AnyConnect - authentication

Hello

What Anyconnect and start before logon compatible with eToken (PKI)?

If users have eToken OTP (related to the RADIUS), another solution is possible:

-to set up several types of authentication?

-for users, choose the type of authentication on Anyconnect GUI?

Thanks for your answers,

Patrick

Patrick,

You can combine KPIS and AAA authentication without problem (according to tunnel-group you may have certificates and/or AAA)

http://www.Cisco.com/en/us/docs/security/ASA/asa83/configuration/guide/SVC.html

I don't know what etoken you are referring. I've seen people using Aladdin.

But in general Yes PKI works very well with ca.

Marcin

Tags: Cisco Security

Similar Questions

  • AnyConnect authentication with RADIUS secure method

    I was able to correctly configure Cisco AnyConnect VPN on ASA 5520 with code 8.4.  I put it to authenticate to the RADIUS (Microsoft Windows 2008 Server NPS server) server.  I noticed something on the server under "constraints and the method of authentication.  I chose MS-CHAP-v2, but it is considered less secure authentication methods.  I can click on Add and choose other methods of authentication such as smart card or other certificate, PEAP, EAP-MSCHAP VERSION 2.  I chose PEAP, but then the VPN does not work.

    So first of all is it really important if I just leave it to MS-CHAP-v2?  Because from my understanding is that AnyConnect authenticate with the ASA and then ASA in the backend communicates with the RADIUS server to security point of this scenario should - not be enough as no UN encrypted or secure less information is available to the outside world?

    Secondly there is a documentation on the use of PEAP with Cisco AnyConnect?

    AnyConnect supports EAP-GTC, EAP-MD5 and EAP-MSCHAPV2.

    From the safety point of view, it does not matter much what you use as IKE still will be encrypt traffic between the client and the head of the line.

    Between the head and the RADIUS, the password is encrypted as well.

    From a to z, you good to go.

    See you soon,.

    Olivier

  • AnyConnect & authentication digital certificate

    people

    I have a question about the authentication of users with digital certificates and name of user and password

    My ssl vpn works well but I have only one user so far

    my query is about how to manage certificates and additional users

    I'll add the users in the asa for local authentication but it is the certificates that I'm not sure

    can I use the same account in the certificate local user dbase, i.e. sslconnect and generate a new OTP for each user that I add to create the certificate or should I create a new account in the ACL user dbase for each user account that I create in AAA

    hope this isn't too complicated

    Thanks to anyone who takes the time to answer or read this

    greatly appreciated

    If you are authenticating using certificate, you must issue each user a different certificate for him/herself. The certificate is a unique certificate for each user. I would recommend that you have the user name as the certificate CN instead of a good "sslconnect" like CN, so you can distinguish different users.

    Hope that answers your question.

  • AnyConnect user using the user certificate authentication and LDAP authentication

    Hello

    I'm trying to implement the Anyconnect VPN for my office. Now, I want the user to authenticate the user certificate based (which is install user local system are we) CN value and LDAP authentication. A help how to achieve this requirement. We install Certificate ROOT and INTERMEDIATE Godaddy and even already installed ASA. Also, we have the user certificate installed on each system user to authenticate the user.

    Any help please.

    Hi subhasisdutta,

    This link will certainly help you with the configuration:

    http://www.Cisco.com/c/en/us/support/docs/security/AnyConnect-secure-mob...

    Hope this info helps!

    Note If you help!

    -JP-

  • Only IPSEC AnyConnect VPN certificate authentication

    How can I activate "authentication certificate only" for AnyConnect IPSec IKEv2 VPN connections, so that users do not have to enter the user name and password.

    Basically, deploy the CA, and then deploy the VPN.

    This example uses the Microsoft CA, but you can use the built in place.

    https://supportforums.Cisco.com/blog/152941/AnyConnect-certificate-based-authentication

  • AnyConnect VPN client authentication using certificates

    Guys, I'm trying to configure my ASA5505 to authenticate the AnyConnect VPN clients using certificates. I have 'Certificates' defined as my method of authentication in my AnyConnect connection profile (see screenshot), but I get 'Certificate Validation failure' whenever I try to connect. The certificate I want to use is a computer issued by my CA certificate company root (Windows Server 2008 running Active Directory Certificate Services). Screenshot of certificate is attached. I added the root certificate on the SAA, and I tried all kinds of combinations by using the corresponding certificate in the AnyConnect Client profile. Each attempt failed, and I'm having no luck finding documentation on how to proceed. Any help would be greatly appreciated!

