На чтение 13 мин Просмотров 20.9к.
Максим aka WisH
Высшее образование по специальности «Информационные системы». Опыт работы системным администратором — 5 лет.
Задать вопрос
Cisco AnyConnect – это VPN клиент от известной компании Cisco, которая занимается поставками сетевого оборудования. Их устройства дороги и сложны в настройке, но достаточно надежны и приспосабливаются под любую сеть. Настройкой оборудования занимаются или сторонние специалисты, или свои сотрудники, имеющие нужные сертификаты.
Обычный работник имеет возможность столкнуться с настройкой и использование программ от этой фирмы только в случае небольших бесплатных программ, которые они предоставляют. Cisco AnyConnect – это одна из таких программ, которые могут быть установлены на компьютере обычного работника.
Содержание
- Зачем использовать Cisco AnyConnect
- Установка и настройка Cisco AnyConnect Client на ПК
- Где скачать Cisco AnyConnect Secure?
- На Windows 10
- На MacOS
- На Linux Ubuntu
- Запуск и первые шаги Cisco AnyConnect Mobility для смартфонов
- На Android
- На iOS
- Возможные проблемы
- Нет соединения
- Ошибка инициализации
- Как удалить клиент
- Аналоги Cisco VPN Client
Зачем использовать Cisco AnyConnect
Стоит сразу сказать, несмотря на то, что Cisco AnyConnect является бесплатным приложением для использования VPN, он не предоставляет доступа ни к каким платным или бесплатным серверам. Cisco Anyconnect используется для подключения к существующим виртуальным частным сетям или VPN.
Программа является клиентом, так что в ней осуществляется только настройка подключения к самой сети. Все настройки VPN задаются на сервере или на том оборудовании Cisco, что служит шлюзом между интернетом и корпоративной сетью.
Разберем несколько особенностей, которые позволяют предоставлять удаленный доступ через это приложение:
- Возможность получения настроек со шлюза или сервера. Если человек работает через свое оборудование и нет возможности отдать его на установку и настройку техническим специалистам, то AnyConnect может получить настройки с сервера при первом подключении.
- Безопасность конечного устройства. Присутствует возможность настройки проверки компьютера или телефона, на котором установлено. Если устройство не соответствует заданным параметрам безопасности, то подключение не произойдет.
- «Тихая» работа. Можно сделать так, чтобы приложение не отображалось в активных, а значка в трее не было.
- Настройка приложения таким образом, чтобы при работе внутри корпоративной сети, не работал интернет. Это повышает безопасность корпоративной сети от взлома или занесения вредоносных программ.
К сожалению, все это задается в конфиге оборудования Cisco или на серверах компании. В самом клиенте настраивается подключение, производится ввод логина и пароля, а также задаются некоторые параметры установки соединения.
Всем остальным занимается администратор сети внутри компании. Так что вам столкнуться с этим не придется, ведь для работы с цисками требуется довольно долгое обучение и наличие некоторых сертификатов его подтверждающих.
Установка и настройка Cisco AnyConnect Client на ПК
Про места для скачивания поговорим чуть ниже, так что стоит остановиться на самой установке и настройке. Опять же, для каждой системы конкретные действия будут разными, но общий алгоритм такой: распаковать скачанный архив, запустить оттуда установочный файл. Дождаться окончания установки и запустить саму программу.
В некоторых случаях потребуется добавить программу в исключения своего антивируса и брандмауэра, но сначала попробуйте запустить её без этого. Теперь можно переходить к настройке.
Где скачать Cisco AnyConnect Secure?
Скачать программу можно всего с нескольких ресурсов. Основным является официальный сайт производителя.
Текущая версия находится по адресу: https://software.cisco.com/download/home/286281283/type/282364313/release/4.10.05095 , если соединится не получается, что удалите все до последнего слэша, должно перекинуть на последнюю версию. Здесь представлен полный список программ для Линукса, MacOS и Windows. Скачивайте и устанавливайте, для винды рекомендуется брать AnyConnect Pre-Deployment Package.
Проблема в том, что как только вы нажмете на скачивание, выскочит окно с предупреждением. Посторонние люди не могут загружать программы, так что войдите в свой аккаунт, в котором активен сервисный договор с компанией. Если такого нет, то обратитесь к своему дилеру, чтобы он предоставил вам копию программы.
У Microsoft есть свой официальный магазин, работающий с последними операционными системами. Зайдите туда и найдите нужное приложение, можете перейти по ссылке https://apps.microsoft.com/store/detail/anyconnect/9WZDNCRDJ8LH?hl=ru-ru&gl=RU. Нажмите на «Установить» и дождитесь окончания процесса. Это работает только для десятки, для Windows 7 и других ранних версий потребуется воспользоваться первым способом.
На Windows 10
После загрузки из официального магазина, программа станет доступна в списке установленных. Найдите её по ярлыку или через меню пуск и запустите. Нажмите на «Manage VPN», вас перебросит в стандартное окно с ВПН на десятке.
Здесь нужно установить, когда можно использовать ВПН, использовать ли его при роуминге и т.д. После выбора этих опций нажмите на «Add a VPN Connection», на русском будет «Добавить ВПН-соединение».
В открывшемся окне производятся все настройки. Главное, в верхней строке выберите создание соединения через AnyConnect. Дальше введите имя соединения, адрес сервера, а также логин и пароль, если они требуются для входа. Сохраните настройки. Теперь, для запуска соединения, вам нужно снова открыть окно с настройками ВПН и кликнуть там по нужному соединению.
В некоторых случаях может потребоваться настройка самой программы. Тогда из пуска снова запустите её и перейдите в раздел «Settings», здесь найдите настройку «Block Untrusted Servers», часто её требуется отключить для установки соединения. В разделе Diagnostic есть параметр Сertificate, здесь будут храниться сертификаты серверов, сюда же может потребоваться установить выданный вам сертификат, если подключение происходит по нему.
На MacOS
Загрузите программу из указанного источника, а потом дважды кликните на файл для начала установки. В первом окне нажмите «Continue», это просто приветствие, во втором окне выберите место, в которое хотите установить программу. Дальше все понятно, просто введите пароль и дождитесь окончания установки.
Теперь перейдите в раздел с приложениями и найдите там Cisco > Cisco AnyConnect Secure Mobility Client.app. Запустите его, в первом окне укажите точный адрес, выданный вам для подключения к VPN и нажмите на Connect. Появится еще одно окно, в верхней строке выберите группу, а ниже введите логин и пароль.
Теперь вы подключены. Для отключения снова нажмите на приложение, откроется окно с адресом сервера. Нажмите здесь на Disconnect, это позволит отключить соединение.
На Linux Ubuntu
Алгоритм будет одинаковым на всех линуксах, в том числе и на Debian, и Fedora. Скачайте архив из указанных источников. Распакуйте его и перейдите в новый каталог. Откройте и запустите установочный файл. В некоторых случаях все это можно проделать и через графический интерфейс, но можно работать и через консоль.
Запустите программу. На картинке вы видите интерфейс подключения, он выскочит после первого запуска программы. Введите адрес, а через двоеточие порт, если он нужен. Вводите его с точностью до каждого знака такой же, как вам выдали на работе. Потом нажмите на «Connect».
Откроется окно с предупреждениями. Нажмите здесь на «Change Settings», если вы нажмете по второй кнопке, то точно никуда не подключитесь.
Откроется окно с настройками. Вам нужно снять галочку с последнего пункта «Block connections to untrusted servers». Остальные галки расставьте так, как рекомендовали вам в инструкции на работе.
В следующем окне кликните по кнопке «Connect Anyway», а потом введите логин и пароль. Теперь можно пользоваться программой.
Запуск и первые шаги Cisco AnyConnect Mobility для смартфонов
Сильных отличий в работе приложений друг от друга нет. Меню выглядят похоже и алгоритм действий почти не меняется. Вот и получается, что если один раз настроить полностью работу впн, то и в другой раз проблем не будет. Особенно это характерно для телефонов. Здесь расскажем способы настройки приложений на разных аппаратах.
На Android
На андроиде загрузите приложение из официального магазина. После загрузке запустите его и попадете в первое меню. Здесь кликните по «Подключения», в новом окне на «Добавить новое подключение».
Появится стандартное окно для ввода данных. Введите туда информацию, которая предоставили вам для подключения. Теперь нажмите на три точки вверху и выберите «Settings» и снимите галку с «Блокировать недоверенные серверы».
Нажмите на три точки сверху и перейдите на вкладку «Diagnostics», откройте «Управление сертификатом». Снова нажав на три точки вверху выберите «Импортировать», здесь укажите путь до сертификата. Это потребуется, если подключение осуществляется по нему.
На iOS
На iPhone алгоритм ничем не отличается от Андроида. Скачайте и установите приложение из официального магазина. Откройте его. Щелкните по строке Connections, потом кликните по Add VPN Connection. В появившемся окне введите логин и пароль, а также остальные данные для подключения.
Для включения и отключения используйте рычажок, находящийся в верхней строке. Настройки находятся в разделе «Settings», а управление сертификатами в «Diagnostics».
Возможные проблемы
Сама программа проста, потому что представляет собой клиентскую часть программного решения. То есть, все основные действия и настройки происходят где-то далеко, на серверах и оборудовании Cisco, а Cisco AnyConnect представляет собой небольшую программу для подключения ко всей этой конструкции. Тем не менее разработчики сюда заложили и проверку клиентских устройств и ограничение на работу в интернете, так что проблемы возникают с завидным постоянством.
Нет соединения
Если не устанавливается соединение, то причин несколько:
- Включилось ограничение на связь, вшитое в установку программы, так что во время работы не получится соединиться с интернетом.
- Неправильно введены данные сервера, так что приложение не может к нему подключится.
- Несовпадение версий. Эту проблему отметила компания Майрософт, что при включении ВПН от циско, на некотором оборудовании перестает подключаться беспроводной интернет. Тут только ждать обновлений от обеих компаний.
Проблема глобальная, так что стоит сначала уточнить у тех, кто делал настройки на сервере, какие параметры выставлены. Тогда вы не будете удивляться ограничениям.
При отпадании интернета вообще при включении программы, рекомендуется почистить кэш интернет-соединения.
Ошибка инициализации
При запуске программы выскакивает ошибка «failed to initialize connection subsystem». Ошибка возникала на старых версиях программы, но нет гарантий, что она решена.
Есть два способа решения проблемы:
- Найдите исполняемый файл программы. Щелкните по ярлыку правой кнопкой мыши, а потом нажмите на «Расположение файла». Обычно это C:Program Files (x86)CiscoCisco AnyConnect Secure Mobility Client.
По найденному файлу кликните правой кнопкой мыши и выберите «Исправление неполадок». Дождитесь окончания работы.
Нажмите на компьютер правой кнопкой, перейдите в управление, потом в службы, найдите Cisco AnyConnect Secure Mobility Agent остановите его и потом снова запустите.
- Нажмите Win+R и введите в открывшемся окне regedit. Пройдите по пути HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings и создайте переменную DWORD с именем GlobalUserOffline и значением 0. Перезагрузите компьютер.
Проблема возникает из-за установки некоторых обновлений, так что можете удалить последние обновления и проблема решится. Или установите обновление MS15-018, оно решает эту проблему.
Как удалить клиент
С удалением возникают проблемы. Иногда удаляется не полностью, из-за чего возникают сбои при повторной установке. Так что тут совет один: заходите в папку с установленной программой и запускайте деинсталлятор оттуда. Если этого не сделали, то придется работать с командной строкой.
