AnyConnect VPN - Force Transport Protocol DTLS
Hey, I use AnyConnect (2.4.1012) to connect to my 5505 (8.3.1). I want to activate DTLS as a transport protocol, I used the following commands:
Group Policy attributes AnyConnect-GrpPolicy
WebVPN
Dtls enable SVC
When I connect my Anyconnect client shows TLS as the transport protocol. The interface using CLI how can I investigate what happens? My Cipher is RSA_AES_256_SHA1 if that makes a difference.
Thank you.
Can you please share the output of "filter name svc, see the vpn-sessiondb retail" once you are connected?
In addition, if UDP/443 is blocked from the path, it will return to use TLS (TCP/443).
Tags: Cisco Security
Similar Questions
-
ASA Anyconnect VPN do not work or download the VPN client
I have a Cisco ASA 5505 that I try to configure anyconnect VPN and thought, I've changed my setup several times but trying to access my static public IP address of the external IP address to download the image, I am not able to. Also when I do a package tracer I see he has been ignored through the acl when the packets from side to the ASA via port 443, it drops because of the ACL. My DMZ so will he look like something trying to access the ASA via the VPN's going to port 443. Here is my config
XXXX # sh run
: Saved
:
ASA Version 8.4 (3)
!
hostname XXXX
search for domain name
activate pFTzVNrKdD9x5rhT encrypted password
zPBAmb8krxlXh.CH encrypted passwd
names of
!
interface Ethernet0/0
Outside-interface description
switchport access vlan 20
!
interface Ethernet0/1
Uplink DMZ description
switchport access vlan 30
!
interface Ethernet0/2
switchport access vlan 10
!
interface Ethernet0/3
switchport access vlan 10
!
interface Ethernet0/4
Ganymede + ID description
switchport access vlan 10
switchport monitor Ethernet0/0
!
interface Ethernet0/5
switchport access vlan 10
!
interface Ethernet0/6
switchport access vlan 10
!
interface Ethernet0/7
Description Wireless_AP_Loft
switchport access vlan 10
!
interface Vlan10
nameif inside
security-level 100
IP 192.168.10.1 255.255.255.0
!
interface Vlan20
nameif outside
security-level 0
IP address x.x.x.249 255.255.255.248
!
Vlan30 interface
no interface before Vlan10
nameif dmz
security-level 50
IP 172.16.30.1 255.255.255.0
!
boot system Disk0: / asa843 - k8.bin
passive FTP mode
DNS lookup field inside
DNS domain-lookup outside
DNS domain-lookup dmz
DNS server-group DefaultDNS
Name-Server 8.8.8.8
Server name 8.8.4.4
search for domain name
network obj_any1 object
subnet 0.0.0.0 0.0.0.0
network of the Webserver_DMZ object
Home 172.16.30.8
network of the Mailserver_DMZ object
Home 172.16.30.7
the object DMZ network
172.16.30.0 subnet 255.255.255.0
network of the FTPserver_DMZ object
Home 172.16.30.9
network of the Public-IP-subnet object
subnet x.x.x.248 255.255.255.248
network of the FTPserver object
Home 172.16.30.8
network of the object inside
192.168.10.0 subnet 255.255.255.0
network of the VPN_SSL object
10.101.4.0 subnet 255.255.255.0
outside_in list extended access permit tcp any newspaper object Mailserver_DMZ eq www
outside_in list extended access permit tcp any newspaper EQ 587 Mailserver_DMZ object
outside_in list extended access permit tcp any newspaper SMTP object Mailserver_DMZ eq
outside_in list extended access permit tcp any newspaper of the Mailserver_DMZ eq pop3 object
outside_in list extended access permit tcp any newspaper EQ 2525 Mailserver_DMZ object
outside_in list extended access permit tcp any newspaper of the Mailserver_DMZ eq imap4 object
outside_in list extended access permit tcp any newspaper EQ 465 Mailserver_DMZ object
outside_in list extended access permit tcp any newspaper EQ 993 Mailserver_DMZ object
outside_in list extended access permit tcp any newspaper EQ 995 object Mailserver_DMZ
outside_in list extended access permit tcp any newspaper EQ 5901 Mailserver_DMZ object
outside_in list extended access permit tcp any newspaper Mailserver_DMZ eq https object
Note access list ACL for VPN Tunnel from Split vpn_SplitTunnel
vpn_SplitTunnel list standard access allowed 192.168.10.0 255.255.255.0
pager lines 24
Enable logging
timestamp of the record
exploitation forest-size of the buffer to 8192
logging trap warnings
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
MTU 1500 dmz
local pool VPN_SSL 10.101.4.1 - 10.101.4.4 255.255.255.0 IP mask
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 647.bin
don't allow no asdm history
ARP timeout 14400
NAT (inside, outside) static source inside inside static destination VPN_SSL VPN_SSL
NAT (exterior, Interior) static source VPN_SSL VPN_SSL
!
network obj_any1 object
NAT static interface (indoor, outdoor)
network of the Webserver_DMZ object
NAT (dmz, outside) static x.x.x.250
network of the Mailserver_DMZ object
NAT (dmz, outside) static x.x.x.. 251
the object DMZ network
NAT (dmz, outside) static interface
Access-group outside_in in external interface
Route outside 0.0.0.0 0.0.0.0 x.x.x.254 1
Timeout xlate 03:00
Pat-xlate timeout 0:00:30
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
AAA-server protocol Ganymede HNIC +.
