

    enrollment selfsigned

    name of the object cn = IOS - Self - signed - certificate - 3964912732

    revocation checking no

    rsakeypair TP-self-signed-3964912732

    !

    !

    TP-self-signed-3964912732 crypto pki certificate chain

    self-signed certificate 03

    x

    quit smoking

    IP source-route

    !

    !

    IP dhcp excluded-address 192.168.10.254

    DHCP excluded-address IP 192.168.10.10 192.168.10.20

    !

    DHCP IP CCP-pool

    import all

    network 192.168.10.0 255.255.255.0

    default router 192.168.10.254

    DNS-server 213.75.63.36 213.75.63.70

    Rental 2 0

    !

    !

    IP cef

    no ip domain search

    property intellectual name x

    No ipv6 cef

    !

    !

    udi pid CISCO888-K9 sn x license

    !

    !

    username secret privilege 15 ciscoadmin 5 x

    username password vpnuser 0 x

    !

    !

    LAN controller 0

    atm mode

    Annex symmetrical shdsl DSL-mode B

    !

    interface Loopback1

    Gateway SSL dhcp pool address description

    IP 192.168.250.1 255.255.255.0

    !

    interface Loopback2

    Description address IP VPN SSL

    IP 10.10.10.1 255.255.255.0

    route PBR_SSL card intellectual property policy

    !

    interface BRI0

    no ip address

    encapsulation hdlc

    Shutdown

    Multidrop ISDN endpoint

    !

    ATM0 interface

    no ip address

    load-interval 30

    No atm ilmi-keepalive

    PVC KPN 2/32

    aal5mux encapsulation ppp Dialer

    Dialer pool-member 1

    !

    !

    interface FastEthernet0

    switchport access vlan 100

    !

    interface FastEthernet1

    !

    interface FastEthernet2

    !

    interface FastEthernet3

    !

    interface Vlan1

    LAN description

    IP address 192.168.10.254 255.255.255.0

    IP nat inside

    IP virtual-reassembly

    IP tcp adjust-mss 1300

    !

    interface Vlan100

    Description KPN ADSL 20/1

    DHCP IP address

    NAT outside IP

    IP virtual-reassembly

    !

    interface Dialer0

    Description KPN SDSL 2/2

    the negotiated IP address

    IP access-group INTERNET_ACL in

    NAT outside IP

    IP virtual-reassembly

    encapsulation ppp

    Dialer pool 1

    Dialer-Group 1

    PPP pap sent-username password 0 x x

    No cdp enable

    !

    IP local pool sslvpnpool 192.168.250.2 192.168.250.100

    IP forward-Protocol ND

    IP http server

    local IP http authentication

    IP http secure server

    IP http timeout policy slowed down 60 life 86400 request 10000

    !

    pool nat SSLVPN SDSL 10.10.10.1 IP 10.10.10.1 netmask 255.255.255.0

    IP nat inside source static tcp 10.10.10.1 443 interface Dialer0 443

    IP nat inside source static tcp 10.10.10.1 80 Dialer0 80 interface

    IP nat inside source overload map route NAT_ADSL Vlan100 interface

    IP nat inside source overload map route NAT_SDSL pool SSLVPN SDSL

    IP route 0.0.0.0 0.0.0.0 x.x.x.x

    IP route 0.0.0.0 0.0.0.0 Dialer0 10

    !

    INTERNET_ACL extended IP access list

    Note: used with CBAC

    allow all all unreachable icmp

    allow icmp all a package-too-big

    allow icmp all once exceed

    allow any host 92.64.32.169 eq 443 tcp www

    deny ip any any newspaper

    Extended access LAN IP-list

    permit ip 192.168.10.0 0.0.0.255 any

    refuse an entire ip

    !

    Dialer-list 1 ip protocol allow

    not run cdp

    !

    !

    !

    !

    NAT_SDSL allowed 10 route map

    match the LAN ip address

    match interface Dialer0

    !

    NAT_ADSL allowed 10 route map

    match the LAN ip address

    match interface Vlan100

    !

    PBR_SSL allowed 10 route map

    set interface Dialer0

    !

    !

    control plan

    !

    !

    Line con 0

    no activation of the modem

    line to 0

    line vty 0 4

    privilege level 15

    transport input telnet ssh

    !

    max-task-time 5000 Planner

    !

    WebVPN MyGateway gateway

    hostname d0c

    IP address 10.10.10.1 port 443

    redirect http port 80

    SSL trustpoint TP-self-signed-3964912732

    development

    !

    WebVPN install svc flash:/webvpn/anyconnect-dart-win-2.5.0217-k9.pkg sequence 1

    !

    WebVPN install svc flash:/webvpn/anyconnect-macosx-i386-2.5.0217-k9.pkg sequence 2

    !

