How to secure more Anyconnect VPN

Hello community.

The customer likes the Anyconnect client, but he's not really sure. Everyone can access the ASA if there the identifiers and everyone can download the client anyconnect since an app store.

Here's my question, what can do to secure more customers. For example. Pre-shared key, certificate?

Goyim do you know solutions?

Best regards patrick

Certificate if you want to lock the VPN on the device, the problem is to install certificates on all mobile devices.

Or you can implement OTP for example

Michael

Please note all useful posts

Tags: Cisco Security

Similar Questions

  • AnyConnect VPN Mobile disabled 5505 SEC no more questions

    Hi all

    I have a 5505-SEC-BUN-K9, must purchase a license of Mobile Anyconnect vpn.

    For the question now, I was able to active the anyconnect for mobile but the sec as well as features all failed. How can I check the question?

    The devices allowed for this platform:
    The maximum physical Interfaces: 8 perpetual
    VLAN: 20 unrestricted DMZ
    Double ISP: Activated perpetual
    VLAN Trunk Ports: 8 perpetual
    Guests of the Interior: perpetual unlimited
    Failover: Active / standby perpetual
    Encryption - A: enabled perpetual
    AES-3DES-Encryption: activated perpetual
    AnyConnect Premium peers: 2 perpetual
    AnyConnect Essentials: 25 perpetual
    Counterparts in other VPNS: 25 perpetual
    Total VPN counterparts: 25 perpetual
    Shared license: disabled perpetual
    AnyConnect for Mobile: 76 days allowed
    AnyConnect Cisco VPN phone: disabled perpetual
    Assessment of Advanced endpoint: disabled perpetual
    Proxy UC phone sessions: 2 perpetual
    Proxy total UC sessions: 2 perpetual
    Botnet traffic filter: disabled perpetual
    Intercompany Media Engine: Disabled perpetual
    Cluster: Disabled perpetual
     
    Internal guests: 10
    Failover: disabled
    Encryption - A: enabled
    Encryption-3DES-AES: enabled
    Security contexts: by default
    GTP/GPRS: disabled
    Premium AnyConnect peers: by default
    Other VPN peers: by default
    Assessment of Advanced endpoint: disabled
    AnyConnect for Mobile: enabled
    AnyConnect Cisco VPN phone: disabled
    Shared license Premium AnyConnect server: disabled
    Sharing license: disabled
    Proxy sessions for the UC phone: by default
    Total number of Sessions of Proxy UC: default
    AnyConnect Essentials: enabled
    Botnet traffic filter: disabled
    Intercompany media engine: disabled
    Cluster license: disabled

    Have you tried to re-apply your activation key for the license of security more?

    If you don't have it available, you may need to open a TAC case to get worldwide license team to regenerate it for you.

  • How the name of customization associated with its file in Anyconnect VPN?

    Here it is the Anyconnect VPN configuration. The customization uses a value - CBB. My question is how Anyconnect VPN define value - CBB. I found no where to define CBB in the configuration. The CBB file is in flash. If so, why I don't see the name of CBB associated configuration with the file located in flash. Thank you.

    --------------------------------------------
    CBB group policy internal
    CBB group-policy attributes
    WINS server no
    value of server DNS 172.16.1.1
    SSL VPN-tunnel-Protocol ikev2 client ssl clientless
    WebVPN
    value of the CBB URL-list
    AnyConnect ask to activate default webvpn timeout 30
    value of customization CBB

    BBC tunnel-group type remote access
    BBC-Global attributes tunnel-group
    address pool SSL_Pool1
    Group Policy - by default-CBB
    BBC webvpn-attributes tunnel-group
    customization CBB
    enable BBC Group-alias

    WebVPN customization objects are stored either in the / + CSCOU + / or / + CSCOE + / directory hidden for plaintext and encrypted items page respectively.

    They are managed through ASDM (Configuration > remote access VPN > clientless SSL VPN access > Portal)

  • How Anyconnect VPN users will connect with cisco ASA, which uses the server (domain controller) Radius for authentication

    Hi team

    Hope you do well. !!!

    currently I am doing a project which consists in CISCO ASA-5545-X, RADIUS (domain controller) server for authentication. Here, I need to configure Anyconnect VPN and host checker in cisco asa.