Для мака введите в терминал следующие команды:
- sudo /opt/cisco/anyconnect/bin/websecurity_uninstall.sh
- sudo /opt/cisco/anyconnect/bin/dart_uninstall.sh
- sudo /opt/cisco/anyconnect/bin/nvm_uninstall.sh
- sudo /opt/cisco/anyconnect/bin/umbrella_uninstall.sh
- sudo /opt/cisco/anyconnect/bin/amp_uninstall.sh
Если вы запороли удаление на виндовс, то попробуйте воспользоваться одной из программ, что чистят реестр. Если она не поможет, то остается только откат на точку восстановления или переустановка системы. Так что лучше сразу зайдите в папку с установленным приложением и используйте деинсталлятор оттуда.
Аналоги Cisco VPN Client
Есть и бесплатные аналоги этой программы, которые не предъявляют требований к договорам и остальному. Так что можете использовать их для создания туннелей, виртуальных сетей и организации удаленного доступа.
Однако, я не рекомендую использовать бесплатные решения для чего-то серьезного. Они редко хорошо защищены, да и следят за их безопасностью не очень пристально. Лучше приобрести какое-то корпоративное решение.
Аналоги:
- OpenConnect GUI — это графический клиент OpenConnect для систем Microsoft Windows, бесплатный и с открытым исходным кодом.
- OpenVPN — это полнофункциональное решение SSL VPN с открытым исходным кодом. Это рабочая лошадка большинства предприятия на данный момент. Обеспечивает неплохой уровень безопасности и позволяет задавать много параметров.
- ShrewSoft VPN Client работает через IPsec на Windows 2000, XP, Vista. Можете применять в тех местах, где не подойдут современные программы.
Cisco Anyconnect – это программа для тех организаций, что используют у себя их оборудование. Поэтому проблем с настройкой возникать не должно. Параметры сервера задает специалист, он же выдаст точную инструкцию по подключению.
Программу можно использовать и с другими видами серверов, как простой ВПН-клиент, но полные возможности раскроются только при использовании вместе с сервером от того же производителя. В других случаях стоит поискать аналогичные программы для организации безопасного удаленного доступа в свою корпоративную сеть или для подключения к какому-то оборудованию – применений для VPN много.
Configure VPN
Access
Connect and Disconnect to a VPN
AnyConnect VPN
Connectivity Options
The AnyConnect client provides many options for automatically
connecting, reconnecting, or disconnecting VPN sessions. These options provide
a convenient way for your users to connect to your VPN, and they also support
your network security requirements.
Starting and
Restarting AnyConnect Connections
Configure VPN Connection
Servers to provide the names and addresses of the secure gateways your
users will manually connect to.
Choose from the following AnyConnect capabilities to provide convenient, automatic VPN connectivity:
-
Automatically Start Windows VPN Connections Before Logon
-
Automatically Start VPN Connections when AnyConnect Starts
-
Automatically Restart VPN Connections
Also, consider using the following Automatic VPN Policy options to enforce greater network security or restrict network access
to the VPN only:
-
Use Trusted Network Detection to Connect and Disconnect
-
Require VPN Connections Using Always On
-
Use Captive Portal Hotspot Detection and Remediation
Renegotiating
and Maintaining the AnyConnect Connection
You can limit how long the ASA keeps an AnyConnect VPN
connection available to the user even with no activity. If a VPN session goes
idle, you can terminate the connection or re-negotiate the connection.
-
Keepalive—The ASA sends keepalive messages at regular intervals.
These messages are ignored by the ASA, but are useful in maintaining
connections with devices between the client and the ASA.For instructions to configure Keepalive with the ASDM or CLI, see the
Enable Keepalive section in the Cisco ASA Series VPN Configuration Guide. -
Dead Peer Detection—The ASA and AnyConnect client send «R-U-There» messages. These messages are sent less frequently than
IPsec’s keepalive messages. You can enable both the ASA (gateway) and the AnyConnect client to send DPD messages, and configure
a timeout interval.-
If the client does not respond to the ASA’s DPD messages, the ASA tries once more before putting the session into «Waiting
to Resume» mode. This mode allows the user to roam networks, or enter sleep mode and later recover the connection. If the
user does not reconnect before the idle timeout occurs, the ASA will terminate the tunnel. The recommended gateway DPD interval
is 300 seconds. -
If the ASA does not respond to the client’s DPD messages, the client tries again before terminating the tunnel. The recommended
client DPD interval is 30 seconds.For instructions to configure DPD within the ASDM, refer to Configure Dead Peer
Detection in the appropriate release of the Cisco ASA Series VPN Configuration
Guide.
-
-
Best Practices:
-
Set Client DPD to 30 seconds (Group Policy > Advanced >
AnyConnect Client > Dead Peer Detection). -
Set Server DPD to 300 seconds (Group Policy > Advanced >
AnyConnect Client > Dead Peer Detection). -
Set Rekey, for both SSL and IPsec to 1 hour (Group Policy >
Advanced > AnyConnect Client > Key Regeneration).
-
Terminating an
AnyConnect Connection
Terminating an AnyConnect connection requires the user to
re-authenticate their endpoint to the secure gateway and create a new VPN
connection.
The following connection parameters terminate the VPN session based on timeouts:
-
Maximum Connect Time—Sets the maximum user connection time in minutes. At the end of this time, the system terminates the
connection. You can also allow unlimited connection time(default). -
VPN Idle Timeout—Terminates any user’s session when the session is inactive for the specified time. If the VPN idle timeout
is not configured, then the default idle timeout is used. -
Default Idle Timeout—Terminates any user’s session when the session is inactive for the specified time. The default value
is 30 minutes. The default is 1800 second.
See the Specify a VPN Session Idle Timeout for a Group Policy section in the
appropriate release of the Cisco ASA Series VPN Configuration Guide to set these
parameters.
Configure VPN Connection Servers
The AnyConnect VPN server list consists of host name and host
address pairs identifying the secure gateways that your VPN users will connect to.
The host name can be an alias, an FQDN, or an IP address.
The hosts added to the server list display in the Connect to
drop-down list in the AnyConnect GUI. The user can then select from the drop-down
list to initiate a VPN connection. The host at the top of the list is the default
server, and appears first in the GUI drop-down list. If the user selects an
alternate server from the list, the selected server becomes the new default server.
Once you add a server to the server list, you can view its
details and edit or delete the server entry. To add a server to the server list,
follow this procedure.
Procedure
Step 1 |
Open the VPN |
||
Step 2 |
Click Add. |
||
Step 3 |
Configure the server’s host name and address:
|
||
Step 4 |
Enter the server to fall back to as the backup server in
|
||
Step 5 |
(Optional) Add load balancing servers to the Load Balancing Server List. Do not use «&» or «<» If the host for this server list entry specifies a load |
||
Step 6 |
Specify the Primary
|
||
Step 7 |
(Optional) Configure SCEP for this server:
|
||
Step 8 |
Click OK. |
Automatically Start Windows VPN Connections Before Logon
About Start Before
Logon
This feature called Start Before Logon (SBL) allows users to
establish their VPN connection to the enterprise infrastructure before logging
onto Windows.
Note |
When using Start Before Logon (SBL) and HostScan, you must install the |
When SBL is installed and enabled, AnyConnect
starts before the Windows logon dialog box appears, ensuring users are
connected to their corporate infrastructure before logging on. After VPN
authentication, the Windows logon dialog appears, and the user logs in as
usual.
SBL also includes the Network Access Manager tile and allows connections using user configured home network profiles. Network
profiles allowed in SBL mode include all media types employing non-802.1X authentication modes, such as open WEP, WPA/WPA2
Personal, and static key (WEP) networks.
using different mechanisms depending on the version of Windows:
-
On Windows, the Pre-Login Access Provider (PLAP) is used to
implement AnyConnect SBL.With PLAP, the Ctrl+Alt+Del key combination opens a window where
the user can choose either to log in to the system or activate Network
Connections (PLAP components) using the Network Connect button in the
lower-right corner of the window.PLAP supports 32-bit and 64-bit versions of the Windows.
-
The user’s computer is joined to an Active Directory
infrastructure. -
A user has network-mapped drives that require authentication
with the Microsoft Active Directory infrastructure. -
The user cannot have cached credentials on the computer (the
group policy disallows cached credentials). In this scenario, users must be
able to communicate with a domain controller on the corporate network for their
credentials to be validated before gaining access to the computer. -
The user must run logon scripts that execute from a network
resource or need access to a network resource. With SBL enabled, the user has
access to the local infrastructure and logon scripts that would normally run
when a user is in the office. This includes domain logon scripts, group policy
objects and other Active Directory functionality that normally occurs when
users log on to their system. -
Networking components (such as MS NAP/CS NAC) exist that might
require connection to the infrastructure.
Limitations on Start
Before Logon
-
AnyConnect is not compatible with fast user switching.
-
AnyConnect cannot be started by third-party Start Before Logon
applications. -
Because SBL is pre-login and will not have access to the user store, you
cannot do multiple certificate authentication (MCA) with it. MCA requires a
machine certificate and a user certificate, or two user certificates.
Configure Start Before Logon
Procedure
Install the AnyConnect Start Before Logon Module
The AnyConnect installer detects the underlying operating
system and places the appropriate AnyConnect DLL from the AnyConnect SBL module in
the system directory. On Windows 7, or the Windows 2008 server, the installer
determines whether the 32-bit or 64-bit version of the operating system is in use
and installs the appropriate PLAP component, vpnplap.dll or vpnplap64.dll.
Note |
If you uninstall AnyConnect while leaving the VPNGINA or |
You can predeploy the SBL module or configure the ASA to
download it. When predeploying AnyConnect, the Start Before Logon module requires
that the core client software is installed first. If you are predeploying AnyConnect
Core and the Start Before Logon components using MSI files, you must get the order
right.
Procedure
Step 1 |
In ASDM go to |
Step 2 |
Select a group policy and click |
Step 3 |
Select in the left navigation pane. |
Step 4 |
Uncheck Inherit for the Optional Client Module for Download setting. |
Step 5 |
Select the AnyConnect |
Enable SBL in the AnyConnect Profile
Before you begin
-
SBL requires a network connection to be present at the
time it is invoked. In some cases, this might not be possible, because a
wireless connection might depend on credentials of the user to connect to
the wireless infrastructure. Since SBL mode precedes the credential phase of
a logon, a connection would not be available in this scenario. In this case,
the wireless connection needs to be configured to cache the credentials
across logon, or another wireless authentication needs to be configured, for
SBL to work. -
If the Network Access Manager is installed, you must
deploy device connection to ensure that an appropriate connection is
available.
Procedure
Step 1 |
Open the VPN |
||
Step 2 |
Select Use Start Before |
||
Step 3 |
(Optional) To give the remote user control over SBL,
|
Troubleshoot Start Before Logon
Procedure
Step 1 |
Ensure that the AnyConnect profile is loaded on the ASA, |
Step 2 |
Delete prior profiles (search for them on the hard drive |
Step 3 |
Using Windows Add/Remove Programs, uninstall the SBL |
Step 4 |
Clear the user’s AnyConnect log in the Event Viewer and |
Step 5 |
Browse back to the security appliance to install |
Step 6 |
Reboot once. On the next reboot, you should be prompted |
Step 7 |
Collect a DART bundle and send it to your AnyConnect |
Step 8 |
If you see the following error, delete the user’s
|
Step 9 |
Go back to the .tmpl file, save a copy as an.xml file, |
Automatically Start VPN Connections When AnyConnect Starts
This feature called Auto Connect On Start, automatically
establishes a VPN connection with the secure gateway specified by the VPN client
profile when AnyConnect starts.
Auto Connect On Start is disabled by default, requiring the
user to specify or select a secure gateway.
Procedure
Step 1 |
Open the VPN |
Step 2 |
Select Auto Connect On |
Step 3 |
(Optional) To give the user control over Auto Connect on |
Configure Start
Before Logon (PLAP) on Windows Systems
The Start Before Logon (SBL) feature
starts a VPN connection before the user logs in to Windows. This ensures that
users connect to their corporate infrastructure before logging on to their
computers.