    WebVPN install svc flash:/webvpn/anyconnect-macosx-powerpc-2.5.0217-k9.pkg sequence 3

    !

    WebVPN context SecureMeContext

    title "SSL VPN Service"

    secondary-color #C0C0C0

    title-color #808080

    SSL authentication check all

    !

    login message "VPN".

    !

    Group Policy MyDefaultPolicy

    functions compatible svc

    SVC-pool of addresses "sslvpnpool."

    SVC Dungeon-client-installed

    Group Policy - by default-MyDefaultPolicy

    AAA authentication list sslvpn

    Gateway MyGateway

    development

    !

    end

    Any suggestions on where to look?

    Hello

    It works for me. When the client tries to resolve the fqdn for the domain specified in "svc split dns.." he will contact the DNS server assigned through the Tunnel. For all other questions, he contacts the DNS outside the Tunnel.

    You can run a capture of packets on the physical interface on the Client to see the query DNS leaving?

    Also in some routers, DNS is designated as the router itself (who is usually address 192.168.X.X), if you want to make sure that assigned DNS server doesn't not part of the Split Tunnel.

    Naman

  • New to SSL VPN, can I tunnel specific networks without specifying the list of applications with Smart tunnels?

    Hello

    I'm all new to SSL VPN, and I am a bit lost... I tried to get SSL VPN to go for our company and we have been asked to deploy a completely clientless solution that will provide access to our network based on subnets. Is this possible with the chip-tunnels? I tried a few different configurations and it doesn't seem to work. It works with ANYCONNECT but we have to go without a client. They feel that we can do without customer access to destination networks. Is this possible?

    Thank you in advance...

    That's what you can do with a solution without a client:

    1. Allow access to web resources (using the url list)
    2. Allow access to the application of TCP based (using java-port forwarding or smart tunnels)

    If you have to give access to all subnets, then you will need to go full tunnel effect which is Anyconnect SSL.

    HTH

  • Unable to connect to the site Web SSL VPN with firewall zone configured

    I recently updated my 2911 company and set up a firewall area.  This is my first experience with this and I used Cisco Configuration Professional to build the configuration of the firewall first and then edited the names to make it readable by humans.  The only problem I can't solve is to learn site Web SSL VPN from outside.  I can navigate the website and connect without problem from the inside, and even if it was useful to verify that the Routing and the site work properly it is really not what I.  I don't get anything on the syslog for drops because of the firewall server, or for any other reason but packet capture show that no response is received when you try to navigate to the outside Web site.  I am currently using a customer VPN IPSEC solution until I can get this to work and have no problem with it.  I have attached a sanitized with the included relevant lines configuration (deleted ~ 400 lines including logging, many inspections on the movement of the area to the area and the ipsec vpn, which I already mentioned).  I searched anything about this problem and no one has no problem connecting to their Web site, just to get other features to work correctly.  All thoughts are welcome.

    See the security box

    area to area

    Members of Interfaces:

    GigabitEthernet0/0.15

    GigabitEthernet0/0.30

    GigabitEthernet0/0.35

    GigabitEthernet0/0.45

    area outside zone

    Members of Interfaces:

    GigabitEthernet0/1

    sslvpn area area

    Members of Interfaces:

    Virtual-Template1

    SSLVPN-VIF0

    I tried to change the composition of the area on the interface virtual-Template1 to the outside the area nothing helps.

    See the pair area security

    Name of the pair area SSLVPN - AUX-in

    Source-Zone sslvpn-area-zone of Destination in the area

    Service-SSLVPN-AUX-IN-POLICY

    Name of the pair area IN SSLVPN

    Source-Zone in the Destination zone sslvpn-zone

    service-policy IN SSLVPN-POLICY

    Name of the pair area SELF SSLVPN

    Source-Zone sslvpn-area free-zone Destination schedule

    Service-SELF-to-SSLVPN-POLICY

    Zone-pair name IN-> AUTO

    Source-Zone in the Destination zone auto

    Service-IN-to-SELF-POLICY policy

    Name of the pair IN-> IN box

    In the Destination area source-Zone in the area

    service-policy IN IN-POLICY

    Zone-pair name SELF-> OUT

    Source-Zone auto zone of Destination outside the area

    Service-SELF-AUX-OUT-POLICY

    Name of the pair OUT zone-> AUTO

    Source-Zone out-area Destination-area auto

    Service-OUT-to-SELF-POLICY

    Zone-pair name IN-> OUT

    Source-Zone in the Destination area outside zone

    service-strategy ALLOW-ALL

    The pair OUT zone name-> IN

    Source-out-zone-time zone time Zone of Destination in the area

    Service-OUT-to-IN-POLICY

    Name of the pair area SSLVPN-to-SELF

    Source-Zone-Zone of sslvpn-area auto

    Service-SSLVPN-FOR-SELF-POLICY

    I also tried to add a pair of area for the outside zone sslvpn-zone passing all traffic and it doesn't change anything.