AAA-server host 192.168.10.2 HNIC (inside)
Timeout 60
key *.
identity of the user by default-domain LOCAL
Console HTTP authentication AAA HNIC
AAA console HNIC ssh authentication
Console AAA authentication telnet HNIC
AAA authentication secure-http-client
http 192.168.10.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ca trustpoint localtrust
registration auto
Configure CRL
Crypto ca trustpoint VPN_Articulate2day
registration auto
name of the object CN = vpn.articulate2day.com
sslvpnkey key pair
Configure CRL
Telnet 192.168.10.0 255.255.255.0 inside
Telnet timeout 30
SSH 192.168.10.0 255.255.255.0 inside
SSH timeout 15
SSH version 2
Console timeout 0
No vpn-addr-assign aaaDHCP-client update dns
dhcpd dns 8.8.8.8 8.8.4.4
dhcpd outside auto_config
!
dhcpd address 192.168.10.100 - 192.168.10.150 inside
dhcpd allow inside
!
dhcpd address dmz 172.16.30.20 - 172.16.30.23
dhcpd enable dmz
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
authenticate the NTP
NTP server 192.168.10.2
WebVPN
allow outside
AnyConnect image disk0:/anyconnect-linux-64-3.1.06079-k9.pkg 1
AnyConnect enable
tunnel-group-list activate
internal VPN_SSL group policy
VPN_SSL group policy attributes
value of server DNS 8.8.8.8
client ssl-VPN-tunnel-Protocol
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list vpn_SplitTunnel
the address value VPN_SSL pools
WebVPN
activate AnyConnect ssl dtls
AnyConnect Dungeon-Installer installed
AnyConnect ssl keepalive 15
AnyConnect ssl deflate compression
AnyConnect ask enable
ronmitch50 spn1SehCw8TvCzu7 encrypted password username
username ronmitch50 attributes
type of remote access service
type tunnel-group VPN_SSL_Clients remote access
attributes global-tunnel-group VPN_SSL_Clients
address VPN_SSL pool
Group Policy - by default-VPN_SSL
tunnel-group VPN_SSL_Clients webvpn-attributes
enable VPNSSL_GNS3 group-alias
type tunnel-group VPN_SSL remote access
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
inspect esmtp
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
call-home
Profile of CiscoTAC-1
no active account
http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
email address of destination [email protected] / * /
destination-mode http transport
Subscribe to alert-group diagnosis
Subscribe to alert-group environment
Subscribe to alert-group monthly periodic inventory
monthly periodicals to subscribe to alert-group configuration
daily periodic subscribe to alert-group telemetry
Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e
: endXXXX #.
You do not have this configuration:
object network DMZ nat (dmz,outside) static interface
Try and take (or delete):
object network DMZ nat (dmz,outside) dynamic interface
-
Setup for use with Cisco Anyconnect VPN IPsec
So, I had trouble setting up VPN on our ASA 5510. I would use IPsec VPN so that we don't have to worry about licensing issues, but what I have read you can do with and always use Cisco Anyconnect. My knowledge on how to set up VPN especially in iOS version 8.4 is limited, so I've been using a combination of command line and ASDM.
I am finally able to connect from a remote location, but once I log in, nothing else works. What I've read, you can use IPsec for client-to-lan connections. I use a pre-shared for this. Documentation is limited on what should happen after have connected you? Shouldn't be able to local access on the vpn connection computers? I'm trying to implement work. If I have VPN from home, should not be able to access all of the resources at work? According to me, because I used the command-line as ASDM I confused some of the configuration. In addition, I think that some of the default policies are confused me too. So I probably need a lot of help. Here is my current setup with the changed IP address and other things that are not related to deleted VPN.
NOTE: We are still testing this ASA and is not in production.
Any help you can give me is greatly appreciated.
ASA Version 8.4 (2)
!
ASA host name
domain.com domain name
!
interface Ethernet0/0
nameif inside
security-level 100
the IP 192.168.0.1 255.255.255.0
!
interface Ethernet0/1
nameif outside
security-level 0
IP 50.1.1.225 255.255.255.0
!
interface Ethernet0/2
Shutdown
No nameif
no level of security
no ip address
!
interface Ethernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
No nameif
security-level 100
IP 192.168.1.1 255.255.255.0
!
boot system Disk0: / asa842 - k8.bin
passive FTP mode
DNS domain-lookup outside
DNS server-group DefaultDNS
!
permit same-security-traffic intra-interface
!
network of the NETWORK_OBJ_192.168.0.224_27 object
subnet 192.168.0.224 255.255.255.224
!
object-group service VPN
ESP service object
the purpose of the tcp destination eq ssh service
the purpose of the tcp destination eq https service
the purpose of the service udp destination eq 443
the destination eq isakmp udp service object
!
allowed IP extended ip access list a whole
!
mask 192.168.0.225 - 192.168.0.250 255.255.255.0 IP local pool VPNPool
no failover
failover time-out period - 1
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 645.bin
don't allow no asdm history
ARP timeout 14400
NAT (inside, outside) static source any any static destination NETWORK_OBJ_192.168.0.224_27 NETWORK_OBJ_192.168.0.224_27 non-proxy-arp-search to itinerary
!