The SBL AnyConnect feature is known as the Pre-Login Access Provider
(PLAP), which is a connectable credential provider. This feature lets
programmatic network administrators perform specific tasks, such as collecting
credentials or connecting to network resources before logon. PLAP provides SBL
functions on all of the supported Windows operating systems. PLAP supports
32-bit and 64-bit versions of the operating system with vpnplap.dll and
vpnplap64.dll, respectively. The PLAP functions supports x86 and x64.
Automatically Restart VPN Connections
When Auto Reconnect is enabled (default), AnyConnect recovers
from VPN session disruptions and reestablishes a session, regardless of the media
used for the initial connection. For example, it can reestablish a session on wired,
wireless, or 3G. When Auto Reconnect is enabled, you also specify the reconnect
behavior upon system suspend or system resume. A system suspend is a low-power
standby, such as Windows “hibernation” or macOS or Linux “sleep.” A system resume is
a recovery following a system suspend.
If you disable Auto Reconnect, the client does not attempt to
reconnect regardless of the cause of the disconnection. Cisco highly recommends
using the default setting (enabled) for this feature. Disabling this setting can
cause interruptions in VPN connectivity over unstable connections.
Procedure
Step 1 |
Open the VPN |
Step 2 |
Select Auto |
Step 3 |
Choose the Auto Reconnect Behavior:
|
Use Trusted Network Detection to Connect and Disconnect
About Trusted
Network Detection
Trusted Network Detection (TND) gives you the ability to have
AnyConnect automatically disconnect a VPN connection when the user is inside
the corporate network (the trusted network) and start the VPN connection when
the user is outside the corporate network (the untrusted network).
TND does not interfere with the ability of the user to manually
establish a VPN connection. It does not disconnect a VPN connection that the
user starts manually in the trusted network. TND only disconnects the VPN
session if the user first connects in an untrusted network and moves into a
trusted network. For example, TND disconnects the VPN session if the user makes
a VPN connection at home and then moves into the corporate office.
You configure TND in the AnyConnect VPN Client profile. No
changes are required to the ASA configuration. You need to specify the action
or policy AnyConnect takes when recognizing it is transitioning between trusted
and untrusted networks, and identify your trusted networks and servers.
Guidelines for
Trusted Network Detection
-
Because the TND feature controls the AnyConnect GUI and
automatically starts connections, the GUI should run at all times. If the user
exits the GUI, TND does not automatically start the VPN connection. -
If AnyConnect is also running Start Before Logon (SBL), and the
user moves into the trusted network, the SBL window displayed on the computer
automatically closes. -
Trusted Network Detection with or without
Always-On
configured is supported on IPv6 and IPv4 VPN connections to the ASA over IPv4
and IPv6 networks. -
Multiple profiles on a user computer may present problems if the
TND configuration is different.If the user has received a TND-enabled profile in the past, upon
system restart, AnyConnect attempts to connect to the security appliance it was
last connected to, which may not be the behavior you desire. To connect to a
different security appliance, they must manually disconnect and re-connect to
that headend. The following workarounds will help you prevent this problem:-
Enable TND in the client profiles loaded on all the ASAs on your
corporate network. -
Create one profile listing all the ASAs in the host entry
section, and load that profile on all your ASAs. -
If users do not need to have multiple, different profiles, use
the same profile name for the profiles on all the ASAs. Each ASA overrides the
existing profile.
-
Configure Trusted Network Detection
Procedure
Step 1 |
Open the VPN profile editor and choose Preferences (Part |
||||||||
Step 2 |
Select Automatic VPN Policy. |
||||||||
Step 3 |
Choose a Trusted Network This is the action the client takes when the user is inside the corporate
|
||||||||
Step 4 |
Choose an Untrusted Network This is the action the client takes when the user is outside the corporate
|
||||||||
Step 5 |
Specify Trusted DNS Domains. Specify the DNS suffixes (a string separated by commas) that a network The AnyConnect client builds the DNS suffix list in the following order:
|
||||||||
Step 6 |
Specify Trusted DNS Servers. All DNS server addresses (a string separated by commas) that a network You must have a DNS entry for the headend server that is resolvable via DNS.
An active interface will be considered as an In-Trusted-Network if it matches |
||||||||
Step 7 |
Specify a host URL that you want to add as trusted. You must have a secure web
|
Require VPN
Connections Using
Always-On
About
Always-On VPN
Always-On operation prevents access to Internet
resources when the computer is not on a trusted network, unless a VPN session
is active. Enforcing the VPN to always be on in this situation protects the
computer from security threats.
When
Always-On is enabled, it establishes a VPN
session automatically after the user logs in and upon detection of an untrusted
network. The VPN session remains open until the user logs out of the computer,
or the session timer or idle session timer (specified in the ASA group policy)
expires. AnyConnect continually attempts to reestablish the connection to
reactivate the session if it is still open; otherwise, it continually attempts
to establish a new VPN session.
When
Always-On is enabled in the VPN Profile,
AnyConnect protects the endpoint by deleting all the other downloaded
AnyConnect profiles and ignores any public proxies configured to connect to the
ASA.
The following AnyConnect options also need to be considered when
enabling
Always-On:
-
Allowing the user to disconnect the Always-On VPN session: AnyConnect provides the ability for the user to disconnect Always-On VPN sessions. If you enable Allow VPN
Disconnect , AnyConnect displays a Disconnect button upon
the establishment of a VPN session. By default, the profile editor enables the
Disconnect button when you enableAlways-On VPN.Pressing the disconnect button locks all interfaces to prevent data
from leaking out and to protect the computer from internet access except for
establishing a VPN session. Users of Always-On VPN sessions may want to click Disconnect so they can choose an alternative
secure gateway due to performance issues with the current VPN session, or
reconnection issues following the interruption of a VPN session. -
Setting a connect failure policy: The connect failure policy determines
whether the computer can access the internet if Always-On VPN is enabled and AnyConnect cannot establish a VPN session. See Set a Connect Failure Policy. -
Handling captive portal hotspots: See Use Captive Portal Hotpost Detection and Remediation.
Limitations of
Always-On VPN
-
Always On is available only on Windows and macOS
-
If
Always-On
is enabled, but the user does not log on, AnyConnect does not establish the VPN
connection. AnyConnect starts the VPN connection only post-login. -
Always-On VPN does not support connecting though
a proxy.
Guidelines for
Always-On VPN
To enhance protection against threats, we recommend the
following additional protective measures if you configure
Always-On VPN:
-
We strongly recommend purchasing a digital certificate from a
certificate authority (CA) and enrolling it on the secure gateways. The ASDM
provides an
Enroll ASA SSL VPN with Entrust button on the
Configuration > Remote Access VPN > Certificate Management
> Identity Certificates panel to facilitate enrollment of a
public certificate. -
If you are using always-on VPN, external SAML IdP is not supported (however,
with internal SAML IdP, the ASA proxies all traffic to IdP and is supported) -
Predeploy a profile configured with Always-On to the endpoints to limit connectivity to the pre-defined ASAs. Predeployment prevents contact with a rogue server.
-
Restrict administrator rights so that users cannot terminate
processes. A PC user with admin rights can bypass an
Always-On policy by stopping the agent. If you
want to ensure fully-secure
Always-On, you must deny local admin rights to
users. -
Restrict access to the Cisco sub-folders on Windows computers,
typically
C:ProgramData. -
Users with limited or standard privileges may sometimes have
write access to their program data folders. They could use this access to
delete the AnyConnect profile file and thereby circumvent the
Always-On feature. -
Predeploy a group policy object (GPO) for Windows users to prevent users with limited rights from terminating the GUI. Predeploy
equivalent measures for macOS users.
Configure Always-On VPN
Procedure
Configure Always-On in the AnyConnect VPN Client Profile
Before you begin
Always-On VPN requires that a valid, trusted server certificate be configured on the ASA;
otherwise, it fails and logs an event indicating the certificate is invalid. In
addition, ensuring that the server certificate can pass Strict Certificate Trust
mode prevents the download of an Always-On VPN profile that locks a VPN connection to a rogue server.
Procedure
Step 1 |
Open the VPN |
Step 2 |
Select Automatic VPN |
Step 3 |
Configure Trusted Network Detection |
Step 4 |
Select Always |
Step 5 |
(Optional) Select or un-select Allow VPN Disconnect. |
Step 6 |
(Optional) Configure a Connect Failure Policy. |
Step 7 |
(Optional) Configure Captive Portal Remediation. |
Add Load-Balancing Backup Cluster Members to the Server List
Always-On VPN affects the load balancing of AnyConnect VPN sessions. With Always-On VPN disabled, when the client connects to a primary device within a load
balancing cluster, the client complies with a redirection from the primary device to
any of the backup cluster members. With Always-On enabled, the client does not comply with a redirection from the primary device
unless the address of the backup cluster member is specified in the server list of
the client profile. Therefore, be sure to add any backup cluster members to the
server list.
To specify the addresses of backup cluster members in the
client profile, use ASDM to add a load-balancing backup server list by following
these steps:
Procedure
Step 1 |
Open the VPN |
Step 2 |
Choose a server that is a primary device of a |
Step 3 |
Enter an FQDN or IP address of any load-balancing cluster |
Exempt Users from Always-On VPN
You can configure exemptions to override an Always-On policy. For example, you might want to let certain individuals establish VPN
sessions with other companies or exempt the Always-On policy for noncorporate assets.
Exemptions set in group policies and dynamic access policies on
the ASA override the Always-On policy. You specify exceptions according to the matching criteria used to assign
the policy. If an AnyConnect policy enables Always-On and a dynamic access policy or group policy disables it, the client retains the
disable setting for the current and future VPN sessions as long as its criteria
match the dynamic access policy or group policy on the establishment of each new
session.
This procedure configures a dynamic access policy that uses AAA
endpoint criteria to match sessions to noncorporate assets.
Procedure
Step 1 |
Choose Configuration > Remote |
Step 2 |
Configure criteria to exempt users from Always-On VPN. For example, use the Selection Criteria area to specify AAA attributes |
Step 3 |
Click the AnyConnect tab on the bottom half of the Add or Edit Dynamic |
Step 4 |
Click Disable next to “Always-On VPN for AnyConnect client.» |
Set a Connect
Failure Policy for Always-On
About the Connect
Failure Policy
The connect failure policy determines whether the computer can
access the internet if
Always-On
VPN is enabled and AnyConnect cannot establish a VPN session. This can occur
when a secure gateway is unreachable, or when AnyConnect fails to detect the
presence of a captive portal hotspot.
An open policy permits full network access, letting users
continue to perform tasks where access to the Internet or other local network
resources is needed.
A closed policy disables all network connectivity until the VPN
session is established. AnyConnect does this by enabling packet filters that
block all traffic from the endpoint that is not bound for a secure gateway to
which the computer is allowed to connect.
Regardless of the connect failure policy, AnyConnect continues
to try to establish the VPN connection.
Guidelines for
Setting the Connect Failure Policy
Consider the following when using an open policy which permits
full network access:
-
Security and protection are not available until the VPN session
is established; therefore, the endpoint device may get infected with web-based
malware or sensitive data may leak. -
An open connect failure policy does not apply if you enable the
Disconnect button and the user clicks
Disconnect.