    Hello Shaun,

    The problem you're describing, not be able to authenticate through certificate through Microsoft Internet Explorer, is the fact that the certificate is in the computer store.  You do not want to confirm with Microsoft, but, I understand that only Microsoft Internet users explore the user store, this certificate is not available to attend the ASA via the Internet browser.

    -Craig

  • [Cisco AnyConnect] Certificate on RADIUS authentication

    Hello

    I use authentication and LDAP authorization certificates and it works fine.

    Now, I want to centralize authentication and authorization on the server RADIUS (Cisco ACS in my case)

    In the connection profile, we have 3 authentication methods:

    • AAA: I can choose RADIUS server group or LDAP--> the user is prompted to enter the username/password credentials
    • Certificate: I can't choose AAA server...--> user group will have to provide the certificate
    • Both: I choose the RADIUS or LDAP--> the user is prompted for username/password credentials and the user must provide the certificate

    If I choose the certificate authentication methods, I can't delegate the authentication and authorization of RADIUS server.

    Is there a solution to delegate the authentication of the certificate to the RADIUS?

    I have different authorization for each VPN connection profile rules

    ASA can send a VPN connection profile to the RADIUS? (in the RADIUS attribute...)

    Thanks for your help,

    Patrick

    Patrick,

    The essential in deployments using WLC is begging on client can talk to EAP (including EAP - TLS) so the AAA server can authenticate the certificate.

    In the case of Anyconnect, or old IPsec client there is no way to send the full cert to server AAA (not implemented/redundant from the point of view of the customer, or not in the standard).

    IOS also gives you a possibility to make calls for authorization of PKI:

    http://www.Cisco.com/en/us/docs/iOS-XML/iOS/sec_conn_pki/configuration/15-2mt/sec-cfg-auth-Rev-cert.html

    AFAIR is no similar mechanism on the SAA.

    M.

  • AnyConnect and Aladdin eToken authentication

    Hi all!

    First part

    I managed the Anyconnect VPN installation in our c2821 using MS Active Directory & Cisco Secure ACS v.4.2 authentication Radius Server for windows clients.

    I have successfully install authentication in Windows using Aladdin eToken and logon Samrtcard (connector Microsoft's CA) certificate.

    I have successfully the Microsoft certification authority certificate store of eToken.

    I would like someone to answer the following questions: How can I use this certificate to authenticate the session on AnyConnect VPN?

    Second part

    I tried to customize local AnyConnect profile using Cisco AnyConnect Profile Editor. The only result: changed default username and default host. All other customizations have been ignored.

    Here is my profile:



       
            one
           
            omitted

    omitted
            omitted
            false
            true
            false
            All
            true
            Native
            false
            false
            false
            true
                DisconnectOnSuspend
           

            false
            HardwareToken
            SingleLocalLogon
            LocalUsersOnly
            false
            Automatic
               
           

            false
       

    Anyone have any ideas?

    Hello

    You can control the parameters of AnyConnect session only if the activated/enabled 'controllable user' administrator for each XML attribute. For those that are controllable from the user, the user must be able to click on the 'Settings' button very close the list box drop-down server.

    However, if you manually change the XML file on the local computer of the client, the next time AnyConnect connect, it will download the original version of the ASA and compares with local XML file. If the checksum does not match, it overrides the local XML file with the newly downloaded XML file.

    You can change the preferences.xml file, and that you have discovered, AnyConnect will honor your changes. But the profile has most of the security settings as a Local Lan access, start before logon, Auto reconnection.

    Thank you

    Kiran

  • IPSEC of AnyConnect-IKEv2 authentication failure

    I have configure Anyconnect webvpn using IPsec (IKEv2) to an ASA with version 8.4 (2). When I try to connect with Anyconnect Client mobility, I got an error message (see screenshot) authentication failed. I can't even invite him to put the name of user and password. Since him debugs, I get the following errors:

    % ASA-6-302015: built connection UDP incoming 354 for outside:x.x.x.x/52171 (x.x.x.x/52171) at identity:172.16.4.2/500 (172.16.4.2/500)

    % 5-ASA-750002: Local: 172.16.4.2:500 Remote:x.x.x.x:52171 Username:Unknown received a request IKE_INIT_SA

    % ASA-6-302015: built connection UDP incoming 355 for outside:x.x.x.x/52172 (x.x.x.x/52172) at identity:172.16.4.2/4500 (172.16.4.2/4500)

    % ASA-3-751006: failed local authentication: 172.16.4.2:4500 Remote:x.x.x.x:52172 Username:Unknown certificate.  Error: Impossible to retrieve the certificate chain

    % ASA-4-750003: Local: 172.16.4.2:4500 Remote:x.x.x.x:52172 Username:Unknown negotiation failed due to the ERROR: exchange Auth failed

    % ASA-6-302013: built of TCP connections incoming 356 for outside:x.x.x.x/52175 (x.x.x.x/52175) at identity:172.16.4.2/443 (172.16.4.2/443)

    % ASA-6-725001: from transfer SSL client outside:x.x.x.x/52175 for TLSv1 session.