the object of the LAN network
NAT dynamic interface (indoor, outdoor)
Access-group outside_in in external interface
Route outside 0.0.0.0 0.0.0.0 50.1.1.250 1
Sysopt noproxyarp inside
Sysopt noproxyarp outdoors
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec ikev2 ipsec-proposal OF
encryption protocol esp
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 proposal ipsec 3DES
Esp 3des encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES
Esp aes encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES192
Protocol esp encryption aes-192
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 AES256 ipsec-proposal
Protocol esp encryption aes-256
Esp integrity sha - 1, md5 Protocol
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
Crypto ca trustpoint ASDM_TrustPoint0
registration auto
name of the object CN = ASA
Configure CRL
crypto ca server
Shutdown
string encryption ca ASDM_TrustPoint0 certificates
certificate d2c18c4e
864886f7 0d06092a c18c4e30 308201f3 3082015c a0030201 d 020204 2 0d 010105
0500303e 3110300e 06035504 03130741 53413535 3130312a 2 a 864886 30280609
02161b 41 53413535 31302e64 69676974 616c 6578 7472656d 65732e63 f70d0109
3131 31303036 31393133 31365a 17 323131 30303331 39313331 0d 170d 6f6d301e
365a303e 3110300e 06035504 03130741 53413535 3130312a 2 a 864886 30280609
02161b 41 53413535 31302e64 69676974 616c 6578 7472656d 65732e63 f70d0109
6f6d3081 9f300d06 092 has 8648 86f70d01 01010500 03818d b 30818902-00-818100-2
8acbe1f4 5aa19dc5 d3379bf0 f0e1177d 79b2b7cf cc6b4623 d1d97d4c 53c9643b
37f32caf b13b5205 d24457f2 b5d674cb 399f86d0 e6c3335f 031d54f4 d6ca246c
234b32b2 b3ad2bf6 e3f824c0 95bada06 f5173ad2 329c28f8 20daaccf 04c 51782
3ca319d0 d5d415ca 36a9eaff f9a7cf9c f7d5e6cc 5f7a3412 98e71de8 37150f02
03010001 300 d 0609 2a 864886 f70d0101 05050003 8181009d d2d4228d 381112a 1
cfd05ec1 0f51a828 0748172e 3ff7b480 26c197f5 fd07dd49 01cd9db6 9152c4dc
18d0f452 50f5d0f5 4a8279c4 4c1505f9 f5e691cc 59173dd1 7b86de4f 4e804ac6
beb342d1 f2db1d1f 878bb086 981536cf f4094dbf 36c5371f e1a0db0a 75685bef
af72e31f a1c4a892 d0acc618 888b53d1 9b 888669 70e398
quit smoking
IKEv2 crypto policy 1
aes-256 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 10
aes-192 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 20
aes encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 30
3des encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 40
the Encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
Crypto ikev2 activate out of service the customer port 443
Crypto ikev2 access remote trustpoint ASDM_TrustPoint0
Crypto ikev1 allow outside
IKEv1 crypto policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 10
Console timeout 0
management-access inside
SSL-trust outside ASDM_TrustPoint0 point
WebVPN
allow outside
AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
AnyConnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 2
AnyConnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 3
profiles of AnyConnect VPN disk0: / devpn.xml
AnyConnect enable
tunnel-group-list activate
internal VPN group policy
attributes of VPN group policy
value of server WINS 50.1.1.17 50.1.1.18
value of 50.1.1.17 DNS server 50.1.1.18
Ikev1 VPN-tunnel-Protocol, l2tp ipsec ikev2 ssl-client
digitalextremes.com value by default-field
WebVPN
value of AnyConnect VPN type user profiles
always-on-vpn-profile setting
privilege of xxxxxxxxx encrypted password username administrator 15
VPN1 xxxxxxxxx encrypted password username
VPN Tunnel-group type remote access
General-attributes of VPN Tunnel-group
address (inside) VPNPool pool
address pool VPNPool
LOCAL authority-server-group
Group Policy - by default-VPN
VPN Tunnel-group webvpn-attributes
enable VPN group-alias
Group-tunnel VPN ipsec-attributes
IKEv1 pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
class-map ips
corresponds to the IP access list
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
Review the ip options
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
inspect the http
class ips
IPS inline help
class class by default
Statistical accounting of user
I would recommend buy AnyConnect Essentials. The cost of the license is nominal - list of US $150 for the 5510. (piece number L-ASA-AC-E-5510 =)
Meawwhile you can use the Cisco VPN client inherited with IKEv1 IPSec remote access VPN using profiles *.pcf.
I believe you can also use the client Anyconnect client SSL or DTLS transport access remotely (non-IPsec) without having to buy the license Anyconnect Essentials for your ASA focus.
As an aside, note that if you want to use AnyConnect Mobile (e.g. for iPhone, iPad, Android, Blackberry etc.clients) you will also get the additional license for it (L-ASA-AC-M-5510 =, also price US $150)
-
Quality of VoIP BOUNCING over AnyConnect VPN problems
Hello:
I'm in the middle of the conversion of our environment of VPN for remote access of the former client VPN Cisco AnyConnect (ver. 3.1.01065) VPN's IPSec. I have a number of beta-testers on the new AnyConnect VPN environment, and we have quality problems of intermittent VoIP (IP Communicator 8.5.3 on remote laptops) with the HQ VPN. While I realize that we miss the calls over the Internet, which is a network of 'better' and can not control the Inernet QoS, the special thing is the VoIP call on the former that ipsec VPN seems to work very well 99% of the time.
I did a series of G.729 calls on the old client IPSec and customer AC, with the same laptop, using the same remote access connection. The "VPN server" for the IPSec VPN is an ASA5520 (8.0 (4)), on a connection of 100 Mbps with plenty of reserve, which runs also firewall services for an office of about 500 people and a small DMZ environment. The VPN server that is handling AnyConnect VPN is a new ASA5515-X (8.6 (1) 2), using the same channel of 100 Mbit/s Internet and running VPN services only. When you call running of tests on the old IPSec VPN, the jitter of appeal is pretty consistent, where jitter ave runs about 10 ms and jitter peak running 30-40ms. On the client ACTS, so that 'good' calls run about the same jitter as the old VPN, called the 'bad' (drops intermittent speaker, sometimes sounds 'mechanized'), which produce about 1 of evey 5 calls, run jitter ave to about 120-150ms and jitter of tip of 300-400 m for info, I don't see no packet loss to talk, just call jitter is through the roof. While in most cases, this could be written off as a "bad Internet connection", on the pretty old VPN tests prove a lot is not the issue.
That said, anyone has an idea why the quality of calls is sometimes wrong via the AnyConnect VPN? Is there pest practices that I can work from, or any settings you can recommend? Thank you.
Well, there are several things in our implementation that could help if possible, although I think you can open the case of the TAC, we saw some strange behaviors.
Things to enable the audit side ASA/SSL:
-DTLS - check if it is enabled and WORK (see the det filter name NAME_HERE anyconnect vpn-sessiondb)
see if the packets are tunneled by the DTLS Protocol not TLS. The datagram transport is much better suited for performance.
-Compression - so we see a lot of deployments with it enabled us say this as much as we can. Compression is for links to bandwidth low latency. In the modern internet, it should be used with caution.
-check the ASP drop table on ASA (fall of claire asp, run the "show asp drop' rest and during the period of low performance monitor.)
-additional recording "class... ssl connection. "can give you greater participation.
-See the proto ssl_np - good starting point count
the list goes on and.
What is important to understand, is that the problem is with the traffic on the wire or from the use of SSL.