Consider the following when using a closed policy which disables
all network connectivity until the VPN session is established:
-
A closed policy can halt productivity if users require Internet
access outside the VPN. -
The purpose of closed is to help protect corporate assets from
network threats when resources in the private network that protect the endpoint
are not available.The endpoint is protected from web-based malware and
sensitive data leakage at all times because all network access is prevented
except for local resources such as printers and tethered devices permitted by
split tunneling. -
This option is primarily for organizations where security
persistence is a greater concern than always-available network access. -
A closed policy prevents captive portal remediation unless you
specifically enable it. -
You can allow the application of the local resource rules
imposed by the most recent VPN session if
Apply Last VPN Local Resources is enabled in the
client profile. For example, these rules could determine access to active sync
and local printing. -
The network is unblocked and open during an AnyConnect software
upgrade when
Always-On
is enabled regardless of a closed policy. -
If you deploy a closed connection policy, we highly recommend
that you follow a phased approach. For example, first deploy
Always-On
with a connect failure open policy and survey users for the frequency with
which AnyConnect does not connect seamlessly. Then deploy a small pilot
deployment of a connect failure closed policy among early-adopter users and
solicit their feedback. Expand the pilot program gradually while continuing to
solicit feedback before considering a full deployment. As you deploy a connect
failure closed policy, be sure to educate the VPN users about the network
access limitation as well as the advantages of a connect failure closed policy.
Caution
A connect failure closed policy prevents network access if
AnyConnect fails to establish a VPN session. Use extreme caution when
implementing a connect failure closed policy.
Configure a Connect Failure Policy
You configure a Connect Failure Policy only when the Always-On feature is enabled. By default, the connect failure policy is closed, preventing
Internet access if the VPN is unreachable. To allow Internet access in this
situation the connect failure policy must be set to open.
Procedure
Step 1 |
Open the VPN |
Step 2 |
Set the Connect Failure
|
Step 3 |
If you specified a closed policy:
|
Use Captive Portal
Hotspot Detection and Remediation
About Captive
Portals
Many facilities that offer Wi-Fi and wired access, such as
airports, coffee shops, and hotels, require the user to pay before obtaining
access, to agree to abide by an acceptable use policy, or both. These
facilities use a technique called captive portal to prevent applications from
connecting until the user opens a browser and accepts the conditions for
access. Captive portal detection is the recognition of this restriction, and
captive portal remediation is the process of satisfying the requirements of a
captive portal hotspot in order to obtain network access.
Captive portals are detected automatically by AnyConnect when
initiating a VPN connection requiring no additional configuration. Also,
AnyConnect does not modify any browser configuration settings during captive
portal detection and does not automatically remediate the captive portal. It
relies on the end user to perform the remediation. AnyConnect reacts to the
detection of a captive portal depending on the current configuration:
-
If
Always-On
is disabled, or if
Always-On
is enabled and the Connect Failure Policy is open, the following message is
displayed on each connection attempt:The service provider in your current location is restricting access to the Internet. You need to log on with the service provider before you can establish a VPN session. You can try this by visiting any website with your browser.
The end user must perform captive portal remediation by meeting
the requirements of the provider of the hotspot. These requirements could be
paying a fee to access the network, signing an acceptable use policy, both, or
some other requirement defined by the provider. -
If
Always-On
is enabled and the connect failure policy is closed, captive portal remediation
needs to be explicitly enabled. If enabled, the end user can perform
remediation as described above. If disabled, the following message is displayed
upon each connection attempt, and the VPN cannot be connected.The service provider in your current location is restricting access to the Internet. The AnyConnect protection settings must be lowered for you to log on with the service provider. Your current enterprise security policy does not allow this.
Configure Captive Portal Remediation
You configure captive portal remediation only when the Always-On feature is enabled and the Connect Failure Policy is set to closed. In this
situation, configuring captive portal remediation allows AnyConnect to connect to
the VPN when a captive portal is preventing it from doing so.
If the Connect Failure Policy is set to open or Always-On is not enabled, your users are not restricted from network access and are capable
of remediating a captive portal without any specific configuration in the AnyConnect
VPN client profile.
By default, captive portal remediation is disabled on platforms
supporting Always on (Windows and macOS) to provide the greatest security.
AnyConnect does not provide data leakage protection capabilities during the captive
portal remediation phase. If data loss protection is desired, you should employ a
relevant endpoint security product.
Procedure
Step 1 |
Open the VPN |
Step 2 |
Select Allow Captive This setting lifts the network access restrictions |
Step 3 |
Specify the Remediation Timeout. Enter the number of minutes for which AnyConnect lifts |
Troubleshoot Captive
Portal Detection and Remediation
AnyConnect can falsely assume that it is in a captive portal in
the following situations.
-
If AnyConnect attempts to contact an ASA with a certificate
containing an incorrect server name (CN), then the AnyConnect client will think
it is in a “captive portal” environment.To prevent this, make sure the ASA certificate is properly
configured. The CN value in the certificate must match the name of the ASA
server in the VPN client profile. -
If there is another device on the network before the ASA, and
that device responds to the client’s attempt to contact an ASA by blocking
HTTPS access to the ASA, then the AnyConnect client will think it is in a
“captive portal” environment. This situation can occur when a user is on an
internal network, and connects through a firewall to connect to the ASA.If you need to restrict access to the ASA from inside the corporation,
configure your firewall such that HTTP and HTTPS traffic to the ASA’s
address does not return an HTTP status. HTTP/HTTPS access to the ASA should
either be allowed or completely blocked to ensure that HTTP/HTTPS requests
sent to the ASA will not return an unexpected response.
If users cannot access a captive portal remediation page, ask
them to try the following:
-
Terminate any applications that use HTTP, such as instant
messaging programs, e-mail clients, IP phone clients, and all but one browser
to perform the remediation.The captive portal may be actively inhibiting DoS attacks by
ignoring repetitive attempts to connect, causing them to time out on the client
end. The attempt by many applications to make HTTP connections exacerbates this
problem. -
Disable and re-enable the network interface. This action
triggers a captive portal detection retry. -
Restart the computer.
Configure AnyConnect over L2TP or PPTP
ISPs in some countries require support of the Layer 2 Tunneling
Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP).
To send traffic destined for the secure gateway over a
Point-to-Point Protocol (PPP) connection, AnyConnect uses the point-to-point adapter
generated by the external tunnel. When establishing a VPN tunnel over a PPP
connection, the client must exclude traffic destined for the ASA from the tunneled
traffic intended for destinations beyond the ASA. To specify whether and how to
determine the exclusion route, use the PPP Exclusion setting in the AnyConnect
profile. The exclusion route appears as a non-secured route in the Route Details
display of the AnyConnect GUI.
Procedure
Step 1 |
Open the VPN |
Step 2 |
Choose a PPP
|
Instruct Users to Override PPP Exclusion
If automatic detection does not work and you configured the PPP
Exclusion fields as user controllable, the user can override the setting by editing
the AnyConnect preferences file on the local computer.
Procedure
Step 1 |
Use an editor such as Notepad to open the preferences XML This file is at one of the following paths on the
|
Step 2 |
Insert the PPPExclusion details under
|
Step 3 |
Save the file. |
Step 4 |
Exit and restart AnyConnect. |
Configure AnyConnect Proxy Connections
About AnyConnect
Proxy Connections
AnyConnect supports VPN sessions through Local, Public, and
Private proxies:
-
Local Proxy Connections:
A local proxy runs on the same PC as AnyConnect, and is
sometimes used as a transparent proxy. Some examples of a transparent proxy
service include acceleration software provided by some wireless data cards, or
a network component on some antivirus software, such as Kaspersky.The use of a local proxy is enabled or disabled in the
AnyConnect VPN client profile, see
Allow
a Local Proxy Connection. -
Public Proxy Connections:
Public proxies are usually used to anonymize web traffic. When Windows is configured to use a public proxy, AnyConnect uses
that connection. Public proxy is supported on macOS and Linux for both native and override. -
Private Proxy Connections:
Private proxy servers are used on a corporate network to prevent
corporate users from accessing certain Web sites based on corporate usage
policies, for example, pornography, gambling, or gaming sites.You configure a group policy to download private proxy settings to the browser after the tunnel is established. The settings
return to their original state after the VPN session ends. See Configure a Private Proxy Connection.
Note
AnyConnect SBL
connections through a proxy server are dependent on the Windows operating
system version and system (machine) configuration or other third-party proxy
software capabilities; therefore, refer to system wide proxy settings as
provided by Microsoft or whatever third-party proxy application you use.
Control Client
Proxy with VPN Client Profile
The VPN Client
profile can block or redirect the client system’s proxy connection. For Windows
and Linux, you can configure, or you can allow the user to configure, the
address of a public proxy server.
For more information about configuring the proxy settings in the VPN client profile, see AnyConnect Profile Editor, Preferences (Part 2).
Proxy
Auto-Configuration File Generation for Clientless Support
Some versions of the
ASA require AnyConnect configuration to support clientless portal access
through a proxy server after establishing an AnyConnect session. AnyConnect
uses a proxy auto-configuration (PAC) file to modify the client-side proxy
settings to let this occur. AnyConnect generates this file only if the ASA does
not specify private-side proxy settings.
Requirements for
AnyConnect Proxy Connections
OS support of proxy connections varies as shown:
Proxy Connection Type |
Windows |
macOS |
Linux |
---|---|---|---|
Local Proxy |
Yes |
Yes (Override) |
Yes |
Private Proxy |
Yes (on Internet Explorer) |
Yes (set as system proxy settings) |
No |
Public Proxy |
Yes (IE and Override) |
Yes (Override) |
Limitations on Proxy
Connections
-
IPv6 proxies are not supported for any type of proxy
connection. -
Connecting through a proxy is not supported with the
Always-On feature enabled. -
A VPN client profile is required to allow access to a local proxy.
Allow a Local Proxy Connection
Procedure
Step 1 |
Open the VPN |
Step 2 |
Select (default) or unselect Allow Local Proxy Connections. Local proxy |
Configure a Private Proxy Connection
Procedure
Step 1 |
Configure the private proxy information in the ASA group
|
||
Step 2 |
(Optional) Configure the Client to Ignore Browser Proxy |
||
Step 3 |
(Optional) Lockdown the Internet Explorer Connections Tab. |
Configure the Client to Ignore Browser Proxy Settings
You can specify a policy in the AnyConnect profile to bypass
the Microsoft Internet Explorer or Safari proxy configuration settings on the user’s
PC. This prevents the user from establishing a tunnel from outside the corporate
network, and prevents AnyConnect from connecting through an undesirable or
illegitimate proxy server.
Procedure
Step 1 |
Open the VPN |
Step 2 |
In the Proxy Settings drop-down list, choose IgnoreProxy. Ignore Proxy causes the |
Lock Down the Internet Explorer Connections Tab
Under certain conditions, AnyConnect hides the Internet
Explorer Tools > Internet Options > Connections tab. When exposed, this tab
lets the user set proxy information. Hiding this tab prevents the user from
intentionally or unintentionally circumventing the tunnel. The tab lockdown is
reversed on disconnect, and it is superseded by any administrator-defined policies
applied to that tab. The conditions under which this lock down occurs are the
following:
-
The ASA configuration specifies Connections tab
lockdown. -
The ASA configuration specifies a private-side proxy.
-
A Windows group policy previously locked down the
Connections tab (overriding the no lockdown ASA group policy setting).
You can configure the ASA to allow or not allow proxy lockdown,
in the group policy. To do this using ASDM, follow this procedure:
Procedure
Step 1 |
In ASDM go to |
Step 2 |
Select a group policy and click |
Step 3 |
In the navigation pane, go to . The Proxy Server Policy pane displays. |
Step 4 |
Click Proxy |
Step 5 |
Uncheck Inherit and select Yes to enable proxy lockdown and hide the Internet Explorer |
Step 6 |
Click OK to |
Step 7 |
Click Apply |
Verify the Proxy
Settings
-
For Windows: Find the proxy settings in the registry under:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings
-
For macOS: Open a terminal window, and type:
scutil --proxy
Select and Exclude VPN Traffic
Configure IPv4 or IPv6 Traffic to Bypass the VPN
You can configure how the AnyConnect client manages IPv4
traffic when the ASA is expecting only IPv6 traffic or how AnyConnect manages IPv6
traffic when the ASA is only expecting IPv4 traffic using the Client Bypass Protocol
setting.