    % ASA-725010 7: device supports the following 4 cipher (s).

    % ASA-7-725011: [1] encryption: RC4 - SHA

    % ASA-7-725011: [2] encryption: AES128-SHA

    % ASA-7-725011: [3] encryption: AES 256 - SHA

    % ASA-7-725011: [4] encryption: DES-CBC3-SHA

    % 7-ASA-725008: outside:x.x.x.x/52175 client SSL offers the following 18 cipher (s).

    % ASA-7-725011: encryption [1]: DHE-RSA-AES256-SHA

    % ASA-7-725011: [2] encryption: DHE-DSS-AES256-SHA

    % ASA-7-725011: [3] encryption: AES 256 - SHA

    % ASA-7-725011: [4] encryption: EDH-RSA-DES-CBC3-SHA

    % ASA-7-725011: [5] encryption: EDH-DSS-DES-CBC3-SHA

    % ASA-7-725011: [6] encryption: DES-CBC3-SHA

    % ASA-7-725011: [7] encryption: DHE-RSA-AES128-SHA

    % ASA-7-725011: [8] encryption: DHE-DSS-AES128-SHA

    % ASA-7-725011: [9] encryption: AES128-SHA

    % ASA-7-725011: [10] encryption: RC4 - SHA

    % ASA-7-725011: [11] encryption: RC4 - MD5

    % ASA-7-725011: [12] encryption: EDH-RSA-DES-CBC-SHA

    % ASA-7-725011: [13] encryption: EDH-DSS-DES-CBC-SHA

    % ASA-7-725011: [14] encryption: DES-CBC-SHA

    % ASA-7-725011: encryption [15]: EXP-EDH-RSA-DES-CBC-SHA

    % ASA-7-725011: encryption [16]: EXP-EDH-DSS-DES-CBC-SHA

    % ASA-7-725011: [17] encryption: EXP-DES-CBC-SHA

    % ASA-7-725011: [18] encryption: EXP-RC4-MD5

    % ASA-725012 7: device chooses cipher: RC4 - SHA for the SSL session with client outside:x.x.x.x/52175

    % ASA-6-725002: aircraft completed the SSL negotiation with customer outside:x.x.x.x/52175

    % ASA-6-725007: end of the SSL session with client outside:x.x.x.x/52175.

    % ASA-6-302014: disassembly of the TCP connection 356 for outside:x.x.x.x/52175 to identity:172.16.4.2/443 duration 0: 00:00 872 bytes TCP fins

    Here is my configuration:

    local pool VPNPOOL 172.17.1.1 - 172.17.1.40 255.255.255.0 IP mask

    object obj-vpnpool network

    172.17.1.0 subnet 255.255.255.0

    NAT (inside, outside) static source any any destination static obj-vpnpool obj-vpnpool

    standard SPLITUN-ACL access-list allowed 192.168.0.0 255.255.255.0

    standard SPLITUN-ACL access-list allowed 10.1.1.0 255.255.255.0

    IKEv2 crypto policy 1

    aes-256 encryption

    integrity sha

    Group 5 2 1

    FRP sha

    second life 86400

    Crypto ikev2 activate out of service the customer port 443

    Trustpoint crypto ikev2 remote access _SmartCallHome_ServerCA

    Crypto ipsec ikev2 ipsec-proposal TS1-IKEV2

    Protocol esp 3des, aes to aes-192, aes-256 encryption

    Esp integrity sha - 1, md5 Protocol

    crypto dynamic-map DYN-map 40 value ikev2 ipsec-proposal TS1-IKEV2

    card crypto ASA1VPN 65535 isakmp ipsec dynamic DYN-map

    ASA1VPN interface card crypto outside

    ISAKMP nat-traversal crypto

    WebVPN

    AnyConnect image disk0:/anyconnect-linux-3.0.5075-k9.pkg 1

    AnyConnect image disk0:/anyconnect-macosx-i386-3.0.5075-k9.pkg 2

    AnyConnect image disk0:/anyconnect-win-3.0.5075-k9.pkg 5

    AnyConnect profiles Main_IKEv2_client_profile disk0: / Main_IKEv2_client_profile.xml