Sniffer traces are essential.
M.
-
Hi all, I'm going to have bad configure anyconnect VPN on my router. I'm CCENT pre level and especially followed a tutorial, but feel I'm missing something simple here.
It's a fairly simple installation on a Cisco No. 2851 - faces of a single interface my LAN 192.168.1.0/24, the other has a public IP address.
I created a network 192.168.2.0/24 VPN users, mainly to have phones Android connection of their mobile phone networks, and have access to the servers/security cameras/etc by using their local IP addresses. When my phone connects, it gets an IP address and is connected, but is not communicating with my LAN correctly.
The VPN client can ping 192.168.1.254 (the router's LAN IP) - but not the other devices on the network. However, the devices on my LAN can ping the VPN clients to their address 192.168.2.x.
Here's a copy of my current config, I have reorganized some elements with #s. Also pasted my ip sh road under him. Do not forget that I am a novice, please forgive the hack :)
Router (config) #do sh run
Building configuration...Current configuration: 5782 bytes
!
! Last modification of the configuration at 02:24:24 UTC Sat Sep 5 2015 by #.
!
version 15.1
horodateurs service debug datetime msec
Log service timestamps datetime msec
no password encryption service
!
host name #.
!
boot-start-marker
boot-end-marker
!
!
enable secret $5 1$ 0 #.
!
AAA new-model
!
!
AAA authentication login default local
AAA authentication login local sslvpn
AAA authorization exec default local
!
!
!
!
!
AAA - the id of the joint session
!
!
dot11 syslog
no ip source route
!
!
IP cef
!
DHCP excluded-address 192.168.1.200 IP 192.168.1.254
DHCP excluded-address 192.168.1.1 IP 192.168.1.10
!
pool of dhcp IP LAN
network 192.168.1.0 255.255.255.0
Server DNS 192.168.1.254
by default-router 192.168.1.254
!
!
IP domain name # '.com'
host IP Switch 192.168.1.253
8.8.8.8 IP name-server
block connection-for 2000 tent 4 within 60
connection access silencer-class SSH_MGMT
No ipv6 cef
!
Authenticated MultiLink bundle-name Panel
!
!
!
!
!
!
!
!
!
!
!
voice-card 0
!
Crypto pki token removal timeout default 0
!
Crypto pki trustpoint TRUSTPOINT-MY
enrollment selfsigned
Serial number
name of the object CN = 117-certificate
crl revocation checking
rsakeypair my-rsa-keys
!
!
MY-TRUSTPOINT crypto pki certificate chain
certificate self-signed 01
###################################################
quit smoking
!
!
license udi pid CISCO2851 sn FTX1026A54Y
# 5 secret username $1$ yv # E9.
# 5 secret username $1$ X0nL ###kO.
!
redundancy
!
!
property intellectual ssh version 2
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
LAN description
IP 192.168.1.254 255.255.255.0
IP nat inside
No virtual-reassembly in ip
automatic duplex
automatic speed
!
interface GigabitEthernet0/1
WAN description
No dhcp client ip asks tftp-server-address
No dhcp ip client application-domain name
DHCP IP address
IP access-group ACL-WAN_INTERFACE in
no ip redirection
no ip proxy-arp
NAT outside IP
No virtual-reassembly in ip
automatic duplex
automatic speed
No cdp enable
!
interface Serial0/0/0
no ip address
Shutdown
!
interface virtual-Template1
!
local IP 192.168.2.100 WEBVPN-POOL pool 192.168.2.110
IP forward-Protocol ND
no ip address of the http server
no ip http secure server
!
!
The dns server IP
IP nat inside source list INSIDE_NAT_ADDRESSES interface GigabitEthernet0/1 overload
!
IP access-list standard INSIDE_NAT_ADDRESSES
permit 192.168.1.0 0.0.0.255
permit 192.168.2.0 0.0.0.255
IP access-list standard SSH_MGMT
permit 192.168.1.0 0.0.0.255
permit 207.210.0.0 0.0.255.255
!
IP extended ACL-WAN_INTERFACE access list
deny udp any any eq snmp
TCP refuse any any eq field
TCP refuse any any eq echo
TCP refuse any any day eq
TCP refuse any any eq chargen
TCP refuse any any eq telnet
TCP refuse any any eq finger
deny udp any any eq field
deny ip 127.0.0.0 0.255.255.255 everything
deny ip 192.168.0.0 0.0.255.255 everything
permit any any eq 443 tcp
allow an ip
!
exploitation forest esm config
NLS RESP-timeout 1
CPD cr id 1
!
!
!
!
!
!
!
control plan
!
!
!
!
profile MGCP default
!
!
!
!
!
access controller
Shutdown
!
!
!
Line con 0
exec-timeout 0 0
Synchronous recording
line to 0
exec-timeout 0 0
Synchronous recording
line vty 0 4
exec-timeout 0 0
Synchronous recording
entry ssh transport
line vty 5 15
exec-timeout 0 0
Synchronous recording
entry ssh transport
!
Scheduler allocate 20000 1000
!
Gateway Gateway-WebVPN-Cisco WebVPN
IP interface GigabitEthernet0/1 port 443
SSL rc4 - md5 encryption
SSL trustpoint TRUSTPOINT-MY
development
!
WebVPN install svc flash:/webvpn/anyconnect-linux-3.1.03103-k9.pkg sequence 1
!
WebVPN context Cisco WebVPN
title "Firewall.cx WebVPN - powered by Cisco"
SSL authentication check all
!
list of URLS "rewrite".
!