When the AnyConnect client makes a VPN connection to the ASA,
the ASA can assign the client an IPv4, IPv6, or both an IPv4 and IPv6 address.
If Client Bypass Protocol is enabled for an IP protocol and an
address pool is not configured for that protocol (in other words, no IP address for
that protocol was assigned to client by the ASA), any IP traffic using that protocol
will not be sent through the VPN tunnel. It will be sent outside the tunnel.
If Client Bypass Protocol is disabled, and an address pool is
not configured for that protocol, the client drops all traffic for that IP protocol
once the VPN tunnel is established.
For example, assume that the ASA assigns only an IPv4 address
to an AnyConnect connection and the endpoint is dual stacked. When the endpoint
attempts to reach an IPv6 address, if Client Bypass Protocol is disabled, the IPv6
traffic is dropped. If Client Bypass Protocol is enabled, the IPv6 traffic is sent
from the client in the clear.
If establishing an IPsec tunnel (as opposed to an SSL connection), the ASA is not
notified whether or not IPv6 is enabled on the client, so ASA always pushes down the
client bypass protocol setting.
You configure the Client Bypass Protocol on the ASA in the
group policies.
Procedure
Step 1 |
In ASDM go to |
Step 2 |
Select a group policy and click |
Step 3 |
Select . |
Step 4 |
Next to Client Bypass |
Step 5 |
Choose one of these options:
|
Step 6 |
Click OK. |
Step 7 |
Click Apply. |
Configure a Client
Firewall with Local Printer and Tethered Device Support
See the Client Firewall with Local Printer and Tethered Device Support section in the Cisco ASA Series Configuration Guide.
Split DNS
When split DNS is configured in the
Network (Client) Access group policy, AnyConnect tunnels specific DNS queries to the
private DNS server (also configured in the group policy). All other DNS queries go to
the DNS resolver on the client operating system, in the clear, for DNS resolution. If
split DNS is not configured, AnyConnect tunnels all DNS queries.
If split DNS is not configured, AnyConnect tunnels all DNS queries.
Requirements for
Split DNS
Split DNS supports
standard and update queries (including A, AAAA, NS, TXT, MX, SOA, ANY, SRV, PTR, and
CNAME). PTR queries matching any of the tunneled networks are allowed through the
tunnel.
-
Limited support is available on Linux, namely only tunneled DNS requests
are subject to the split DNS policy. Consequently, some DNS requests
sent outside the tunnel may not comply with the split DNS policy.
For macOS, AnyConnect can use true split-DNS for a certain IP
protocol only if one of the following conditions is met:
-
Split-DNS is configured for one IP protocol (such as
IPv4), and Client Bypass Protocol is configured for the other IP protocol
(such as IPv6) in the group policy (with no address pool configured for the
latter IP protocol). -
Split-DNS is configured for both IP protocols.
Configure Split DNS for Split Include Tunneling
To configure split DNS for split include tunneling in the group policy,
do the following:
Procedure
Step 1 |
Configure at least one DNS server. See the Configure Server Attributes for an Internal Ensure the private DNS servers specified do not overlap with the DNS |
Step 2 |
Configure split-include tunneling: On the Configuration Split-DNS does not support the |
Step 3 |
On the Configuration > Remote Access VPN |
What to do next
After making changes to the group policy in ASDM, be sure the
group policy is associated with a Connection Profile in Configuration > Remote Access VPN > Network (Client)
Access > AnyConnect Connection Profiles > Add/Edit > Group
Policy.
Verify Split DNS Using AnyConnect Logs
Check Which Domains Use Split DNS
You can use any tool or application that relies on the
operating system’s DNS resolver for domain name resolution. For example, you can use
a ping or web browser to test the split DNS solution. Other tools such as nslookup
or dig circumvent the OS DNS resolver.
To use the client to check which domains are used for split
DNS, follow these steps:
Procedure
Step 1 |
Run |
||
Step 2 |
Establish a VPN connection and again check the domains Those extra domains added after establishing the tunnel
|
Manage VPN Authentication
Important Security
Considerations
gateway
-
because of the possibility that a user could inadvertently configure a
browser to trust a certificate on a rogue server, and -
because of the inconvenience to users of having to respond to a security
warning when connecting to your secure gateway.
We strongly recommend that you enable Strict Certificate Trust for the AnyConnect client. To
configure Strict Certificate Trust, see the Local Policy
Parameters and Values section: Local Policy Preferences.
Configure Server Certificate Handling
Server Certificate
Verification
-
The AnyConnect
client does not support certificate verification using certificate revocation
lists (CRL).Many sites
position the Certificate Authority they use to validate server certificates
inside the corporate network. That means that a client cannot verify CRL when
it is trying to connect to a headend, since the CRL is not accessible on the
public network. The client operating system can be configured to verify CRL in
Windows and Mac OS X, but we ignore that setting. -
(Windows only) For both SSL and IPsec VPN connections, you have the
option to perform Certificate Revocation List (CRL) checking. When enabled in
the profile editor, AnyConnect retrieves the updated CRL for all certificates
in the chain. It then verifies whether the certificate in question is among
those revoked certificates which should no longer be trusted; and if found to
be a certificate revoked by the Certificate Authority, it does not connect.
Refer to
Local Policy Preferences
for further information. -
When a user connects to an ASA that is configured with a server
certificate, the checkbox to trust and import that certificate will still
display, even if there is a problem with the trust chain (Root, Intermediate,
etc.) If there are any other certificate problems, that checkbox will not
display. -
SSL connections being performed via FQDN do not make a secondary
server certificate verification with the FQDN’s resolved IP address for name
verification if the initial verification using the FQDN fails. -
IPsec and SSL connections require that if a server
certificate contains Key Usage, the attributes must contain DigitalSignature AND
(KeyAgreement OR KeyEncipherment). If the server certificate contains an EKU,
the attributes must contain serverAuth (for SSL and IPsec) or ikeIntermediate
(for IPsec only). Note that server certificates are not required to have a KU or
an EKU to be accepted. -
IPsec and SSL connections perform name verification on server certificates. The following rules are applied for the purposes
of IPsec and SSL name verification:-
If a Subject Alternative Name extension is present with relevant
attributes, name verification is performed solely against the Subject
Alternative Name. Relevant attributes include DNS Name attributes for all
certificates, and additionally include IP address attributes if the connection
is being performed to an IP address. -
If a Subject Alternative Name extension is not present, or is
present but contains no relevant attributes, name verification is performed
against any Common Name attributes found in the Subject of the certificate. -
If a certificate uses a wildcard for the purposes of name
verification, the wildcard must be in the first (left-most) subdomain only, and
additionally must be the last (right-most) character in the subdomain. Any
wildcard entry not in compliance is ignored for the purposes of name
verification.
-
-
For OSX, expired certificates are displayed only when Keychain
Access is configured to “Show Expired Certificates.” Expired certificates are
hidden by default, which may confuse users.
Invalid Server
Certificate Handling
In response to the increase of targeted attacks against mobile
users on untrusted networks, we have improved the security protections in the
client to help prevent serious security breaches. The default client behavior
has been changed to provide an extra layer of defense against Man-in-the-middle
attacks.
User
Interaction
When the user tries to connect to a secure gateway, and there is
a certificate error (due to expired, invalid date, wrong key usage, or CN
mismatch), the user sees a red-colored dialog with Change Settings and Keep Me
Safe buttons.
Note |
The dialogs for Linux may look different from the ones shown in |
-
Clicking
Keep Me Safe cancels the connection. -
Clicking
Change Settings opens AnyConnect’s Advanced > VPN
>Preferences dialog, where the user can enable connections to untrusted
servers. The current connection attempt is canceled.
If the user un-checks
Block
connections to untrusted servers, and the only issue with the
certificate is that the CA is untrusted, then the next time the user attempts
to connect to this secure gateway, the user will not see the Certificate
Blocked Error Dialog dialog; they only see the following dialog:
If the user checks
Always trust this VPN server and import the certificate,
then future connections to this secure gateway will not prompt the user to
continue.
Note |
If the user checks Block connections to |
Improved
Security Behavior
When the client accepts an invalid server certificate, that
certificate is saved in the client’s certificate store. Previously, only the
thumbprint of the certificate was saved. Note that invalid certificates are
saved only when the user has elected to always trust and import invalid server
certificates.
There is no administrative override to make the end user less
secure automatically. To completely remove the preceding security decisions
from your end users, enable
Strict Certificate Trust in the user’s local policy file.
When Strict Certificate Trust is enabled, the user sees an error message, and
the connection fails; there is no user prompt.
For information about enabling Strict Certificate Trust in the
local policy file, see the
AnyConnect
Local Policy Parameters and Values section:
Local Policy Preferences.
Guidelines and
Limitations
Invalid server certificates are rejected when:
-
Always On is enabled in the AnyConnect VPN client profile and is
not turned off by an applied group policy or DAP. -
The client has a Local Policy with Strict Certificate Trust
enabled. -
AnyConnect is configured to start before logon.
-
A client certificate from the machine certificate store is used
for authentication.
Configure Certificate-Only Authentication
You can specify whether you want users to authenticate using
AAA with a username and password or using a digital certificate (or both). When you
configure certificate-only authentication, users can connect with a digital
certificate and are not required to provide a user ID and password.
To support certificate-only authentication in an environment
where multiple groups are used, you may provision more than one group-url. Each
group-url would contain a different client profile with some piece of customized
data that would allow for a group-specific certificate map to be created. For
example, the Department_OU value of Engineering could be provisioned on the ASA to
place the user in this group when the certificate from this process is presented to
the ASA.
Note |
The certificate used to authenticate the client to the |
Procedure
Step 1 |
Go to . Select a connection profile and click Edit. The Edit AnyConnect |
Step 2 |
If it is not already, click the Basic node of the navigation tree on the |
Step 3 |
Click OK and |
Configure
Certificate Enrollment
The
Cisco AnyConnect Secure
Mobility Client
uses the Simple Certificate Enrollment Protocol (SCEP) to provision and renew a
certificate as part of client authentication. Certificate enrollment using SCEP
is supported by AnyConnect IPsec and SSL VPN connections to the ASA in the
following ways:
-
SCEP Proxy: The ASA acts as a proxy for SCEP requests and
responses between the client and the Certificate Authority (CA).-
The CA must be accessible to the ASA, not the AnyConnect client,
since the client does not access the CA directly. -
Enrollment is always initiated automatically by the client. No
user involvement is necessary.
-
-
Legacy SCEP: The AnyConnect client communicates with the CA directly to enroll and obtain a certificate.
-
The CA must be accessible to the AnyConnect client, not the ASA, through an established VPN tunnel or directly on the same
network the client is on. -
Enrollment is initiated automatically by the client and may be initiated manually by the user if configured.
-
SCEP Proxy
Enrollment and Operation
The following steps describe how a certificate is obtained and a
certificate-based connection is made when AnyConnect and the ASA are configured
for SCEP Proxy.
-
The user connects to the ASA headend using a connection profile
configured for both certificate and AAA authentication. The ASA requests a
certificate and AAA credentials for authentication from the client. -
The user enters his/her AAA credentials, but a valid certificate
is not available. This situation triggers the client to send an automatic SCEP
enrollment request after the tunnel has been established using the entered AAA
credentials. -
The ASA forwards the enrollment request to the CA and returns
the CA’s response to the client. -
If SCEP enrollment is successful, the client presents a
(configurable) message to the user and disconnects the current session. The
user can now connect using certificate authentication to an ASA tunnel group.If SCEP enrollment fails, the client displays a (configurable)
message to the user and disconnects the current session. The user should
contact his/her administrator.
Other SCEP Proxy operational considerations:
-
If configured to do so, the client automatically renews the
certificate before it expires, without user intervention. -
SCEP Proxy enollment uses SSL for both SSL and IPsec tunnel
certificate authentication.
