Guest

Preview Tool

Cisco Bug: CSCus72418 - IOS SSLVPN: Radius Access-request should set Client-type VSA #150

Last Modified

May 05, 2016

Products (90)

  • Cisco IOS
  • Cisco 812 CiFi Integrated Services Router
  • Cisco 1905 Serial Integrated Services Router
  • Cisco 898 Secure G.SHDSL EFM/ATM with Multi-Mode 4G LTE ISR Router
  • Cisco 886VA-CUBE Integrated Services Router
  • Cisco 2951 Integrated Services Router
  • Cisco C892FSP Integrated Services Router
  • Cisco 888W Integrated Services Router
  • Cisco 861W Integrated Services Router
  • Cisco C897VA Integrated Services Router
View all products in Bug Search Tool Login Required

Known Affected Releases

15.5(2)T

Description (partial)

Symptom:
Currently IOS Radius NAS does not have an attribute in the Access-request to distinguish the client type.

The attribute that will be set from now on would be:

Attribute Name: Client Type
Attribute Number: 150
VSA ID: 3076/150
Type: integer
            1 = Cisco VPN Client (IKEv1)
            2 = AnyConnect Client SSL VPN
            3 = Clientless SSL VPN
            4 = Cut-Through-Proxy
            5 = L2TP/IPsec VPN
            6 = AnyConnect Client IPsec VPN (IKEv2)

Conditions:
IOS acting as SSLVPN Remote Access VPN server, and the users are authenticated using Radius.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.