    1 users will connect: user advanced browser on SSL VPN pop past username and password.

    2. (cisco ASA) authentication: VPN sends credentials to the RADIUS server.

    3 RADIUS server: authentication: receipt and SSL VPN (ASA) group.

    4 connectivity creation: If employee: PC so NAW verified compliance, no PC check Assign user to the appropriate role and give IP.

    This is my requirement, so someone please guide me how to set up step by step.

    1. how to set up the Radius Server?

    2. how to configure CISCO ASA?

    Thanks in advance.

    Hey Chick,

    Please consult the following page of installation as well as ASA Radius server. The ASA end there is frankly nothing much difference by doing this.

    http://www.4salesbyself.com/1configuring-RADIUS-authentication-for-webvp...

    Hope this helps

    Knockaert

  • Can not type 'url-list' without client Anyconnect VPN setup

    Hi I am trying set Anyconnect VPN client based on Cisco documents below. There is a command like below. When I typed 'url-list', I can't enter.

    Here is example of Cisco:

    WebVPN
    allow outside
     list of URLS ServerList "WSHAWLAP" cifs://10.2.2.2 1
     list of URLS ServerList "FOCUS_SRV_1" https://10.2.2.3 2
     list of URLS ServerList "FOCUS_SRV_2" http://10.2.2.4 3

    Here's my ASA:

    VPNFW-70/PRI/Act(config-WebVPN) # url -?

    set up the mode commands/options:
    URL-block url-url-cache server

    My ASA has no choice of the list of URLs when you type '?

    Can anyone give me some suggestions? Thank you.

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

    Hello

    In the 7.x code all customizations without client was included in the running configuration.
    However, referring to this document from cisco:- http://goo.gl/XRkrcO, you can see that this command has been deprecated in 8.X ASA codes.

    The best way to configure the bookmarks will use the ASDM or create them on a server and then bring import them to ASA.

    Why we can not create bookmarks CLI?

    With the introduction of 8.x many more options have been added, allowing greater flexibility.  These new options would make the running configuration passes, so they were moved into separate xml files.  Indeed, it eliminated the ability to configure a list of bookmark via the CLI.

    For more information on this discussion, please refer to this thread: -.
    https://supportforums.Cisco.com/discussion/11010546/how-do-i-create-URL-bookmark-WebVPN-Portal-CLI

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

  • AnyConnect VPN session disconnect and reconnect

    I have a firewall cisco ASA 5525-X set up to accept the AnyConnect VPN client (IKEv2) connection.

    AnyConnect VPN client can successfully connect.

    During the 1st 10 minutes after logging in, will the client Anyconnect VPN lost VPN connection for a few seconds (ranging from 3 seconds to 10 seconds), then it automatically reconnect back. After that, no more lost connection times.

    The lost connection happened at all multiple. So far, all at least 4 show the same problem.

    It does not affect the operation of the network, but it gives an unpleasant impression for users.

    I tried to surveillance of the ASDM firewall logs, no newspaper of no errors.

    I use Wireshark to capture traffic on the client side, also no errors detected.

    Can idea how I can continue to troubleshoot this problem?

    Hi Limlayhin,

    You can go ahead and capture logs of dart. You can download the Pack of dart for the anyconnect version you use and that you run after you experience this problem. Please make sure that everything you clear observer logs event before you launch you the Anyconnect client.

    To clear the observer event logs, follow these steps:

    1. start > run > Eventvwr

    2. it will then open Event Viewer Window

    3 maximize the application logs and services and that you will find an option "Cisco Anyconnect Secure Mobility Client"

    4. right click on the Cisco Anyconnect Secure Mobility Client and select clear logs. Select clear after that.

    Once you are done with this, launch the anyconnect connection and allow the problem to happen. Once the problem occurs, unplug the anyconnect client and run newspapers dart. It will create a Zip file on your desktop (by default) and you can go through the logs of connection Anyconnect to look for the root cause.

    Let me know if it helps.