Legacy SCEP
Enrollment and Operation
The following steps describe how a certificate is obtained and a
certificate-based connection is made when AnyConnect is configured for Legacy
SCEP.
-
When the user initiates a connection to the ASA headend using a
tunnel group configured for certificate authentication, the ASA requests a
certificate for authentication from the client. -
A valid certificate is not available on the client. The
connection cannot be established. This certificate failure indicates that SCEP
enrollment needs to occur. -
The user must then initiate a connection to the ASA headend
using a tunnel group configured for AAA authentication only whose address
matches the Automatic SCEP Host configured in the client profile. The ASA
requests the AAA credentials from the client. -
The client presents a dialog box for the user to enter AAA
credentials.If the client is configured for manual enrollment and the client
knows it needs to initiate SCEP enrollment (see Step 2), a
Get Certificate button displays on the credentials
dialog box. If the client has direct access to the CA on his/her network, the
user will be able to manually obtain a certificate by clicking this button at
this time.
Note
If access to the CA relies on the VPN tunnel being established,
manual enrollment cannot be done at this time because there is currently no VPN
tunnel established (AAA credentials have not been entered).
-
The user enters AAA credentials and establishes a VPN
connection. -
The client knows it needs to initiate SCEP enrollment (see Step
2). It initiates an enrollment request to the CA through the established VPN
tunnel, and a response is received from the CA. -
If SCEP enrollment is successful, the client presents a
(configurable) message to the user and disconnects the current session. The
user can now connect using certificate authentication to an ASA tunnel group.If SCEP enrollment fails, the client displays a (configurable)
message to the user and disconnects the current session. The user should
contact his/her administrator.
Other Legacy SCEP operational considerations:
-
If the client is configured for manual enrollment and the
Certificate Expiration Threshold value is met, a
Get Certificate button displays on a presented
tunnel group selection dialog box. Users can manually renew their certificate
by clicking this button. -
If the certificate expires and the client no longer has a valid
certificate, the client repeats the Legacy SCEP enrollment process.
Certificate
Authority Requirements
-
All SCEP-compliant CAs, including IOS CS, Windows Server 2003
CA, and Windows Server 2008 CA, are supported. -
The CA must be in auto-grant mode; polling for certificates is
not supported. -
You can configure some CAs to email users an enrollment password for an additional layer of security. The CA password is the
challenge password or token that is sent to the certificate authority to identify the user. The password can then be configured
in the AnyConnect client profile, which becomes part of SCEP request that the CA verifies before granting the certificate.
Guidelines for Certificate Enrollment
-
Clientless (browser-based) VPN access to the ASA does not support SCEP proxy, but WebLaunch (clientless-initiated AnyConnect)
does. -
ASA Load balancing is supported with SCEP enrollment.
-
The ASA does not indicate why an enrollment failed, although it does log the requests received from the client. Connection
problems must be debugged on the CA or the client. -
Certificate-Only Authentication and Certificate Mapping on the ASA:
To support certificate-only authentication in an environment where multiple groups are used, you may provision more than one
group-url. Each group-url would contain a different client profile with some piece of customized data that would allow for
a group-specific certificate map to be created. For example, the Department_OU value of Engineering could be provisioned on
the ASA to place the user in this tunnel group when the certificate from this process is presented to the ASA. -
Identifying Enrollment Connections to Apply Policies:
On the ASA, the aaa.cisco.sceprequired attribute can be used to catch the enrollment connections and apply the appropriate
policies in the selected DAP record. -
Windows Certificate Warning:
When Windows clients first attempt to retrieve a certificate from a certificate authority they may see a warning. When prompted,
users must click Yes. This allows them to import the root certificate. It does not affect their ability to connect with the
client certificate.
Configure SCEP Proxy Certificate Enrollment
Configure a VPN Client Profile for SCEP Proxy Enrollment
Procedure
Step 1 |
Open the VPN |
||
Step 2 |
Select Certificate |
||
Step 3 |
Configure the Certificate Contents to be requested in the enrollment
|
Configure the ASA to Support SCEP Proxy Enrollment
For SCEP Proxy, a single ASA connection profile supports
certificate enrollment and the certificate authorized VPN connection.
Procedure
Step 1 |
Create a group policy, for example, cert_group. Set the
|
Step 2 |
Create a connection profile for certificate enrollment
|
Configure Legacy SCEP Certificate Enrollment
Configure a VPN Client Profile for Legacy SCEP Enrollment
Procedure
Step 1 |
Open the VPN |
||
Step 2 |
Select Certificate |
||
Step 3 |
Specify an Automatic Enter the FQDN or IP address, and the alias of the When the user initiates the connection, the address |
||
Step 4 |
Configure the Certificate Authority attributes:
|
||
Step 5 |
Configure which Certificate Contents to request in the enrollment certificate.
|
||
Step 6 |
(Optional) Check Display |
||
Step 7 |
(Optional) Enable SCEP for a specific host in the server
|
Configure the ASA to Support Legacy SCEP Enrollment
For Legacy SCEP on the ASA, you must create a connection
profile and group policy for certificate enrollment and a second connection profile
and group policy for the certificate authorized VPN connection.
Procedure
Step 1 |
Create a group policy for enrollment, for example, On the Advanced > AnyConnect Client pane, uncheck |
Step 2 |
Create a second group policy for authorization, for |
Step 3 |
Create a connection profile for enrollment, for example,
|
Step 4 |
Create a connection profile for authorization, for
|
Step 5 |
(Optional) On the General pane of each group policy, set |
Set Up a Windows
2008 Server Certificate Authority for SCEP
If your Certificate Authority software is running on a Windows
2008 server, you may need to make one of the following configuration changes to
the server to support SCEP with AnyConnect.
Disable the SCEP Password on the Certificate Authority
The following steps describe how to disable the SCEP challenge
password, so that clients will not need to provide an out-of-band password before
SCEP enrollment.
Procedure
Step 1 |
On the Certificate Authority server, launch the Registry |
Step 2 |
Navigate to If the EnforcePassword key does not exist, create it as |
Step 3 |
Edit EnforcePassword, and set it to ‘0’. If it does not |
Step 4 |
Exit regedit, and reboot the certificate authority |
Setting the SCEP Template on the Certificate Authority
The following steps describe how to create a certificate
template, and assign it as the default SCEP template.
Procedure
Step 1 |
Launch the Server Manager. You can do this by selecting |
Step 2 |
Expand Roles > Certificate Services (or AD Certificate |
Step 3 |
Navigate to CA Name > Certificate Templates. |
Step 4 |
Right-click Certificate Templates > |
Step 5 |
From the Cert Templates Console, right-click User |
Step 6 |
Choose Windows Server |
Step 7 |
Change the template display name to something |
Step 8 |
Adjust the Validity Period for your site. Most sites |
Step 9 |
On the Cryptography tab, set the minimum key size for |
Step 10 |
On the Subject Name tab, select Supply in Request. |
Step 11 |
On the Extensions tab, set the Application Policies to
These values are valid for SSL or IPsec. |
Step 12 |
Click Apply, |
Step 13 |
From Server manager > Certificate Services-CA Name, |
Step 14 |
Edit the registry. You can do this by selecting Start |
Step 15 |
Navigate to |
Step 16 |
Set the value of the following three keys to NDES-IPSec-SSL.
|
Step 17 |
Click Save, |
Configure a Certificate Expiration Notice
Configure AnyConnect to warn users that their authentication
certificate is about to expire. The Certificate
Expiration Threshold setting specifies the number of days before the
certificate’s expiration date that AnyConnect warns users that their certificate is
expiring. AnyConnect warns the user upon each connect until the certificate has
actually expired or a new certificate has been acquired.
Note |
The Certificate Expiration Threshold feature cannot be used |
Procedure
Step 1 |
Open the VPN |
Step 2 |
Select Certificate |
Step 3 |
Specify a Certificate This is the number of days before the certificate The default is 0 (no warning displayed). The range is 0 |
Step 4 |
Click OK. |
Configure Certificate Selection
The following steps show all the places in the AnyConnect
profiles where you configure how certificates are searched for and how they are
selected on the client system. None of the steps are required, and if you do not
specify any criteria, AnyConnect uses default key matching.
AnyConnect reads the browser
certificate stores on Windows. For macOS and Unix, you must create a Privacy
Enhanced Mail (PEM) formatted file store.
Procedure
Step 1 |
Windows and macOS:Configure Which Certificate Stores to Use Specify which certificate stores are used by AnyConnect in the VPN client |
Step 2 |
Windows Only: Prompt Windows Users to Select Authentication Certificate Configure AnyConnect to present a list of valid certificates to users and let |
Step 3 |
For macOS and Linux environments: Create a PEM Certificate Store for macOS and Linux |
Step 4 |
For macOS and Linux environments: Select which certificate stores to exclude in |
Step 5 |
Configure Certificate Matching Configure keys that AnyConnect tries to match, when searching for a |
Configure Which Certificate Stores to Use
Windows provides separate
certificate stores for the local machine and for the current user. Specify which
certificate stores are used by AnyConnect in the VPN client profile. By default, it
searches both, but you can configure AnyConnect to use only one.
Users with administrative
privileges on the computer have access to both certificate stores. Users without
administrative privileges only have access to the user certificate store. Usually,
Windows users do not have administrative privileges. Selecting
Certificate Store Override allows AnyConnect to access
the machine store, even when the user does not have administrative privileges.
Note |
Access-control for the machine store can vary depending on the Windows version and |
The following table describes how
AnyConnect searches for certificates on a client based on what
Certificate Store is searched, and whether
Certificate Store Override is checked.
Certificate Store Setting |
Certificate Store Override Setting |
AnyConnect Search Strategy | ||
---|---|---|---|---|
All (for Windows) |
cleared |
AnyConnect searches all certificate stores. This setting is the default. This setting |
||
All (for Windows) |
checked |
AnyConnect searches all certificate stores. |
||
Machine (not a multi-cert option) |
checked |
AnyConnect searches the machine certificate |
||
Machine (not a multi-cert option) |
cleared |
AnyConnect searches the machine certificate store. AnyConnect is
|
||
User (for Windows) |
does not apply |
AnyConnect searches in the user certificate |
||
All (for Linux) |
does not apply |
AnyConnect uses client certificates from both system and user PEM |
||
Machine (for Linux) |
does not apply |
AnyConnect uses client certificate stores only from the system |
||
User (for Linux) |
does not apply |
AnyConnect uses client certificates only from the user PEM file |
With Basic Certificate Authentication
Procedure
Step 1 |
Set Certificate Store.
|
Step 2 |
Choose Certificate |
Prompt Windows Users to Select Authentication Certificate
You can configure the AnyConnect to present a list of valid
certificates to users and let them choose the certificate to authenticate the
session. An expired certificate is not necessarily considered invalid. For example,
if you are using SCEP, the server might issue a new certificate to the client.
Eliminating expired certificates might keep a client from connecting at all; thus
requiring manual intervention and out-of-band certificate distribution. AnyConnect
only restricts the client certificate based on security-related properties, such as
key usage, key type and strength, and so on, based on configured certificate
matching rules. This configuration is available only for Windows. By default, user
certificate selection is disabled.
Procedure
Step 1 |
Open the VPN |
Step 2 |
To enable certificate selection, uncheck Disable Certificate Selection. |
Step 3 |
Uncheck User |
Create a PEM Certificate Store for macOS and Linux
AnyConnect supports certificate retrieval from a Privacy
Enhanced Mail (PEM) formatted file store. AnyConnect reads PEM-formatted
certificate files from the file system on the remote computer, verifies, and
signs them.
Before you begin
In order for the client to acquire the appropriate certificates
under all circumstances, ensure that your files meet the following
requirements:
-
All certificate files must end with the extension .pem.
-
All private key files must end with the extension .key.
-
A client certificate and its corresponding private key must have
the same filename. For example: client.pem and client.key.