ACL "ssl - acl.
ip permit 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0
Licensing ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0
!
login message "Cisco Secure WebVPN"
!
webvpnpolicy political group
functions required svc
filter tunnel ssl - acl
SVC-pool of addresses 'WEBVPN-POOL' netmask 255.255.255.0
generate a new key SVC new-tunnel method
SVC split include 192.168.1.0 255.255.255.0
Group Policy - by default-webvpnpolicy
AAA authentication list sslvpn
Gateway Cisco WebVPN bridge
Max-users 5
development
!
endGateway of last resort is #. ###. ###. # network 0.0.0.0
S * 0.0.0.0/0 [254/0] via #. ###. ###.1
(###ISP))) is divided into subnets, subnets 1
S (# #ISP #) [254/0] via (# publicgateway #) GigabitEthernet0/1
###.###.0.0/16 is variably divided into subnets, 2 subnets, 2 masks
C ###.###.###.0/23 is directly connected, GigabitEthernet0/1
The ###.###.###.###/32 is directly connected, GigabitEthernet0/1
192.168.1.0/24 is variably divided into subnets, 2 subnets, 2 masks
C 192.168.1.0/24 is directly connected, GigabitEthernet0/0
The 192.168.1.254/32 is directly connected, GigabitEthernet0/0
192.168.2.0/32 is divided into subnets, subnets 1
S 192.168.2.100 [0/0] via 0.0.0.0, Virtual Network1can you try to disable the FW on your internal lan hosts and then try and ping from users of vpn client
-
Phones AnyConnect VPN cannot connect to network ASA high-speed AT &; T uverse
Phones AnyConnect VPN are configured to connect to the ASA 5510 running 8.4 (4), and it uses the Active Directory credentials to connect. The connection is successful external ISP systems including Comcast and smaller independent service providers. However, when all of us at the AT & T uverse service take this phone 7965 even at home it networks fails to make any connection to the ASA at all. A capture of packets on the ASA shows no activity connection to the IP address of our uverse.
What's more, is that we can successfully authenticate the VPN of the phone when using the local account credentials (e.g. username admin password * priv 15) that are entered on the SAA. AT & T said that they are not blocking the ports. It is the confusion that this works for users to access local connection, but not with A/D.
So I guess the question is: what is the first handshake TCP/UDP composed when a Cisco IP phone links AnyConnect SSL to an ASA and negotiates the authentication of the number of A/D? For example, what are the port numbers used in this handshake? I couldn't find all the diagrams illustrating the HRT and the RFC for DTLS do not seem to have the answer either.
Thanks in advance.
-Athonia
Note: we have a TAC case open currently with subject ASA 5510 VPN Edition w / 250 annyconnect user - SSL VPN for phones. Configuration
I too ran on this issue and here is a description of what I found.
If you use automatic network detection first trys phone ping the TFTP server, he has learned from the DHCP server or manually set with the parameter of the alternate TFTP server. If the TFTP server is accessible the VPN will not connect and will not allow the user to connect manually.
ATT Uverse use DHCP option 150, the same option as Cisco UC uses to automatically set the TFTP servers, to locate the local home gateway so that the STB can join him. For this reason, you should notice that when you have a VPN phone on the network and view network settings the IP address of the TFTP server is the IP address of your default gatewat (The ATT router).
Because of the automatic detection of network works in ping the TFTP server that the phone will always think that it is connected to the local network. The workaround is to manually set the TFTP server on the phone * to the IP address that the TFTP server would have been if she had leared it from the DHCP server on your corporate network. The reason you should do this instead of just using a Bogon address, is that once the VPN is connected it tryes to register to the address that you specified.
Please let me know if this solves your problem as it did in our case.
* If you do not know how to set the TFTP replacement setting you must first select the "replacement" TFTP protocol and press on * #. This will allow you to change the default no to Yes. The below named parameter TFTP Server 1 will then allow you to manually specify the address.
-
Cisco Anyconnect VPN vs IPSec AnyConnect SSL
Hello
Can someone tell me what is the difference between the Anyconnect SSL VPN and Anyconnect VPN IPSec.
When we use one and not the other?
Thank you very much.
Best regards.
Hello Abdollah,
AnyConnect based on the SSL protocol is called Anyconnect SSL VPN and if you deploy Anyconnect with the IPSec protocol, it is called IKev2.
AnyConnect (via IKEv2 or SSLVPN) does not use a pre shared key to authenticate the user. A certificate will be used to authenticate the user and the ASA of + pass and the certificate used to authenticate the user. The XML profile is necessary just to use the Anyconnect IKEv2 client rather than the default of SSL when connecting to the ASA.
Here is the doc announced some of the benefits of using Anyconnect with Ikev2 rather than SSL VPN.
http://www.Cisco.com/en/us/docs/iOS-XML/iOS/sec_conn_ike2vpn/configuration/15-2mt/sec-cfg-IKEv2-Flex.html#GUID-6548042E-1E4C-416A-8347-00DCF96F04DFIn essence, if you have a simple deployment, then you can go with the installation of SSL VPN and if you want to take advantage of additional features, you can use Anyconnect with IPSec.
Kind regards
Dinesh MoudgilPS Please rate helpful messages.
-
Cannot type 'functions' without client Anyconnect VPN setup
Hi I am trying set Anyconnect VPN client based on Cisco documents below. There is a command like below. When I typed 'function', I can't enter. Can anyone give me some suggestions? Thank you.
internal GroupPolicy1 group strategy
attributes of Group Policy GroupPolicy1
Protocol-tunnel-VPN IPSec l2tp ipsec webvpn
WebVPN
functions entry url file-access file-exploration of the mapi port forward files filter entry
HTTP-proxy download automatic citrixhttp://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...
ASA-recent versions, it is configured without the keyword "functions":
asa(config-group-policy)# webvpn asa(config-group-webvpn)# ? Group-policy WebVPN commands: ... file-browsing Allow browsing for file servers and shares file-entry Allow user entry of file server names to access filter Configure the name of the webtype access-list ... port-forward Configure the name of the Port Forwarding applet and auto-download options ... url-entry Control the ability of the user to enter any HTTP/HTTPS URL url-list Configure a list of WebVPN servers/URLs
-
How the name of customization associated with its file in Anyconnect VPN?
Here it is the Anyconnect VPN configuration. The customization uses a value - CBB. My question is how Anyconnect VPN define value - CBB. I found no where to define CBB in the configuration. The CBB file is in flash. If so, why I don't see the name of CBB associated configuration with the file located in flash. Thank you.
