Guest

Preview Tool

Cisco Bug: CSCvh64413 - FTD sending "0.0.0.0" NAS-IP-Address attribute when authenticating RA VPN user using Radius Server.

Last Modified

Aug 20, 2019

Products (32)

  • Cisco Firepower Management Center
  • Cisco FirePOWER Appliance 7050
  • Cisco Firepower Management Center 2500
  • Cisco FirePOWER Appliance 8360
  • Cisco FirePOWER Appliance 8120
  • Cisco FirePOWER Appliance 8260
  • Cisco AMP 8150
  • Cisco AMP 7150
  • Cisco FirePOWER Appliance 8130
  • Cisco FirePOWER Appliance 8140
View all products in Bug Search Tool Login Required

Known Affected Releases

6.2.2

Description (partial)

Symptom:
FTD sending "0.0.0.0" NAS-IP-Address attribute when authenticating Remote Access VPN user using Radius Server.
Radius: Type = 4 (0x04) NAS-IP-Address
Radius: Length = 6 (0x06)
Radius: Value (IP Address) = 0.0.0.0 (0x00000000)

Conditions:
Configure RA VPN to use RADIUS as AAA Server, without specifying any source interface. Then authenticate user.  FTD sends NAS-IP-Address as 0.0.0.0 when authenticating with RADIUS server in this case.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.