    Vishnu

  • Windows 10 anyconnect vpn client

    Can someone please explain to me how to download the windows client to vpn anyconnect 10 on my asa 5516 9.5 version and configure the asa for windows 10 clients? Any help would be greatly appreciated.

    Thank you

    Lake

    Hello Lakeram,

    It's the same process, you must download the AnyConnect that is officially supported by Windows 10, as you can see below:

    AnyConnect 3.1MR10 (3.1.10010) and later are compatible with Windows 10 official release. Technical assistance Center (TAC) will be available from 29/07/2015.

    Download package on the flash of the ASA and the move to the WebVPN as image for Windows, and then configure the Tunnel Group, group policy and the XML profile, please follow the guide below:

    - http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyc...

    - http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mob...

    Those two will help you to properly, configure the AnyConnect

    Keep me posted, please note and mark it as correct the useful message

    David Castro,

  • FirePOWER vs 7000 Series Appliances Cisco Cisco FirePOWER 5000 Series Appliances and Security more

    Good evening

    I put this thread to better understand that we enter firepower vs FirePOWER 5000 Cisco Cisco 7000 series devices Series Appliances are stronger for AMP, IPS and URL protection.

    It is accurate to say that Cisco FirePOWER 7000 series devices is more powerful and safer such as defence AMP IPS and url vs Cisco Appliances of series 5000 firepower?

    about security Plus (a feature of the router ASA5506H-SP-BUN-K8) whose security it provides?

    have a good answer

    8000 and 7000 series devices are devices that came with the acquisition of Sourcefire. Strictly, they perform the Sourcefire software only and do not have the features of the ASA (routing, AnyConnect VPN and many others). They usually also provide larger flow capacities during execution of all services of firepower (IPS, AMP, AVC and characteristics of the URL). So if you don't need all the features ASA then the 7000/8000 series devices is probably a better choice.

    The ASA5500-X series includes the best of both worlds. The ASA and Sourcefire software are running on the same box. So you can still use all of the functionality of the SAA and then also re - direct specific traffic to the Sourcefire module for additional inspection.

    I hope this helps!

    Thank you for evaluating useful messages!

  • Anyconnect VPN logs

    Hello people!

    I would like to know how I can see the story of anyconnect VPN.

    See current webvpn or ssl vpn client session, I now this command can be using, but I Don t know about history.
    ASA # display webvpn vpn-sessiondb
    or ASA # display vpn-sessiondb svc

    Thank you

    Marcio

    Hi Marcio,

    To do this you must configure a syslog server.

    Please visit this link:

    http://www.Cisco.com/c/en/us/support/docs/security/PIX-500-series-Securi...

    You would be able to extract the information from the Anyconnect users who have a link in the past.

    It will be useful.

    Kind regards

    Aditya

    Please evaluate the useful messages.

  • AnyConnect VPN application

    Hi all

    There is a single query on the anyconnect ASA 5510 deployment. We have the ASA 5510 with security more lic. and for lack of run (client) anyconnect VPN for concurrent users. It requires a separate licence for Anyconnect (client).

    5510 a security more lic.

    Firewall settings:

    AnyConnect Essentials: disabled

    AnyConnect Premium: 2

    Max VPN session: 250

    If I run anyconnect VPN it takes max 2 session. But need more sessions.

    Thank you

    Vishaw

    If you just want to use computers to connect to anyconnect using the AnyConnect client and not the clientless SSL, you only need to purchase the license AnyConnect Essentials for the amount of connection you need (supports up to 250).  If you need SSL clientless also, then you must purchase the Premium license.  If you also require that mobile phones, tabs, etc. need to connect to the AnyConnect client, then you need client AnyConnect mobility.

    The following link gives you an overview of the licnenses for the 5510 and other models ASA.

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/asa84/configuration/guide/asa_84_cli_config/intro_license.html#wp2142486

    In addition, here Pete does a good job of explaining AnyConnect licenses.

    http://www.petenetlive.com/kb/article/0000628.htm

    --

    Please do not forget to select a correct answer and rate useful posts

  • Basic question Anyconnect VPN

    Hi I'm new Anyconnect VPN. These are fundamental questions. The first step to set up the vpn is download image. What is this image? I noticed that the configuration of the VPN does not contain some general vpn configuration steps such as crypto isakmp policy and crypto ipsec etc. Maybe the image contains all of this information? If so, how to get the image? Thank you

    IPsec is not a kind of SSL. It's a total different encryption mechanism.

