Cisco Anyconnect 2FA

Stefan Schlesinger sts at ono.at
Thu Jan 5 23:52:18 CET 2017


Hi,

we are trying to implement 2FA for Cisco ASA Anyconnect VPN clients.

The ASA supports a “secondary password” input, so the dialog asks for a username, a password and another password. The ASA is going to fire off an Access-Request for each of the passwords. The first one with the users password and if successful, a subsequent request, which should contain the one time authentication token.

We couldn’t figure out yet how to authenticate the subsequent request against a different authentication module, especially because they both look the same, besides the Request Id.

Can anyone help out how to handle the latter different from the first request in an unlang config?

Thanks for your help!

Stefan

rad_recv: Access-Request packet from host 10.30.9.1 port 8272, id=66, length=611
  User-Name = "admin"
  User-Password = “supersecret"
  NAS-Port = 491520
  Called-Station-Id = "1.2.3.4"
  Calling-Station-Id = "2.3.4.5"
  NAS-Port-Type = Virtual
  Tunnel-Client-Endpoint:0 = "2.3.4.5"
  Cisco-AVPair = "mdm-tlv=device-platform=mac-intel"
  Cisco-AVPair = "mdm-tlv=device-type=MacBookPro11,1"
  Cisco-AVPair = "mdm-tlv=device-mac=aa-aa-aa-aa-aa-aa"
  Cisco-AVPair = "mdm-tlv=device-mac=bb-bb-bb-bb-bb-bb"
  Cisco-AVPair = "mdm-tlv=device-platform-version=10.11.6"
  Cisco-AVPair = "mdm-tlv=ac-user-agent=AnyConnect"
  Cisco-AVPair = "mdm-tlv=device-uid=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  NAS-IP-Address = 10.30.9.1
  Cisco-AVPair = "audit-session-id=c0a800000000000000000000"
  Cisco-AVPair = "ip:source-ip=2.3.4.5"
  Vendor-3076-Attr-146 = 0x43454e5452414c
  Vendor-3076-Attr-150 = 0x00000002
  Cisco-AVPair = "coa-push=true"

rad_recv: Access-Request packet from host 10.30.9.1 port 8272, id=67, length=611
  User-Name = "admin"
  User-Password = “2fa-otp-token"
  NAS-Port = 491520
  Called-Station-Id = "1.2.3.4"
  Calling-Station-Id = "2.3.4.5"
  NAS-Port-Type = Virtual
  Tunnel-Client-Endpoint:0 = "2.3.4.5"
  Cisco-AVPair = "mdm-tlv=device-platform=mac-intel"
  Cisco-AVPair = "mdm-tlv=device-type=MacBookPro11,1"
  Cisco-AVPair = "mdm-tlv=device-mac=aa-aa-aa-aa-aa-aa"
  Cisco-AVPair = "mdm-tlv=device-mac=bb-bb-bb-bb-bb-bb"
  Cisco-AVPair = "mdm-tlv=device-platform-version=10.11.6"
  Cisco-AVPair = "mdm-tlv=ac-user-agent=AnyConnect"
    Cisco-AVPair = "mdm-tlv=device-uid=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  NAS-IP-Address = 10.30.9.1
  Cisco-AVPair = "audit-session-id=c0a800000000000000000000"
  Cisco-AVPair = "ip:source-ip=2.3.4.5"
  Vendor-3076-Attr-146 = 0x43454e5452414c
  Vendor-3076-Attr-150 = 0x00000002
  Cisco-AVPair = "coa-push=true"


More information about the Freeradius-Users mailing list