Preview Tool

Cisco Bug: CSCus72418 - IOS SSLVPN: Radius Access-request should set Client-type VSA #150

Last Modified

May 05, 2016

Products (90)

  • Cisco IOS
  • Cisco 812 CiFi Integrated Services Router
  • Cisco 1905 Serial Integrated Services Router
  • Cisco 898 Secure G.SHDSL EFM/ATM with Multi-Mode 4G LTE ISR Router
  • Cisco 886VA-CUBE Integrated Services Router
  • Cisco 2951 Integrated Services Router
  • Cisco C892FSP Integrated Services Router
  • Cisco 888W Integrated Services Router
  • Cisco 861W Integrated Services Router
  • Cisco C897VA Integrated Services Router
View all products in Bug Search Tool Login Required

Known Affected Releases


Description (partial)

Currently IOS Radius NAS does not have an attribute in the Access-request to distinguish the client type.

The attribute that will be set from now on would be:

Attribute Name: Client Type
Attribute Number: 150
VSA ID: 3076/150
Type: integer
            1 = Cisco VPN Client (IKEv1)
            2 = AnyConnect Client SSL VPN
            3 = Clientless SSL VPN
            4 = Cut-Through-Proxy
            5 = L2TP/IPsec VPN
            6 = AnyConnect Client IPsec VPN (IKEv2)

IOS acting as SSLVPN Remote Access VPN server, and the users are authenticated using Radius.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.