Vpn – Cisco ASA – LDAP Authentication issue

cisco-asavpn

I've configured the ASA for LDAP authentication and successfully tested with the "Test aaa-server" command. However when I attempt to connect via Clientless VPN, I am unable to log in. Local users are able to log in via Clientless VPN.

I am truly unsure how I would even begin to troubleshoot this issue.

Edit: Redacted some non-essential information (reason being that the test aaa-server test tools verifies that the aaa server is authenticating correctly, AKA everything on the inside is working as intended. Correct me if I'm wrong.)

Model: 5508-x
Software Version: 9.6(4)3

aaa-server Users_VPN protocol ldap
aaa-server Users_VPN (inside) host REDACT
 ldap-base-dn REDACT
 ldap-naming-attribute REDACT
 ldap-login-password REDACT
 ldap-login-dn REDACT
 server-type REDACT
user-identity default-domain LOCAL
aaa authentication http console LOCAL 
aaa authentication enable console LOCAL 
aaa authentication ssh console LOCAL 
aaa authentication telnet console LOCAL 
aaa authorization command LOCAL 

Best Answer

None of your aaa commands reference your aaa-server, only Local.

Try this....you will need to reference it for each aaa auth line you want to use it for.

aaa authentication http console Users_VPN LOCAL 

For WebVPN, you will need to add the the server to your tunnel-group attributes. Like the previous aaa config, the radius server will always be used if it is reachable, appending the LOCAL will still access for those users if the radius server fails.

(config)#tunnel-group "yourtunnelgroup" general-att
(config-tunnel-general)#authentication-server-group Users_VPN LOCAL