Posts

Showing posts from February, 2022

Firepower syslog message

Image
Anyconnect authentication syslog messages: 1. failure with invalid or non-exist username  <164>% FTD-4-113005: AAA user authentication Rejected : reason = Unspecified : server = 192.168.2.100 : user = ***** : user IP = 203.0.113.138 2.failure with valid username  <164>% FTD-4-722041 : TunnelGroup <SSLVPN-AD> GroupPolicy <SSLVPN-GP> User <vpnuser1> IP <203.0.113.138> No IPv6 address available for SVC connection 3. Successful login <164>% FTD-4-722051 : Group <SSLVPN-GP> User <vpnuser1> IP <203.0.113.138> IPv4 Address <192.168.100.100> IPv6 address <::> assigned to session Generate Email Alert for syslog 02-04-2022 13:38:47 Local4.Info 172.16.1.19 %FTD-6-113005: AAA user authentication Rejected : reason = AAA failure : server = 172.16.1.12 : user = ***** : user IP = 192.168.2.250 1. Specify a SMTP Server     no way to configure SMTP login info in FMC, in the lab, use the SMTP service on Windows AD server, c

802.1x Radius ISE

Image
Wired -  NAS-Port-Type = Ethernet Wireless -   NAS-Port-Type = Wireless - IEEE 802.11 VPN -  NAS-Port-Type = Virtual 802.1x -   Service-Type = Framed MAB -  Service-Type = Call Check Match SSID methods: 1. Radius:Called-Station-ID  Ends_with xxxx   [match *(xxxx)$]     Radius:Called-Station-ID  Contains xxxx    [match .*(xxxx).*] 2. Normalised Radius·SSID contains (or ends_with) xxxx 3. Airespace > Airespace-Wlan-Id equels xxx EAP Think of Extensible Authentication Protocol (EAP) is an authentication application between Supplicant, Authenticator and Authentication Server. EAP is always carried by another protocol. EAP is encapsulated with Layer2 frame is called EAPOL which runs LAN between supplicant and authenticator. 802.1X defines this encapsulation. EAP is encapsulated in RADIUS runs between authenticator and Radius authentication server.  A wired client authenticates to its switch using 802.1x/EAP and MD5 challenge authentication. 01-80-C2-00-00-03 802.1X Port-Based Network Acc