--------------------------------------------
CBB group policy internal
CBB group-policy attributes
WINS server no
value of server DNS 172.16.1.1
SSL VPN-tunnel-Protocol ikev2 client ssl clientless
WebVPN
value of the CBB URL-list
AnyConnect ask to activate default webvpn timeout 30
value of customization CBBBBC tunnel-group type remote access
BBC-Global attributes tunnel-group
address pool SSL_Pool1
Group Policy - by default-CBB
BBC webvpn-attributes tunnel-group
customization CBB
enable BBC Group-aliasWebVPN customization objects are stored either in the / + CSCOU + / or / + CSCOE + / directory hidden for plaintext and encrypted items page respectively.
They are managed through ASDM (Configuration > remote access VPN > clientless SSL VPN access > Portal)
-
One can explain the value command Anyconnect VPN etc. "vpn-filter"?
Hello
In Anyconnect VPN, there are two commands that I pointed out wild "BOLD". I checked it with "?" behind the command. But I still don't understand it and why it should be used here. I hope someone can explain it to me. Thank you
Internal authority of group-policy
attributes of authority-group policy
VPN-filter Access_List value
clientless ssl VPN tunnel-Protocol
value of group-lock Third_Party
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list County_Access
-Here is what I checked:
Enter the name of an existing tunnel group for users to connect with group-lock
Enter the name of an ACL configured to apply to VPN-filter users
Vpn-filter adds an extra layer of security for VPN remote access by adding an access list to all traffic that comes from remote users.
For example, you can restrict to a subnet (which you can do in the tunnel-group) can still say that the HTTP servers, B and C (for which you would use the access list specified by the filter-vpn).
The group-lock prevents users defined to choose policies other group available in the drop-down list.
For example, you can restrict VPN users generally use a group without restriction for IT admins. Or allow only external suppliers to connect to a group designated to them that restricts access to a set of resources in the DMZ.
-
Lock the AnyConnect VPN with broader access list
I'm trying to lock my AnyConnect VPN interface. I use the split tunneling. I want only to http tunnel traffic to an external http server we have and ftp to another external server behave. I don't want anything else through the tunnel or anywhere else allowed on our network. My current setup, I can connect to the vpn and the servers ping external ip address, but not by name. I can also not navigate anywhere else while I'm connected. It is not imperative for me to navigate anywhere else, when you are connected, but I need to allow only access specified above.
Configuration:
attributes Anyconnect-group policy
VPN-tunnel-Protocol svc webvpn
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list WebAccessVPN
WebVPN
list of URLS no
SVC request to enable default webvpn
WebAccessVPN list extended access allow icmp disable any newspaper host FTP - EXT object-group Ping_and_Trace
External FTP FTP access WebAccessVPN-list comment
WebAccessVPN list extended access permitted tcp disable no matter what newspaper to host FTP - EXT object-group DM_INLINE_TCP_2
WebAccessVPN list extended access allow icmp disable any newspaper host LICENSING-EXT object-group Ping_and_Trace
WebAccessVPN list extended access allowed object-group TCPUDP any LICENSING-EXT eq www log disable host
WebAccessVPN list extended access deny ip any object-group DM_INLINE_NETWORK_1
You can use the vpn filter under the attributes of political group. In the vpn-filter, you can reference the access list you created.
-
The anyconnect vpn easy vpn Remote communication problem
Hi team,
I have a problem of communication of the anyconnect vpn easy vpn Remote I´ll explain better below and see the attachment
topology:(1) VPN Tunnel between branch HQ - That´s OK
(2) VPN Tunnel between Client AnyConnect to HQ - that s OKThe idea is that the Anyconnect Client is reaching the local Branch Office network, but has not reached.
Communication is established just when I begin a session (icmp or rdp) branch to the AnyConnect Client,.
in this way, the communication is OK, but just for a few minutes.Could you help me?
Below the IOS version and configurationsASA5505 Version 8.4 (7) 23 (Headquarters)
ASA5505 Version 7.0000 23 (branch)Configuration of the server easy VPN (HQ) *.
Crypto dynamic-map DYNAMIC - map 5 set transform-set ESP-AES-256-SHA ikev1
Crypto card outside-link-2_map 1 ipsec-isakmp DYNAMIC-map Dynamics
Crypto map link-outside-2_map-65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
Crypto map interface outside-link-2_map outside-link-2ACL_EZVPN list standard access allowed 10.0.0.0 255.255.255.0
ACL_EZVPN list standard access allowed 192.168.1.0 255.255.255.0
ACL_EZVPN list standard access allowed 192.168.50.0 255.255.255.0
ACL_EZVPN list standard access allowed 10.10.0.0 255.255.255.0internal EZVPN_GP group policy
EZVPN_GP group policy attributes
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list ACL_EZVPN
allow to NEM
type tunnel-group EZVPN_TG remote access
attributes global-tunnel-group EZVPN_TG
Group Policy - by default-EZVPN_GP
IPSec-attributes tunnel-group EZVPN_TG
IKEv1 pre-shared-key *.object-group network Obj_VPN_anyconnect-local
object-network 192.168.1.0 255.255.255.0
object-network 192.168.15.0 255.255.255.0
object-group network Obj-VPN-anyconnect-remote
object-network 192.168.50.0 255.255.255.0
the NAT_EZVPN_Source object-group network
object-network 192.168.1.0 255.255.255.0
object-network 10.10.0.0 255.255.255.0
the NAT_EZVPN_Destination object-group network
object-network 10.0.0.0 255.255.255.0
destination of Obj_VPN_anyconnect local Obj_VPN_anyconnect-local static NAT (inside, outside-link-2) Obj - VPN static source -.Remote AnyConnect VPN - Obj anyconnect-remote non-proxy-arp-search to itinerary
destination NAT (inside, outside-link-2) static source NAT_EZVPN_Source NAT_EZVPN_Source NAT_EZVPN_Destination staticNAT_EZVPN_Destination no-proxy-arp-search to itinerary
NAT (outside-link-2, outside-link-2) static source Obj-VPN-anyconnect-remote Obj-VPN-anyconnect-remote static destinationNAT_EZVPN_Destination NAT_EZVPN_Destination non-proxy-arp-search route
Configuration VPN AnyConnect (HQ) *.