Tip
Instead of keeping copies of the PEM files, you can use soft links to PEM files.
To create the PEM file certificate store, create the paths and
folders listed below. Place the appropriate certificates in these folders:
PEM File Certificate Store Folders |
Type of Certificates Stored |
||
---|---|---|---|
~/.cisco/certificates/ca
|
Trusted CA and root certificates |
||
~/.cisco/certificates/client |
Client certificates |
||
~/.cisco/certificates/client/private |
Private keys |
Machine certificates are the same as
PEM file certificates, except for the root directory. For machine certificates,
substitute /opt/.cisco for ~/.cisco. Otherwise, the paths, folders, and types of
certificates listed apply.
Configure
Certificate Matching
AnyConnect can limit its search of certificates to those
certificates that match a specific set of keys. Certificate matchings are
global criteria that are set in an AnyConnect VPN client profile, in the
Certificate Matching
pane. The criteria are:
-
Key Usage
-
Extended Key Usage
-
Distinguished Name
Configure Key
Usage
Selecting the
Key Usage keys limits the certificates that
AnyConnect can use to those certificates that have at least one of the selected
keys. The supported set is listed in the
Key Usage list on the VPN client profile, and it
includes:
-
DECIPHER_ONLY
-
ENCIPHER_ONLY
-
CRL_SIGN
-
KEY_CERT_SIGN
-
KEY_AGREEMENT
-
DATA_ENCIPHERMENT
-
KEY_ENCIPHERMENT
-
NON_REPUDIATION
-
DIGITAL_SIGNATURE
If one or more criteria are specified, a certificate must match
at least one to be considered a matching certificate.
Configure Extended
Key Usage
Selecting the
Extended Key Usage keys limits the certificates that
AnyConnect can use to the certificates that have these keys. The following
table lists the well-known set of constraints with their corresponding object
identifiers (OIDs).
Constraint |
OID |
---|---|
ServerAuth |
1.3.6.1.5.5.7.3.1 |
ClientAuth |
1.3.6.1.5.5.7.3.2 |
CodeSign |
1.3.6.1.5.5.7.3.3 |
EmailProtect |
1.3.6.1.5.5.7.3.4 |
IPSecEndSystem |
1.3.6.1.5.5.7.3.5 |
IPSecTunnel |
1.3.6.1.5.5.7.3.6 |
IPSecUser |
1.3.6.1.5.5.7.3.7 |
TimeStamp |
1.3.6.1.5.5.7.3.8 |
OCSPSign |
1.3.6.1.5.5.7.3.9 |
DVCS |
1.3.6.1.5.5.7.3.10 |
IKE Intermediate |
1.3.6.1.5.5.8.2.2 |
Configure Custom
Extended Match Key
All other OIDs (such as 1.3.6.1.5.5.7.3.11, used in some
examples in this document) are considered “custom.” As an administrator, you
can add your own OIDs if the OID that you want is not in the well-known set.
Configure
Certificate Distinguished Name
The
Distinguished Name table contains certificate
identifiers that limit the certificates that the client can use to the
certificates that match the specified criteria and criteria match conditions.
Click the
Add button to add criteria to the list and to set a
value or wildcard to match the contents of the added criteria.
Identifier |
Description |
---|---|
CN |
SubjectCommonName |
SN |
SubjectSurName |
GN |
SubjectGivenName |
N |
SubjectUnstructName |
I |
SubjectInitials |
GENQ |
SubjectGenQualifier |
DNQ |
SubjectDnQualifier |
C |
SubjectCountry |
L |
SubjectCity |
SP |
SubjectState |
ST |
SubjectState |
O |
SubjectCompany |
OU |
SubjectDept |
T |
SubjectTitle |
EA |
SubjectEmailAddr |
DC |
DomainComponent |
ISSUER-CN |
IssuerCommonName |
ISSUER-SN |
IssuerSurName |
ISSUER-GN |
IssuerGivenName |
ISSUER-N |
IssuerUnstructName |
ISSUER-I |
IssuerInitials |
ISSUER-GENQ |
IssuerGenQualifier |
ISSUER-DNQ |
IssuerDnQualifier |
ISSUER-C |
IssuerCountry |
ISSUER-L |
IssuerCity |
ISSUER-SP |
IssuerState |
ISSUER-ST |
IssuerState |
ISSUER-O |
IssuerCompany |
ISSUER-OU |
IssuerDept |
ISSUER-T |
IssuerTitle |
ISSUER-EA |
IssuerEmailAddr |
ISSUER-DC |
IssuerDomainComponent |
Distinguished
Name can contain zero or more matching criteria. A certificate must
match all specified criteria to be considered a matching certificate.
Distinguished Name matching specifies that a
certificate must or must not have the specified string, and whether wild
carding for the string is allowed.
VPN Authentication
Using SDI Token (SoftID) Integration
AnyConnect integrates support for RSA SecurID client software
versions 1.1 and later running on Windows 7 x86 (32-bit) and x64 (64-bit).
RSA SecurID software authenticators reduce the number of items a
user has to manage for safe and secure access to corporate assets. RSA SecurID
Software Tokens residing on a remote device generate a random one-time-use
passcode that changes every 60 seconds. The term SDI stands for Security
Dynamics, Inc. technology, which refers to this one-time password generation
technology that uses hardware and software tokens.
Typically, users make an AnyConnect connection by clicking the
AnyConnect icon in the tools tray, selecting the connection profile with which
they wish to connect, and then entering the appropriate credentials in the
authentication dialog box. The login (challenge) dialog box matches the type of
authentication configured for the tunnel group to which the user belongs. The
input fields of the login dialog box clearly indicate what kind of input is
required for authentication.
For SDI authentication, the remote user enters a PIN (Personal
Identification Number) into the AnyConnect software interface and receives an
RSA SecurID passcode. After the user enters the passcode into the secured
application, the RSA Authentication Manager validates the passcode and allows
the user to gain access.
Users who use RSA SecurID hardware or software tokens see input
fields indicating whether the user should enter a passcode or a PIN, a PIN, or
a passcode and the status line at the bottom of the dialog box provides further
information about the requirements. The user enters a software token PIN or
passcode directly into the AnyConnect user interface.
The appearance of the initial login dialog box depends on the
secure gateway settings: the user can access the secure gateway either through
the main login page, the main index URL, a tunnel-group login page, or a tunnel
group URL (URL/tunnel-group). To access the secure gateway via the main login
page, the “Allow user to select connection” check box must be set in the
Network (Client) Access AnyConnect Connection Profiles page. In either case,
the secure gateway sends the client a login page. The main login page contains
a drop-down list in which the user selects a tunnel group; the tunnel-group
login page does not, since the tunnel-group is specified in the URL.
In the case of a main login page (with a drop-down list of
connection profiles or tunnel groups), the authentication type of the default
tunnel group determines the initial setting for the password input field label.
For example, if the default tunnel group uses SDI authentication, the field
label is “Passcode;” but if the default tunnel group uses NTLM authentication,
the field label is “Password.” In Release 2.1 and later, the field label is not
dynamically updated with the user selection of a different tunnel group. For a
tunnel-group login page, the field label matches the tunnel-group requirements.
The client supports input of RSA SecurID Software Token PINs in
the password input field. If the RSA SecurID Software Token software is
installed and the tunnel-group authentication type is SDI, the field label is
“Passcode” and the status bar states “Enter a username and passcode or software
token PIN.” If a PIN is used, subsequent consecutive logins for the same tunnel
group and username have the field label “PIN.” The client retrieves the
passcode from the RSA SecurID Software Token DLL using the entered PIN. With
each successful authentication, the client saves the tunnel group, the
username, and authentication type, and the saved tunnel group becomes the new
default tunnel group.
AnyConnect accepts passcodes for any SDI authentication. Even
when the password input label is “PIN,” the user may still enter a passcode as
instructed by the status bar. The client sends the passcode to the secure
gateway as is. If a passcode is used, subsequent consecutive logins for the
same tunnel group and username have the field label “Passcode.”
The RSASecureIDIntegration profile setting has three possible
values:
-
Automatic—The client first attempts one method, and if it fails,
the other method is tried. The default is to treat the user input as a token
passcode (HardwareToken), and if that fails, treat it as a software token pin
(SoftwareToken). When authentication is successful, the successful method is
set as the new SDI Token Type and cached in the user preferences file. For the
next authentication attempt, the SDI Token Type defines which method is
attempted first. Generally, the token used for the current authentication
attempt is the same token used in the last successful authentication attempt.
However, when the username or group selection is changed, it reverts to
attempting the default method first, as shown in the input field label.
Note
The SDI Token Type only has meaning for the automatic setting.
You can ignore logs of the SKI Token Type when the authentication mode is not
automatic. HardwareToken as the default avoids triggering next token mode.
-
SoftwareToken—The client always interprets the user input as a
software token PIN, and the input field label is “PIN:”. -
HardwareToken—The client always interprets the user input as a
token passcode, and the input field label is “Passcode:”.
Note |
AnyConnect does not support token selection from multiple tokens |
Categories of SDI
Authentication Exchanges
All SDI authentication exchanges fall into one of the following
categories:
-
Normal SDI Authentication Login
-
New User mode
-
New PIN mode
-
Clear PIN mode
-
Next Token Code mode
Normal SDI
Authentication Login
A normal login challenge is always the first challenge. The SDI
authentication user must provide a user name and token passcode (or PIN, in the
case of a software token) in the username and passcode or PIN fields,
respectively. The client returns the information to the secure gateway
(central-site device), and the secure gateway verifies the authentication with
the authentication server (SDI or SDI via RADIUS proxy).
If the authentication server accepts the authentication request,
the secure gateway sends a success page back to the client, and the
authentication exchange is complete.
If the passcode is not accepted, the authentication fails, and
the secure gateway sends a new login challenge page, along with an error
message. If the passcode failure threshold on the SDI server has been reached,
then the SDI server places the token into next token code mode.
New User, Clear
PIN, and New PIN Modes
The PIN can be cleared only on the SDI server and only by the
network administrator.
In the New User, Clear PIN, and New PIN modes, AnyConnect caches
the user-created PIN or system-assigned PIN for later use in the “next
passcode” login challenge.
Clear PIN mode and New User mode are identical from the point of
view of the remote user and are both treated the same by the secure gateway. In
both cases, the remote user either must enter a new PIN or be assigned a new
PIN by the SDI server. The only difference is in the user response to the
initial challenge.
For New PIN mode, the existing PIN is used to generate the
passcode, as it would be in any normal challenge. For Clear PIN mode, no PIN is
used at all for hardware tokens, with the user entering just a token code. A
PIN of eight consecutive zeros (00000000) is used to generate a passcode for
RSA software tokens. In either case, the SDI server administrator must inform
the user of what, if any, PIN value to use.
Adding a new user to an SDI server has the same result as
clearing the PIN of an existing user. In both cases, the user must either
provide a new PIN or be assigned a new PIN by the SDI server. In these modes,
for hardware tokens, the user enters just a token code from the RSA device. In
either case, the SDI server administrator must inform the user of what, if any,
PIN value to use.
Creating a New
PIN
If there is no current PIN, the SDI server requires that one of
the following conditions be met, depending on how the system is configured:
-
The system must assign a new PIN to the user (Default)
-
The user must create a new PIN
-
The user can choose whether to create a PIN or have the system
assign it
If the SDI server is configured to allow the remote user to
choose whether to create a PIN or have the system assign a PIN, the login
screen presents a drop-down list showing the options. The status line provides
a prompt message.
For a system-assigned PIN, if the SDI server accepts the
passcode that the user enters on the login page, then the secure gateway sends
the client the system-assigned PIN. The client sends a response back to the
secure gateway, indicating that the user has seen the new PIN, and the system
continues with a “next passcode’ challenge.