    IPsec uses pre-shared keys (almost always) and is so symmetric cryptography (the two peers have the same "secret"). Until there are 4-5 ears it was predominant VPN technology and is still widely used, particularly in site-to-site VPN connections.

    SSL uses a PKI (PKI) with a private key ('secret') not shared between peers and therefore asymmetric. More new remote access VPN in recent years are based on SSL. SSL does not use lines of configuration of ipsec crypto or crypto isakmp but instead relies on certificates and trustpoints.

    Complicating the landscape there is a new safer type of VPN IPsec is IKEv2. It is not widely adopted in my experience, but is increasingly used by organizations and agencies who need to comply to strict government standards.

  • Would become Anyconnect essentials Premium AnyConnect vpn on asa

    Dear team,

    We have a pair of cisco ASA 5520 with version 8.2 (5) works well with active mode / standby. As the situation requires, we intend to change the SSL vpn to clientless SSL VPN (AnyConnect Premium) to anyconnect vpn with mobile clients (IOS & Android)

    Please specify below

    (1) I have read, we cannot have two Anyconnect Essentials & AnyConnect Premium on the same system time. We need to disable accordingly to our need-pl correct me?

    (2) what is the best way to have the device for end-user client deployment? pushing of ASA or install individually on the system? Can I have the best, I mean the latest version of windows, client MAC e.t.c I shud get?

    While pushing ASA LU that much memory cache will be used, since we have IPS (AIP - SSM) modules has also installed on ASA who shud method I adopt here?

    (3) what is the exact product for license Anyconnect Essentials & customer name mobile (IOS & Android) we get from cisco?

    (4) once I get the correct license how do I active in systems? should I remove the failover command and install the license in two devices separately?

    (5) Finally, I need to authenticate vpn anyconnect essentials with LDAP that is already configured for clientless SSL VPN(AnyConnect Premium). any suggestions here?

    Below the version Sh emitted by the devices, it seems essential Anyconnect is already active... Please correct me?

    Active Firewall
    ===============

    System image file is "disk0: / asa825 - k8.bin.
    The configuration file to the startup was "startup-config '.

    Material: ASA5520, 2048 MB RAM, Pentium 4 Celeron 2000 MHz processor
    Internal ATA Compact Flash, 256 MB
    BIOS Flash Firmware Hub @ 0xffe00000, 1024 KB

    Hardware encryption device: edge Cisco ASA - 55 x 0 Accelerator (revision 0 x 0)
    Start firmware: CN1000-MC-BOOT - 2.00
    SSL/IKE firmware: CNLite-MC-Smls-PLUS - 2.03
    Microcode IPSec:-CNlite-MC-IPSECm-HAND - 2.05

    0: Ext: GigabitEthernet0/0: the address is a493.4ca3.ce0a, irq 9
    1: Ext: GigabitEthernet0/1: the address is a493.4ca3.ce0b, irq 9
    2: Ext: GigabitEthernet0/2: the address is a493.4ca3.ce0c, irq 9
    3: Ext: GigabitEthernet0/3: the address is a493.4ca3.ce0d, irq 9
    4: Ext: Management0/0: the address is a493.4ca3.ce09, irq 11
    5: Int: internal-Data0/0: the address is 0000.0001.0002, irq 11
    6: Int: internal-Control0/0: the address is 0000.0001.0001, irq 5

    The devices allowed for this platform:
    The maximum physical Interfaces: unlimited
    VLAN maximum: 150
    Internal hosts: unlimited
    Failover: Active/active
    VPN - A: enabled
    VPN-3DES-AES: enabled
    Security contexts: 2
    GTP/GPRS: disabled
    SSL VPN peers: 2
    Total of the VPN peers: 750
    Sharing license: disabled
    AnyConnect for Mobile: disabled
    AnyConnect Cisco VPN phone: disabled
    AnyConnect Essentials: enabled
    Assessment of Advanced endpoint: disabled
    Proxy sessions for the UC phone: 2
    Total number of Sessions of Proxy UC: 2
    Botnet traffic filter: disabled

    This platform includes an ASA 5520 VPN Plus license.