WebVPN
Select the outside link 2
by default-idle-timeout 60
AnyConnect essentials
AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
AnyConnect profiles Remote_Connection_for_TS_Users disk0: / remote_connection_for_ts_users.xml
AnyConnect enable
tunnel-group-list activatetunnel of splitting allowed access list standard 192.168.1.0 255.255.255.0
tunnel of splitting allowed access list standard 192.168.15.0 255.255.255.0
tunnel of splitting allowed access list standard 10.0.0.0 255.255.255.0internal clientgroup group policy
attributes of the strategy of group clientgroup
WINS server no
value of server DNS 192.168.1.41
client ssl-VPN-tunnel-Protocol
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value split tunnel
ipconnection.com.br value by default-field
WebVPN
AnyConnect Dungeon-Installer installed
time to generate a new key 30 AnyConnect ssl
AnyConnect ssl generate a new method ssl key
AnyConnect value Remote_Connection_for_TS_Users type user profiles
AnyConnect ask flawless anyconnecttype tunnel-group sslgroup remote access
tunnel-group sslgroup General-attributes
address vpnpool pool
authentication-server-group DC03
Group Policy - by default-clientgroup
tunnel-group sslgroup webvpn-attributes
enable IPConnection-vpn-anyconnect group-aliasobject-group network Obj_VPN_anyconnect-local
object-network 192.168.1.0 255.255.255.0
object-network 192.168.15.0 255.255.255.0
object-group network Obj-VPN-anyconnect-remote
object-network 192.168.50.0 255.255.255.0
the NAT_EZVPN_Source object-group network
object-network 192.168.1.0 255.255.255.0
object-network 10.10.0.0 255.255.255.0
the NAT_EZVPN_Destination object-group network
object-network 10.0.0.0 255.255.255.0
destination of Obj_VPN_anyconnect local Obj_VPN_anyconnect-local static NAT (inside, outside-link-2) Obj - VPN static source -.Remote AnyConnect VPN - Obj anyconnect-remote non-proxy-arp-search to itinerary
destination NAT (inside, outside-link-2) static source NAT_EZVPN_Source NAT_EZVPN_Source NAT_EZVPN_Destination staticNAT_EZVPN_Destination no-proxy-arp-search to itinerary
NAT (outside-link-2, outside-link-2) static source Obj-VPN-anyconnect-remote Obj-VPN-anyconnect-remote static destinationNAT_EZVPN_Destination NAT_EZVPN_Destination non-proxy-arp-search route
Hello
communication works when you send the traffic of easyvpn derivation because it froms the IPSEC SA to pool local subnet and anyconnect HQ. The SA formed only when the branch initiates the connection as it's dynamic peer connection to HQ ASA.
When there no SA between branch and HQ for this traffic, HQ ASA has no idea on where to send the anyconnect to network traffic.
I hope this explains the cause.
Kind regards
Averroès.
-
Cisco 1700 Setup as a hub for Cisco Anyconnect VPN
The complete configuration for the router is attached. Additional configuration includes forwarding port 443 (the two tcp/udp), udp 4500, udp 500 and udp 50 to 192.168.1.20.
Objective: Configure Cisco 1700 router as a VPN server, which a Cisco Anyconnect VPN client in. The VPN server is behind a NAT.
Question 1: The Cisco Anyconnect client pulls its set of configuration of the router? I just need to point to the correct IP address and hit connect and it will do the rest? If not, what additional client side configuration must be done? I noticed, it tries to connect on port 443 to my router, but I don't really know why and I know that my router is not listening on this port, so I know I'm missing something:-D.
Question 2: What are the features specifically include easy vpn server? I am confused as to exactly what it is. From what I can tell when you configure easy vpn server you simply set up a regular VPN.
Question 3: Cisco Easy VPN remote has something to do with Cisco Anyconnect or they are completely distinct?
Sorry for the newbie questions. It's really hard to understand the different systems and features on it and most of the examples I found dealt with the VPN router to router rather than configurations just for computers of end users, but I'll be the first to admit that I am new on this hahaha.
Thanks for your help.
PS: Any comment on the misconfigs are welcome. I'm still trying to understand fully exactly what each command does.
Grant
Grant,
AnyConnect can do SSLVPN or IPsec (with IKEv2), ezvpn is all about IKEv1, it won't work.
There (part 3) customers who will be able to connect to ezvpn, as well as the former customer Cisco VPN, but AC is not.
BTW... it's not 50/UDP, this is IP protocol 50 (or sometimes 51) - ESP (or AH).
You don't have TCP and UDP 443 for IPsec, but you may need them for SSL.
And seriously... series of 1700? Wow, this is a 'retro' kit :-) Support ended 6 years ago.
M.
-
AnyConnect VPN full tunnel could not access the site to site VPN
I have a set of AnyConnect VPN upward with no split tunneling (U-turning/crossed traffic), running 8.2.5 code.
It works fine, but I want to allow customers to AnyConnect VPN site to site, which I was unable to access.
I checked the IP addresses of network anyconnect are part of the tunnel on both sides.
My logic tells me that I must not turn back traffic from the network anyconnect for the site to site VPN, but I don't know how to do this.
Any help would be appreciated.
