Options

ASA Cut Through Prox & Dynamic Access Policies

millworxmillworx Member Posts: 290
Howdy Howdy everyone. Don't know where to stick this question. But heres my situation.

I setup cut through proxy / dynamic access policies on my ASA and it authenticates based on AD group names. Everything was working great. So I decided to write erase the firewall and do it again.

Second time around its very slow, when I enter my credentials on the authentication page it takes 10-12 seconds to authenticate! Sometimes its fast, but most of the time its slow. So I thought maybe it was something with the config. So I restored from the backup I made when it was working fine, and yet it still has a delay of 10-12 seconds.

So I am a little befuddled. Any thoughts?
Currently Reading:
CCIE: Network Security Principals and Practices
CCIE: Routing and Switching Exam Certification Guide

Comments

  • Options
    Bl8ckr0uterBl8ckr0uter Inactive Imported Users Posts: 5,031 ■■■■■■■■□□
    Is time on the DC and ASA synced up?
  • Options
    millworxmillworx Member Posts: 290
    yeah, we are using the same NTP server for the DC and the ASA.

    I learned that lesson the hard way when I was trying to get some VMs on one of my esx hosts to join the domain and it wouldn't because i left of the NTP settings. lol.

    So we are good with clock synchronization.

    Also too, I did wipe the dap.xml file from the disk0 prior to wiping the config. So it should be completely clean.

    Also too form the CLI of the ASA if I run:
    test aaa authentication MS-AD host ds.xxxx.com username jason password *****
    it returns INFO: Authentication Successful almost immediately. So it seems ASA related.
    Currently Reading:
    CCIE: Network Security Principals and Practices
    CCIE: Routing and Switching Exam Certification Guide
  • Options
    Bl8ckr0uterBl8ckr0uter Inactive Imported Users Posts: 5,031 ■■■■■■■■□□
    Is it using gp to pull dhcp information or something? I seem to remember that being an option. Anything in the logs?
  • Options
    millworxmillworx Member Posts: 290
    No GPs on this firewall. I'm separating users into GPs on another firewall using ssl vpn, so they land into their correct virtual desktop. Then from the virtual desktop they hit this firewall using DAP. Nothing quirky in the logs. I'm going to keep digging.
    Currently Reading:
    CCIE: Network Security Principals and Practices
    CCIE: Routing and Switching Exam Certification Guide
Sign In or Register to comment.