    =====================================================

    Firewall standby
    ================

    Updated Saturday, May 20, 11 16:00 by manufacturers
    System image file is "disk0: / asa825 - k8.bin.
    The configuration file to the startup was "startup-config '.

    Material: ASA5520, 2048 MB RAM, Pentium 4 Celeron 2000 MHz processor
    Internal ATA Compact Flash, 256 MB
    BIOS Flash Firmware Hub @ 0xffe00000, 1024 KB

    Hardware encryption device: edge Cisco ASA - 55 x 0 Accelerator (revision 0 x 0)
    Start firmware: CN1000-MC-BOOT - 2.00
    SSL/IKE firmware: CNLite-MC-Smls-PLUS - 2.03
    Microcode IPSec:-CNlite-MC-IPSECm-HAND - 2.05

    0: Ext: GigabitEthernet0/0: the address is 6073.5cab.3fae, irq 9
    1: Ext: GigabitEthernet0/1: the address is 6073.5cab.3faf, irq 9
    2: Ext: GigabitEthernet0/2: the address is 6073.5cab.3fb0, irq 9
    3: Ext: GigabitEthernet0/3: the address is 6073.5cab.3fb1, irq 9
    4: Ext: Management0/0: the address is 6073.5cab.3fb2, irq 11
    5: Int: internal-Data0/0: the address is 0000.0001.0002, irq 11
    6: Int: internal-Control0/0: the address is 0000.0001.0001, irq 5

    The devices allowed for this platform:
    The maximum physical Interfaces: unlimited
    VLAN maximum: 150
    Internal hosts: unlimited
    Failover: Active/active
    VPN - A: enabled
    VPN-3DES-AES: enabled
    Security contexts: 2
    GTP/GPRS: disabled
    SSL VPN peers: 2
    Total of the VPN peers: 750
    Sharing license: disabled
    AnyConnect for Mobile: disabled
    AnyConnect Cisco VPN phone: disabled
    AnyConnect Essentials: enabled
    Assessment of Advanced endpoint: disabled
    Proxy sessions for the UC phone: 2
    Total number of Sessions of Proxy UC: 2
    Botnet traffic filter: disabled

    This platform includes an ASA 5520 VPN Plus license.

    Thank you

    1 correct. You can run one or the other, but not both.

    2 since you have the upgrade memory to 2 GB, you should be fine perform web deployment via the pkg file method.

    3. for a 5520, you need:

    L-ASA-AC-E-5520 =
    L-ASA-AC-M-5520

    .. .to the Essentials and Mobile licenses respectively.

    4. on ASA 8.2, you need licenses for both units. If you upgrade to 8.3 + (8.4 (7) recommend at least), you can share licenses between members of a pair of HA. If you choose not to upgrade, just apply the key of activation on the rescue unit, then on the unit activates. You don't need to move on and in the failover configuration. Failover of the rescue unit status will show as ineligible briefly while he holds the new license is not the case of the active unit. Which will be resolved after you have applied the same license on the main unit. (If you were on 8.3 + would not happen at all).

    5. simply create a new connection profile for customers of Essentials by using the same AAA server group.

  • AnyConnect vpn and a tunnel vpn Firewall even outside of the interface.

    I have a (no connection) remote access vpn and ipsec tunnel connection to return to our supplier is on the same firewall outside interface.

    The problem is when users remote vpn in they are not able to ping or join the provider above the tunnel network.

    now, I understand that this is a Bobby pin hair or u turn due to traffic but I'm still not able to understand how the remote vpn users can reach the network of the provider on the tunnel that ends on the same interface where remote access vpn is also configured.

    The firewall is asa 5510 worm 9.1

    Any suggestions please.

    Hello

    You are on the right track. Turning U will be required to allow vpn clients access to resources in the L2L VPN tunnel.