    The area of networks

    G0/0.15

    172.16.0.1 26

    G0/0.30

    172.16.0.65/26

    G0/0.35

    172.16.0.129/25

    G0/0.45

    172.18.0.1 28

    Pool of SSL VPN

    172.20.0.1 - 172.20.0.14

    Latest Version of IOS:

    Cisco IOS software, software C2900 (C2900-UNIVERSALK9-M), Version 15.0 (1) M10, RELEASE SOFTWARE (fc1)

    Glad works now. Weird question, no doubt.

    I guess that on the deployment guide said that the firewall will not support inspection of TCP to the free zone, however, class nested maps are used to accomplish this, to be completely honest, I think it's a mess and the best thing to do is action past to auto for the protocols that you want and then drop the rest.

    Let us know if you have any other problems.

    Mike

  • Requirements of LDAP for SSL - VPN on ASR 1002

    Hi all

    I intend to implement SSL - VPN (AnyConnect) on a rputer ASR 1002 running IOS - XE Software Version 15.1 (3) S2.

    I need to use LDAP for authentication of users and need to understand what are the requirements for RADIUS/GANYMEDE use LDAP.

    What I have to use Cisco ACS or can I use something like Microsoft IAS or free Raduis?

    Any helo will be greatly appreciated.

    Thank you

    Dmitry.

    Yes, you can use either use LDAP, Radius or Ganymede protocols to authenticate users of SSL VPN.

    You can use no matter what authentication server (doesn't have to be Cisco ACS), as long as they have either 3 supports authentication (ldap, radius or Ganymede) protocols.

    Hope that answers your question.

  • Help with the easy VPN server with LDAP

    Hello

    I used to be able to set up our easy VPN server with local authentication.

    But now, I'm trying to use LDAP authentication to match with our policies.

    Can someone help me please to check the config and tell me what is wrong with him?

    My router is a Cisco1941/K9.

    Thank you in advance.

    Ryan

    Current configuration: 5128 bytes
    !
    ! Last configuration change at 13:25:16 UTC Tuesday, August 28, 2012, by admin
    ! NVRAM config update at 05:03:14 UTC Monday, August 27, 2012, by admin
    ! NVRAM config update at 05:03:14 UTC Monday, August 27, 2012, by admin
    version 15.2
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    router host name
    !
    boot-start-marker
    boot-end-marker
    !
    !
    !
    AAA new-model
    !
    !
    AAA group ASIA-LDAP ldap server
    Server server1.domain.net
    !
    AAA authentication login ciscocp_vpn_xauth_ml_1 local
    AAA authentication login ASIA-LDAP-AUTHENTIC ldap group ASIA-LDAP
    local VPN_Cisco AAA authorization network
    Group ldap AAA authorization network ASIA-LDAP-ASIA-LDAP group authorization
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    !
    No ipv6 cef
    !
    !
    !
    !
    !
    IP domain name domaine.net
    IP cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    Crypto pki token removal timeout default 0
    !
    Crypto pki trustpoint TP-self-signed-765105936
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 765105936
    revocation checking no
    rsakeypair TP-self-signed-765105936
    !
    !
    TP-self-signed-765105936 crypto pki certificate chain
    certificate self-signed 01
    30820229 30820192 A0030201 02020101 300 D 0609 2A 864886 F70D0101 05050030
    2 060355 04031325 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 30312E30
    69666963 37363531 30353933 36301E17 313230 36323630 39323033 0D 6174652D
    355A170D 2E302C06 1325494F 03550403 32303031 30313030 30303030 5A 303031
    532D 5365 6C662D53 69676E65 642D 4365 72746966 69636174 652 3736 35313035
    06092A 86 4886F70D 01010105 39333630 819F300D 00308189 02818100 0003818D
    C1B7E661 4893D83A EFE44B76 92BAA71A 6375 854 C 88 D 4533E51A 49791 551D8EF7
    F82E2432 E65B401D 27FE4896 2105B38A CB1908C1 9AE2FC19 8A9393C3 1 B 618390
    EE6CB1CC 5C8B8811 04FA198E 16F3297B 6B15F974 13EE4897 97270547 31 74270
    4590ACA6 68606596 97C5D4D5 462CACA0 CDDAC35A 17415302 CFD4E329 8E7E542D
    02030100 01A 35330 03551 D 13 51300F06 0101FF04 05300301 01FF301F 0603551D
    23041830 1680142E FF686472 569BCCF1 552B 1200 1 060355 5B660F30 D35060DB
    1D0E0416 04142EFF 9BCCF155 68647256 2B1200D3 5060DB5B 660F300D 06092 HAS 86
    01010505 00038181 00558F64 05207 D 35 AA4BD086 4579ACF6 BCF6A851 4886F70D
    1D0EA15B 75DBFA45 E01FBA5C 6F827C42 1A50DD11 8922F1E5 3384B8D8 8DD6C222
    0187E501 82C1C557 8AD3445C A4450241 75D771CF 3A6428A6 7E1FC7E5 8B418E65
    74D265DD 06251C7D 6EF39CE9 3 D FE03F795 692763 AE865885 CFF660A5 4C1FF603
    3AF09B1E 243EA5ED 7E4C30B9 3A
    quit smoking
    license udi pid CISCO1941/K9 sn xxxxxxxxxxx