    AnyConnect enable

    allow outside

    tunnel-group-list activate

    internal GroupPolicy_Main_IKEv2 group strategy

    attributes of Group Policy GroupPolicy_Main_IKEv2

    Ikev2 VPN-tunnel-Protocol

    Split-tunnel-policy tunnelspecified

    Split-tunnel-network-list value SPLITUN-ACL

    value of server DNS 192.168.0.245

    value of server WINS 192.168.0.245

    jiffix.local value by default-field

    WebVPN

    AnyConnect value Main_IKEv2_client_profile type user profiles

    AnyConnect Dungeon-Installer installed

    type tunnel-group RemoteAccessIKEv2 remote access

    attributes global-tunnel-group RemoteAccessIKEv2

    Group Policy - by default-GroupPolicy_Main_IKEv2

    address VPNPOOL pool

    tunnel-group RemoteAccessIKEv2 webvpn-attributes

    enable Main_IKEv2 group-alias

    username user password xxxxx

    attributes of user username

    VPN-group-policy GroupPolicy_Main_IKEv2

    management-access inside

    SSH 172.17.1.0 255.255.255.0 inside

    Main_IKEv2_client_profile. XML

    http://schemas.xmlsoap.org/encoding/">

    hostname - ASA (IPsec)

    y.y.y.y

    IPsec

    You have the trustpoint with configured '_SmartCallHome_ServerCA' certificate? The partial configuration above don't indicte something little script which is where authentication does not reach your output to the log above.

    The output from the output of 'show crypto ca server certificates' would be useful.

  • How Anyconnect VPN users will connect with cisco ASA, which uses the server (domain controller) Radius for authentication

    Hi team

    Hope you do well. !!!

    currently I am doing a project which consists in CISCO ASA-5545-X, RADIUS (domain controller) server for authentication. Here, I need to configure Anyconnect VPN and host checker in cisco asa.

    1 users will connect: user advanced browser on SSL VPN pop past username and password.

    2. (cisco ASA) authentication: VPN sends credentials to the RADIUS server.

    3 RADIUS server: authentication: receipt and SSL VPN (ASA) group.

    4 connectivity creation: If employee: PC so NAW verified compliance, no PC check Assign user to the appropriate role and give IP.

    This is my requirement, so someone please guide me how to set up step by step.

    1. how to set up the Radius Server?

    2. how to configure CISCO ASA?

    Thanks in advance.

    Hey Chick,

    Please consult the following page of installation as well as ASA Radius server. The ASA end there is frankly nothing much difference by doing this.

    http://www.4salesbyself.com/1configuring-RADIUS-authentication-for-webvp...

    Hope this helps

    Knockaert

  • The use of certificates as the authentication method for AnyConnect VPN

    I'm trying to add certificates as authentication method for one of my AnyConnect connection profiles, that is, by using the option 'Corresponding certificate' available in the profile of the Client AnyConnect. My question concerns the "Distinguished Name Entry" options available. I know what some of them refer to the (for example, "TRANSMITTER-CN" is just like that), but some of them I don't know ("GENQ", "EA", etc.). Is there a reference somewhere that I can use to understand what each of these options to average? Here a sreenshot of the window in question. Thank you!

    The order has a good explanation of the various DN fields. Here is a copy of the inscription:

    Tag values are as follows:

    DNQ = qualifier DN
    Generational qualifier = GENQ
    I have original =
    GN = first name
    N = name
    SN = surname
    IP = IP address
    SER = sΘrie numΘro
    UNAME = unstructured name
    EA = address Email
    T = Title
    O = organization name
    L = local
    SP = State/Province
    C = country
    OU = organizational unit
    CN = common name

  • AnyConnect: User based authentication certificate filtering Configuration

    Hello colleagues in the network.

    recently I needed to configure AnyConnect SSL VPN with certificate authentication to meet the needs of connection at the request of the features of Cisco Jabber.

    Everything is ok, but I need to filter users based on their personal certificate information. For example - all those who have a personal certificate from our CA can now access this VPN. I want to set the users by e-mail of the certificate and only these users are granted access.

    I used this command:

    WebVPN

    allow outside

    AnyConnect image disk0:/anyconnect-win-3.1.04072-k9.pkg 1

    AnyConnect enable

    tunnel-group-list activate

    Certificate-Group-map Cert - filter 10 company-Jabber

    map of encryption ca Cert certificate - filter 10

    name of the object attr eq ea [email protected] / * /

    The problem is that I have to go can visit his profile - if I change [email protected] / * / to

    On the AnyConnect client - I connect to the GroupURL of the connection profile Company-Jabber

    Hi Alexandre

    There are several ways to approach this and this depends somewhat on the rest of the config, for example if you have other groups of tunnel etc..

