Cool! This is mu gut feeling aswell, but I have never tried it. One question
is regarding the interface-relation when defining a radius-server. If I look
at the ASA-syntax it saids:
ciscoasa(config)# aaa-server RAD ?
configure mode commands/options:
( Open parenthesis for the name of the network
interface
where the designated AAA server is accessed
deadtime Specify the amount of time that will elapse between
the
disabling of the last server in the group and the
subsequent re-enabling of all servers
host Enter this keyword to specify the IP address for the
server
max-failed-attempts Specify the maximum number of failures that will be
allowed for any server in the group before that
server
is deactivated
protocol Enter the protocol for a AAA server group
In my world there is really no need for defining an interface for this since
it´s "all about routing". Given that the radius-server ip is x.x.x.x and
there is a rout for x.x.x.x, why defining an interface? My own feeling about
this is that this is for defining the source ip for outbound radius packets.
But looking at the syntax help above the interface-relationship is only a
way to define where to send the traffic (which in my world could be done
just by using the routing table).
So you are saying that I should define my remote radius-server as (outside)?
Another hypothesis I had (if I were right regarding the interface-definition
above) was to use (inside) so that the radius-packets were sourced from the
inside ip and thereby included in the "normal" crypto-acl defining
inside-LAN-2-Inside-Lan (and sending it via outside only because of the
default route).
Two theories. Mine is probably wrong. I will also lab it up quite soon if
noone else here knows for sure. ;)
Thanks for your input!
/Jimmy Larsson
2011/4/14 Andrew Wurster <[email protected]>
> jimmy -
>
> as bruno said - it's possible :) .
>
> think about it from a routing perspective. know that the crypto happens as
> the traffic is pushed towards the egress interface (post nat). this is true
> for routers and firewalls, but on firewall we choose the local address based
> on routing only, so we usually have no "source address" or looback interface
> selection commands like we do on the routers (think local-address for the
> crypto map commands in IOS).
>
> SO... you're most likely going to assume it will be sourced using the
> outside interface IP address. so all you've got to do is add the traffic
> between ASA1's outside interface IP address to the internal radius server
> behind ASA2. AND THEN of course you've got to tell your SNMP server that
> the client is at the public outside interface IP address (for instance
> 20.20.20.20) and not the private inside one. AND ALSO if you're doing NAT -
> make sure to exempt the NAT from the SNMP server to the new host address.
> it's all about the layers baby!!!
>
> so it might look something like:
>
> !!! ASA1 !!!
> access-list CRYPTO_ACL extend permit ip host 20.20.20.20 host 192.168.2.10
>
> !!! ASA2 !!!
> access-list CRYPTO_ACL extend permit ip host 192.168.2.10 host 20.20.20.20
> access-list NO_NAT extend permit ip host 192.168.2.10 host 20.20.20.20
>
> and bingo bango (hopefully)... give it a shot and let us know. i'll try to
> lab it up for you this weekend if i have time.
>
> cheers,
>
> andrew
>
> On Thu, Apr 14, 2011 at 11:36 AM, Jimmy Larsson <[email protected]>wrote:
>
>> Hi guys
>>
>> I have a question that I have tried to find time to lab out myself without
>> success so I am throwing it out here in hope for a quick answer.
>>
>> Lets say that my ASA1 has a Lan2Lan-tunnel to ASA2. On the inside of ASA2
>> is a radius-server and ASA1 needs to authenticate vpn-clients on that radius
>> server. Can I do that thru the vpn-tunnel? And if so, how do I define the
>> crypto acl and which interface should I specify in ASA1 that the
>> radius-server resides on?
>>
>> Topology:
>>
>> Radius-server .10 on Lan2 192.168.2.0/24 -----(.1) ASA2 =====VPN-tunnel
>> over internet=====ASA1 .1 --- Lan1 192.168.1.0/24
>>
>> How do I configure aaa-server for radius on ASA1?
>>
>> Thanks in advance!
>>
>> Best regards
>> Jimmy Larsson
>>
>>
>> --
>> -------
>> Jimmy Larsson
>> Ryavagen 173
>> s-26030 Vallakra
>> Sweden
>> http://blogg.kvistofta.nu
>> -------
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>>
>
--
-------
Jimmy Larsson
Ryavagen 173
s-26030 Vallakra
Sweden
http://blogg.kvistofta.nu
-------
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com