Here are the relevant parts of my config:
(Domestic network is 192.168.0.0/24,
the AnyConnect network is 192.168.10.0/24,
site to site VPN network is 192.168.2.0/24)
--------------------------------------------------------------------------------------
permit same-security-traffic inter-interface
permit same-security-traffic intra-interfacethe DM_INLINE_NETWORK_1 object-group network
object-network 192.168.0.0 255.255.255.0
object-network 192.168.10.0 255.255.255.0
inside_nat0_outbound list extended access allowed object-group ip DM_INLINE_NETWORK_1 192.168.2.0 255.255.255.0
permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.10.0 255.255.255.0outside_1_cryptomap list extended access allowed object-group ip DM_INLINE_NETWORK_1 192.168.2.0 255.255.255.0
mask 192.168.10.2 - 192.168.10.254 255.255.255.0 IP local pool AnyConnectPool
Global 1 interface (outside)
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 1 0.0.0.0 0.0.0.0
NAT (outside) 1 192.168.10.0 255.255.255.0
access-outside group access component software snap-in interface outside
Route outside 0.0.0.0 0.0.0.0 (the gateway IP) 1
WebVPN
allow outside
AnyConnect essentials
SVC disk0:/anyconnect-win-3.1.05152-k9.pkg 1 image
SVC profiles AnyConnectProfile disk0: / anyconnect_client.xml
enable SVC
tunnel-group-list activate
internal AnyConnectGrpPolicy group strategy
attributes of Group Policy AnyConnectGrpPolicy
WINS server no
value of 192.168.0.33 DNS server 192.168.2.33
VPN-session-timeout no
Protocol-tunnel-VPN l2tp ipsec svc
Split-tunnel-policy tunnelall
the address value AnyConnectPool pools
type tunnel-group AnyConnectGroup remote access
attributes global-tunnel-group AnyConnectGroup
address pool AnyConnectPool
authentication-server-group SERVER1_AD
Group Policy - by default-AnyConnectGrpPolicy
tunnel-group AnyConnectGroup webvpn-attributes
the aaa authentication certificate
activation of the Group _AnyConnect aliasYour dial-up VPN traffic as originating apears on the external interface, so I think you need to exonerate NAT pool PN traffic directed to the site to site VPN. Something like this:
global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 nat (outside) 0 access-list outside_nat0 nat (outside) 1 192.168.10.0 255.255.255.0 access-list outside_nat0 extended permit ip any 192.168.10.0 255.255.255.0 access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.10.0 255.255.255.0
-
AnyConnect VPN for Cisco ASA 5505 refused connections
I'm trying to set up my Cisco 5505 with AnyConnect VPN client VPN access. Here is the relevant information of my config:
interface Vlan2
mac-address xxxx.xxxx.xxxx
nameif outside
security-level 0
ip address A.A.A.A 255.255.255.240
!
access-list outside_access_in extended permit tcp any host C.C.C.C eq pptp
access-list outside_access_in extended permit tcp any host C.C.C.C eq https
access-list outside_access_in extended permit tcp any host C.C.C.C eq ftp
access-list outside_access_in extended permit tcp any host C.C.C.D eq https
access-list outside_access_in extended permit tcp any host C.C.C.D eq ftp
access-list outside_access_in extended permit tcp any host C.C.C.D eq www
access-list outside_access_in extended permit tcp any host C.C.C.C eq smtp
access-list outside_access_in extended permit icmp any any
access-list outside_access_in extended permit tcp any host C.C.C.D eq ssh
access-list outside_access_in extended permit tcp any host C.C.C.D eq 8080
access-list outside_access_in extended permit gre any host C.C.C.C
access-list outside_access_out extended permit ip any any
access-list inside_access_in extended permit ip any any
access-list inside_access_in extended permit ip any interface outside
access-list inside_access_out extended permit ip any anyaccess-group inside_access_in in interface inside
access-group inside_access_out out interface inside
access-group outside_access_in in interface outside
access-group outside_access_out out interface outsidewebvpn
enable inside
enable outside
svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1
svc enablegroup-policy DfltGrpPolicy attributes
dns-server value X.X.X.X
vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
split-tunnel-policy tunnelspecified
split-tunnel-network-list value
address-pools value palm
webvpn
svc rekey time 30
svc rekey method ssl
svc ask enable default webvpnpolicy-map global_policy
class inspection_default
inspect pptp
inspect http
inspect icmp
inspect ftp
!When I try to connect, I get this error in the real-time log viewer:
TCP access denied by ACL from X.X.X.X/57356 to outside:A.A.A.A/443
Here are the details of the license:
Licensed features for this platform:
Maximum Physical Interfaces : 8
VLANs : 3, DMZ Restricted
Inside Hosts : Unlimited
Failover : Disabled
VPN-DES : Enabled
VPN-3DES-AES : Enabled
SSL VPN Peers : 2
Total VPN Peers : 10
Dual ISPs : Disabled
VLAN Trunk Ports : 0
Shared License : Disabled
AnyConnect for Mobile : Disabled
AnyConnect for Linksys phone : Disabled
AnyConnect Essentials : Disabled
Advanced Endpoint Assessment : Disabled
UC Phone Proxy Sessions : 2
Total UC Proxy Sessions : 2
Botnet Traffic Filter : DisabledThis platform has a Base license.
Can someone tell me what I am doing wrong or what access list I'm missing?
I have two Cisco ASA 5510 firewall with a similar setup configuration and the AnyConnect SSL VPN works great.
Hi Matt,
You are probably landing on the tunnel-group by default - you will need to indicate which group to connect to the client. This can be done in different ways - I see that you already have a defined group aliases, but to be able to use that you must configure:
WebVPN
tunnel-group-list activate
Alternatively, if you have only a single group, you can add 'group-url https://yourasa.yourcompany.com/ permit' to the webvpn attributes tunnel-group.
HTH
Herbert
Maybe you are looking for
-
Connection / syncing my iphone to Mac
My husband and I had an iPhone 6s. Previously, he was an Apple ID and is able to connect / sync to our MacBook Pro iCal and iTunes. I created my own Apple ID, but I can't seem to synchronize with our iCal on the Macbook Pro. How to fix this?
-
DVD Super Multi Drive problem - cannot access any CD - Satellite A100
Hi, 1st post: My Satellite A100 features a DVD Super Multi drive, which worked very well. However I cannot now access any CD - error message ' D: / is not accessible. The request could not be performed because of an i/o device error."is displayed. Ho
-
HP Officejet 8610: what impression
Under windows 7 and HP 8600 (I think) I could see what was printing and what was waiting to print. Under windows 10 and HP 8610 I can't find the option to do this. Thanks.
-
How can I fix code 643 - stop updates?
How can I fix code 643 - stop updates?
-
How can I lock the position of the icons on the desktop?
How can I lock the position of the desktop icons in Windows 7 Home Premium? In Vista, they would stay as I had arranged them but now everytime I restart my computer they all line up on the left side of my desk.