- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Running VPN Anyconnect RADIUS Servers in Tandum during migration to Duo 2fa
The Meraki Client VPN AnyConnect profile in Meraki is configured with three RADIUS servers. When I try to connect, it’s defaulting to the first RADIUS server using NPS.
The last Duo server I want Duo Users to use. This would work if there were only duo servers in the list.
However, is there a way to force the AnyConnect profile to use the Duo server as a connection?
This would allow us to work with NPS and Duo in tandem.
But if I can’t get the NPS and Duo to work in tandem it will have to be a big bang approach to switchover, getting everyone enrolled into Duo First and then switching RADIUS servers over to the last Duo one.
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
These are the options you have to integrate with DUO.
https://help.duo.com/s/article/7505?language=en_US
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Alemabrahao,
Yes, I do know you can protect Cisco Anyconnect with Duo. We already have clients like that.
The problem I am having is, I'd like to force a VPN profile into using the correct RADIUS server during login.
Currently they all default to the RADIUS/NPS server, and I need anyone who is the correct group to be automatically routed to the RADIUS/DUO Auth Proxy server.
So when we migrate users we can ensure they will start using the Duo Proxy.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
First of all, I would recommend using SAML to authenticate AnyConnect against Duo - it is much more flexible and powerfull.
https://duo.com/docs/sso-meraki-secure-client
If you want to use RADIUS, I normally leave NPS on port 1812, and setup the Duo Auth Proxy on port 1912 (make sure to configure Windows Firewall to allow it).
Then when you change over, just change the port in the Meraki portal. If you want to roll back, change the port back.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just looking at the documentation for SAML. I don't even see how it relates to Cisco Anyconnect VPN?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What about this one? https://duo.com/docs/sso-meraki-secure-client
Perhaps you might be confused when reading "Secure Client". It's basically Anyconnect Version 5 (with other benefits) 😉
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Again, These solutions will not work for the VPN clients requiring Duo access.
I need the clients apps to intelligently know which RADIUS server to use and there seems to be no way to configure that for Cisco Anyconnect VPN clients.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The choice is in accordance with the order defined in the list of servers configured in the MX VPN Client.
And yes, you can use SAML with Anyconnect.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I also tested the order of the RADIUS Servers and it makes no difference. It always defaults to the NPS RADIUS server. Unless I remove NPS the Duo RADIUS will not connect.
Also SAML is not a solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Clients never directly talk to the RADIUS server, that's the way the protocol is built. There's no way you will achieve this one on the client side.