    ISM HW-module 0
    !
    !
    !
    secret admin user name of privilege 15 5 $1 rVI4$ WIP5x6at0b1Vot5LbdlGN.
    ryan privilege 0 0 pass1234 password username
    !
    redundancy
    !
    !
    !
    !
    !
    !
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    !
    Configuration group customer isakmp crypto VPN_Group1
    xxxxxxxxxxxx key
    DNS 10.127.8.20
    pool SDM_POOL_1
    ACL 100
    netmask 255.255.255.0
    ISAKMP crypto ciscocp-ike-profile-1 profile
    match of group identity VPN_Group1
    authentication of LDAP-ASIA-AUTHENTIC customer list
    whitelist ISAKMP ASIA-LDAP-authorization of THE
    client configuration address respond
    virtual-model 1
    !
    !
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    !
    Profile of crypto ipsec CiscoCP_Profile1
    game of transformation-ESP-3DES-SHA
    set of isakmp - profile ciscocp-ike-profile-1
    !
    !
    !
    !
    !
    !
    !
    interface Loopback0
    IP 10.127.15.1 255.255.255.0
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    Shutdown
    !
    interface GigabitEthernet0/0
    IP xxx.xxx.xxx.xxx 255.255.255.224
    automatic duplex
    automatic speed
    !
    interface GigabitEthernet0/1
    IP 10.127.31.26 255.255.255.252
    automatic duplex
    automatic speed
    !
    type of interface virtual-Template1 tunnel
    IP unnumbered Loopback0
    ipv4 ipsec tunnel mode
    Tunnel CiscoCP_Profile1 ipsec protection profile
    !
    local IP SDM_POOL_1 10.127.20.129 pool 10.127.20.254
    IP forward-Protocol ND
    !
    IP http server
    local IP http authentication
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    IP route 0.0.0.0 0.0.0.0 GigabitEthernet0/0
    IP route 10.0.0.0 255.0.0.0 10.127.31.25
    IP route 10.127.20.128 255.255.255.128 GigabitEthernet0/0
    !
    Note access-list 100 category CCP_ACL = 4
    access-list 100 permit ip 10.0.0.0 0.255.255.255 everything
    !
    !
    !
    !
    !
    !
    !
    LDAP attribute-map ASIA-username-map
    user name of card type sAMAccountName
    !
    Server1.domain.NET LDAP server
    IPv4 10.127.8.20
    map attribute username-ASIA-map
    bind authenticates root-dn CN = xxx\, S1234567, OU = Service accounts, OR = Admin, OU = Acc
    DC = domain, DC = net password password1
    base-dn DC = domain, DC = net
    bind authentication-first
    !
    !
    control plan
    !
    !
    !
    Line con 0
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport of entry all
    output transport lat pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line 67
    no activation-character
    No exec
    preferred no transport
    transport of entry all
    output transport lat pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line vty 0 4
    transport telnet entry
    !
    Scheduler allocate 20000 1000
    end

    Router #.

    Ryan,

    It seems that you are facing the question where it is indicated in the section:

    Problems with the help of "authentication bind first" with user-defined attribute maps:

    * Then you are likely to see a failure in your authentication attempt. You will see the error message "Invalid credentials, result code = 49.  The newspapers will look something like the journals below: *.

    Which is the same error you see. Go ahead and replace in your attribute map and test again.

    If you remove the command "bind-first authentication' configuration above, everything will work correctly.

    https://supportforums.Cisco.com/docs/doc-17780

    Tarik Admani
    * Please note the useful messages *.

  • RVL200 SSL VPN: cannot access a remote LAN with iPad2

    RVL200 firmware 1.1.12.1

    iPad2 cannot access any device on the Remote LAN despite the closed padlock icon.

    Is there another App needed? Or how to debug SSL VPN?

    Emmanuel,

    Were you able to access the LAN devices? Also, have you connected using a Mac or a PC successfully to verify that the devices are available? Sometimes antivirus and firewall software can block access to devices from a remote IP address.

Maybe you are looking for