    I guess the easiest way (if it does not interfere with the rest of your configuration) is to add something like this:

    crypto ca certificate map Cert-Filter 65535 subject-name ne ""

    This would attract all users/certificates does not not from your previous rules.

    Under webvpn you map these users to another tunnel-group (connection profile):

    certificate-group-map Cert-Filter 65535 NoAccess

    And configure the NoAccess group so that access is denied (for example, by setting simultaneous connections to 0 in the corresponding Group Policy).

    Other means would be to use DAP (dynamic access policies) to pretty much the same as the certmap, or permission to LDAP (for example retrieves the user name for the certificate, then perform an LDAP search to see if the user is allowed to use the VPN - in this scenario, there is no need to list all the users on the ASA but for example you need to create a new group on your LDAP server that contains all VPN users).

    Let me know if you want to go further in the foregoing

    see you soon

    Herbert

  • ANyConnect Client certificate authentication and verify the Client against the Microsoft AD using DAP via LDAP domain membership

    Hello

    as described in the title one want to connect with AnyConnect Secure Mobility Client 3.0.2052 ASA 5540 Version 8.4 and licence Premium SSL.

    Customers using Maschine certificate to authenticate to ASA. It works very well.

    Now, I want to install a DAP to check the customer against the Microsoft AD using LDAP. I have configured the LDAP server in see ASA:

    AAA-Server LDAP protocol ldap
    AAA-Server LDAP (inside) host ldap.com
    LDAP-base-dn DC = x DC = x, DC = x DC = com
    LDAP-scope subtree
    LDAP-login-password *.
    LDAP-connection-dn *.
    microsoft server type

    I see that it works if I test via the testbotton server in ASDM and I also see in CLI "debugging ldap 255". But if I configure in DAP: AAA attribute ID:memberOf = Membre_domaine I can't see any request to the LDAP server as I try to connect with the Client und does not correspond to the DAP.

    No idea where the problem lies?

    Thanks in advance

    Hi Klaus,

    DAP will not make any call LDAP itself, it will only act based on the attributes received LDAP via the LDAP authentication or authorization.

    So you will need to enable the LDAP authorization in the tunnel - or connect to groups.

    Once you have, you can either use DAP or a map attribute LDAP for accept/deny access, see the example of these two methods.

    HTH

    Herbert

  • authentication with Cisco anyconnect

    Hello world

    With client anyconnect, how is managed authentication via the web portal? It is dependent on the Explorer (= logoff window) or IP address?

    Authentication can invoke an external server (AD or LDAP) to be able to add users or groups?

    concerning

    Hello

    For anyconnect, you will define a tunnel-group. You can set the authentication server in the tunnel group. By default, the authentictaion is made with the local database.

    tunnel-group hillvalleyvpn general-attributes     
         authentication-server-group < authentication server name>

    Hope this helps.

    Regards,
    Anisha

    P.S.: please mark this thread as answered if you feel your query is resolved. Do rate helpful posts.

  • Locking Anyconnect for AD Group authentication

    I can't find any documentation on how to get this working. I'm doing so that only a certain group of ads users are authenticated for my Anyconnect VPN on my ASA 8.2.2

    I found the documentation on how to prevent connections using the msNPAllowDialin attribute, but not how to do it based on membership in a group (memberOf)

    That's what I set up:

    ldap attribute-map AllowVPN   map-name  memberOf IETF-Radius-Class   map-value memberOf "CN=VPN Users,OU=Groups,OU=City,OU=Country,DC=us,DC=mydom,DC=net" TESTGROUP
    aaa-server ADAUTH (inside) host 10.1.1.1 server-port 389 ldap-base-dn DC=us,DC=mydom,DC=net ldap-scope subtree ldap-naming-attribute sAMAccountName ldap-login-password ***** ldap-login-dn CN=Public,OU=Service,OU=City,OU=Country,DC=us,DC=mydom,DC=net server-type microsoft ldap-attribute-map AllowVPN

    Do I need to do any kind of restrictions inside the actual group-policy TESTGROUP ?

    Jeff (if you allow).

    You can cancel/continue/banner options based on information received during the different phases of the DAP.

    http://www.Cisco.com/en/us/products/ps6120/products_white_paper09186a00809fcf38.shtml

    Note the use of "memberOf" indicating "shaped 6".

    It requires some testing but DAP looks like to me a natural way to go.

    Marcin

Maybe you are looking for