    The essence is that the split tunneling to access list must include subnets of the remote VPN to peer once the user connects they have directions pertaining to remote resources on anyconnect VPN

    Please go through this post and it will guide you how to set up the u turn on the SAA.
    https://supportforums.Cisco.com/document/52701/u-turninghairpinning-ASA

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-next-generation-firewalls/100918-ASA-sslvpn-00.html

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

  • Running the logon script after AnyConnect VPN connection

    Is it possible (such as the Launcher on the IPSec client) to run a login script after establishing a VPN connection? When a user connects to the VPN client AnyConnect I need to be able run a login script to map drives. I looked the ASDM, but see anywhere that it seems that this would be configured. I thought I would check to make sure I'm not missing something.

    We lack ASA IOS v8.2 (2), ASDM 6.2 (5).

    Thank you.

    You can learn more about the AnyConnect script capabilities on the link below...

    http://www.Cisco.com/en/us/docs/security/vpn_client/AnyConnect/anyconnect25/Administration/Guide/ac03features.html#wp1068902

  • AnyConnect VPN full tunnel could not access the site to site VPN

    I have a set of AnyConnect VPN upward with no split tunneling (U-turning/crossed traffic), running 8.2.5 code.

    It works fine, but I want to allow customers to AnyConnect VPN site to site, which I was unable to access.

    I checked the IP addresses of network anyconnect are part of the tunnel on both sides.

    My logic tells me that I must not turn back traffic from the network anyconnect for the site to site VPN, but I don't know how to do this.

    Any help would be appreciated.

    Here are the relevant parts of my config:

    (Domestic network is 192.168.0.0/24,

    the AnyConnect network is 192.168.10.0/24,

    site to site VPN network is 192.168.2.0/24)

    --------------------------------------------------------------------------------------

    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface

    the DM_INLINE_NETWORK_1 object-group network
    object-network 192.168.0.0 255.255.255.0
    object-network 192.168.10.0 255.255.255.0
    inside_nat0_outbound list extended access allowed object-group ip DM_INLINE_NETWORK_1 192.168.2.0 255.255.255.0
    permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.10.0 255.255.255.0

    outside_1_cryptomap list extended access allowed object-group ip DM_INLINE_NETWORK_1 192.168.2.0 255.255.255.0

    mask 192.168.10.2 - 192.168.10.254 255.255.255.0 IP local pool AnyConnectPool
    Global 1 interface (outside)
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 1 0.0.0.0 0.0.0.0
    NAT (outside) 1 192.168.10.0 255.255.255.0
    access-outside group access component software snap-in interface outside
    Route outside 0.0.0.0 0.0.0.0 (the gateway IP) 1
    WebVPN
    allow outside
    AnyConnect essentials
    SVC disk0:/anyconnect-win-3.1.05152-k9.pkg 1 image
    SVC profiles AnyConnectProfile disk0: / anyconnect_client.xml
    enable SVC
    tunnel-group-list activate
    internal AnyConnectGrpPolicy group strategy
    attributes of Group Policy AnyConnectGrpPolicy
    WINS server no
    value of 192.168.0.33 DNS server 192.168.2.33
    VPN-session-timeout no
    Protocol-tunnel-VPN l2tp ipsec svc
    Split-tunnel-policy tunnelall
    the address value AnyConnectPool pools
    type tunnel-group AnyConnectGroup remote access
    attributes global-tunnel-group AnyConnectGroup
    address pool AnyConnectPool
    authentication-server-group SERVER1_AD
    Group Policy - by default-AnyConnectGrpPolicy
    tunnel-group AnyConnectGroup webvpn-attributes
    the aaa authentication certificate
    activation of the Group _AnyConnect alias

    Your dial-up VPN traffic as originating apears on the external interface, so I think you need to exonerate NAT pool PN traffic directed to the site to site VPN. Something like this:

     global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 nat (outside) 0 access-list outside_nat0 nat (outside) 1 192.168.10.0 255.255.255.0 access-list outside_nat0 extended permit ip any 192.168.10.0 255.255.255.0 access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.10.0 255.255.255.0

Maybe you are looking for