If the user chooses to create a new PIN, AnyConnect presents a
dialog box on which to enter that PIN. The PIN must be a number from 4 to 8
digits long. Because the PIN is a type of password, anything the user enters
into these input fields is displayed as asterisks.
With RADIUS proxy, the PIN confirmation is a separate challenge,
subsequent to the original dialog box. The client sends the new PIN to the
secure gateway, and the secure gateway continues with a “next passcode”
challenge.
“Next Passcode”
and “Next Token Code” Challenges
For a “next passcode” challenge, the client uses the PIN value
cached during the creation or assignment of a new PIN to retrieve the next
passcode from the RSA SecurID Software Token DLL and return it to the secure
gateway without prompting the user. Similarly, in the case of a “next Token
Code” challenge for a software token, the client retrieves the next Token Code
from the RSA SecurID Software Token DLL.
Compare Native SDI with RADIUS SDI
The network administrator can configure the secure
gateway to allow SDI authentication in either of the following modes:
-
Native SDI refers to the native ability in the
secure gateway to communicate directly with the SDI server for handling SDI
authentication. -
RADIUS SDI refers to the process of the secure
gateway performing SDI authentication using a RADIUS SDI proxy, which
communicates with the SDI server.
Native SDI and RADIUS SDI appear identical to the
remote user. Because the SDI messages are configurable on the SDI server, the
message text on the ASA must match the message text on the SDI server.
Otherwise, the prompts displayed to the remote client user might not be
appropriate for the action required during authentication. AnyConnect might
fail to respond and authentication might fail.
RADIUS SDI challenges, with minor exceptions,
essentially mirror native SDI exchanges. Since both ultimately communicate with
the SDI server, the information needed from the client and the order in which
that information is requested is the same.
During authentication, the RADIUS server presents
access challenge messages to the ASA. Within these challenge messages are reply
messages containing text from the SDI server. The message text is different
when the ASA is communicating directly with an SDI server from when
communicating through the RADIUS proxy. Therefore, in order to appear as a
native SDI server to AnyConnect, the ASA must interpret the messages from the
RADIUS server.
Also, because the SDI messages are configurable on
the SDI server, the message text on the ASA must match (in whole or in part)
the message text on the SDI server. Otherwise, the prompts displayed to the
remote client user may not be appropriate for the action required during
authentication. AnyConnect might fail to respond and authentication might fail.
Configure the ASA to Support RADIUS/SDI Messages
To configure the ASA to interpret SDI-specific RADIUS reply
messages and prompt the AnyConnect user for the appropriate action, you must
configure a connection profile (tunnel group) to forward RADIUS reply messages in a
manner that simulates direct communication with an SDI server. Users authenticating
to the SDI server must connect over this connection profile.
Procedure
Step 1 |
Go to . |
|||||||||||||||||||||||||||||
Step 2 |
Select the connection profile you want to configure to |
|||||||||||||||||||||||||||||
Step 3 |
In the Edit AnyConnect |
|||||||||||||||||||||||||||||
Step 4 |
Check Enable the display |
|||||||||||||||||||||||||||||
Step 5 |
Click OK. |
|||||||||||||||||||||||||||||
Step 6 |
Choose. |
|||||||||||||||||||||||||||||
Step 7 |
Click Add to |
|||||||||||||||||||||||||||||
Step 8 |
Configure the AAA server group in the Edit AAA Server |
|||||||||||||||||||||||||||||
Step 9 |
In the AAA Server |
|||||||||||||||||||||||||||||
Step 10 |
In the SDI Messages area, expand the Message Table area. Double-click a message The following table shows the message code, the default
|
|||||||||||||||||||||||||||||
Step 11 |
Click OK, |
На чтение 4 мин. Просмотров 389 Опубликовано 15.05.2021
Мы здесь, чтобы предоставить вам простые пошаговые инструкции по установке Cisco Anyconnect VPN Client в Windows 10. Хотя последняя версия хорошо совместима с Windows 10, браузер Microsoft Edge не имеет необходимого подключаемого модуля для его автоматическая установка через Интернет. Следовательно, это руководство поможет вам установить его правильно.
Cisco Anyconnect VPN Client – это популярный простой и безопасный доступ к конечным точкам в нескольких местах по всему миру. Организация обеспечивает постоянное взаимодействие с пользователем на всех устройствах, как локальных, так и внешних, и упрощает управление с помощью одного агента.
Содержание
- Процедура установки Cisco Anyconnect VPN Client на Windows 10
- Следуйте приведенным ниже инструкциям, чтобы использовать Cisco Anyconnect VPN Client в Windows 10:
- Внимание
Процедура установки Cisco Anyconnect VPN Client на Windows 10
Вот способ установки VPN-клиента Cisco Anyconnect в Windows 10 –
Шаг 1. Щелкните меню «Пуск» и выберите «Microsoft Edge». ”Браузер из плиток меню, чтобы запустить его.
Шаг 2: Когда браузер откроется, скопируйте перейдите по следующей ссылке и вставьте ее в адресную строку:
https://anyc.vpn.gatech.edu. Нажмите Enter .
Примечание. – Вы также можете щелкнуть ссылку, чтобы открыть ее в другом браузере.
Шаг 3: Один раз страница входа закрывает вид, щелкните раскрывающееся меню рядом с Group и выберите из списка gatech-2fa-Duo .
Шаг 4: Далее введите свое имя пользователя и пароль в соответствующие поля.
Еще раз введите свой пароль.
Шаг 5. После успешной аутентификации учетных данных вы увидит баннер входа в систему. Нажмите «Продолжить», чтобы двигаться дальше.
Примечание. Для автоматической установки установщик быстро выполнит установку. попытаться обнаружить ActiveX и более поздние версии на Java. Поскольку в Microsoft Edge нет этого подключаемого модуля, вы увидите всплывающее окно с уведомлением о сбое. Поэтому щелкните ссылку, предоставленную опцией «Рабочий стол Windows» во всплывающем окне, чтобы загрузить приложения.
Шаг 6. После завершения загрузки нажмите Run на панели Downloads и следуйте инструкциям установщика на экране, чтобы продолжить установки.
Шаг 7: Выберите «Да», когда диалоговое окно с предупреждением UAC запрашивает ваше разрешение.
Шаг 8: Когда в мастере установки появится следующая страница, выберите вариант Далее для завершения установки.
Когда установка завершит свою работу, выберите Готово .
Следовательно, клиент Cisco Anyconnect VPN установлен в вашей Windows, и он будет доступен в меню” Пуск “..
Следуйте приведенным ниже инструкциям, чтобы использовать Cisco Anyconnect VPN Client в Windows 10:
Откройте меню «Пуск» и выберите Cisco AnyConnect Secure Mobility Client из списка для запуска.
Когда появится следующее всплывающее окно, выберите vpn.gatech.edu в разделе VPN и нажмите кнопку Connect , чтобы продолжить.
После появления всплывающего окна Credential щелкните раскрывающееся окно рядом с Group: и выберите gatech-2fa-Duo из меню.
После выбора «gatech-2fa-Duo» во всплывающем окне вы увидите несколько блоков, таких как имя пользователя, пароль и двухфакторный (второй пароль).
Введите имя пользователя GT и пароль GT в соответствующие поля.
В поле второго пароля введите любой из следующих кодов и нажмите кнопку «ОК», чтобы продолжить.
push, phone, phone2, phone3, phoneN
Мобильное приложение Duo сгенерирует код, поэтому вам нужно только нажать на опцию Key в правом верхнем углу.
Нажмите phone, phone2, phone3 ……. В серии phoneN отсутствует phone1, поскольку и phone, и phone1 являются справочными, и приложение сохраняет их в системе в соответствии с порядком. В случае phone1 система позвонит на ваш телефон (может быть мобильный телефон), а для Phone2 вы получите в своем офисе номер.
После проверки всех учетных данных вы увидите приветственный баннер. Нажмите кнопку «Принять», чтобы продолжить.
Таким образом, AnyConnect значок будет свернут в системном трее. Как только вы сделаете щелчок, он будет развернут. Щелкните значок «Шестеренка» в нижнем левом углу, чтобы просмотреть подробную информацию.
Если хотите чтобы разорвать соединение, просто нажмите кнопку «Отключить».
Это все о способе установки Cisco Клиент Anyconnect VPN в Windows 10.
Внимание
Полная инструкция посвящена установке клиента Cisco Anyconnect VPN Client в ПО Windows 10. Это действительно не влияет на компонент Start Before Logon . Фактически, это необходимо не для общей платформы, а для конкретных подразделений кампуса. Если вам нужен компонент, посетите эту ссылку, чтобы получить уникальные установочные пакеты. Кроме того, поскольку вы уже установили VPN-клиент, пакет «Начать перед входом в систему» также будет добавлен в следующее онлайн-обновление.
Отказ от ответственности: некоторые страницы этого сайта могут содержать партнерскую ссылку. На нашу редакцию это никак не влияет.
Хотите знать, как настроить Cisco VPN? Cisco — одно из самых узнаваемых имен в области сетевых технологий. Это имя стоит за большинством корпоративных маршрутизаторов, значительной частью магистральных интернет-маршрутизаторов, брандмауэров, коммутаторов и сетевого оборудования. Он также предоставляет приложения для конечных пользователей, такие как Cisco AnyConnect, которые используются во многих колледжах и университетах, а также на предприятиях по всему миру. Это руководство поможет вам настроить Cisco AnyConnect VPN.
VPN — важный инструмент для защиты сетевого трафика от слежки. Независимо от того, спонсируется ли это государством, интернет-провайдером или взломом, шифрование вашего трафика защищает его от посторонних глаз. Даже если вам нечего скрывать, защита вашего интернет-трафика является фундаментальной частью компьютерной безопасности. Некоторые образовательные учреждения настаивают на этом, как и большинство компаний, которые разрешают удаленный доступ к данным или приложениям.
Cisco AnyConnect включает в себя клиент, который вы устанавливаете на свои устройства, а также веб-приложение или Adaptive Security Appliance (ASA). Cisco ASA — это единое устройство, которое включает в себя брандмауэр, антивирус, спам-фильтр, VPN-сервер, устройство с сертификатом SSL и другие дополнительные функции. Там, где раньше мы использовали отдельный аппаратный брандмауэр, VPN-сервер и антивирусное решение, все это можно инкапсулировать в одном устройстве. Это отличный способ обезопасить свой бизнес. Это одно устройство защищает все решения — одна из причин популярности ASA.
Ограниченное предложение: 3 месяца БЕСПЛАТНО!
Настройка Cisco AnyConnect VPN
Настройка Cisco AnyConnect VPN аналогична настройке любого VPN-клиента. Подход зависит от устройства, на которое вы его устанавливаете, но после установки установка очень проста. Вы можете скачать Cisco AnyConnect VPN напрямую с сайта Cisco, но если вы используете его для подключения к своему колледжу или работодателю, они должны предоставить ссылку. Вы должны использовать эту ссылку, так как она может содержать файл конфигурации, необходимый для быстрого подключения.
Чтобы вы могли подключиться к VPN с помощью Cisco AnyConnect, вам потребуется логин. Если вы подключаетесь к сети колледжа или компании, ваш отдел кадров или служба ИТ-поддержки должны были в какой-то момент прислать вам их. Без них вы не сможете подключиться.
Ограниченное предложение: 3 месяца БЕСПЛАТНО!
В противном случае:
Программа установки может не включать какие-либо конкретные шаги установки в зависимости от того, откуда вы получили доступ к файлу загрузчика. В приведенном выше примере используется исполняемый файл Windows. Android, Mac OS и другие операционные системы будут использовать что-то другое.
Настройка Cisco AnyConnect VPN на устройстве Chromebook или Android
Другим примером может быть установка Cisco AnyConnect VPN на Chromebook. Я упоминаю об этом специально, так как он не использует стандартную установку приложения. Хотя у Cisco есть совместимое приложение для Android, оно работает не так, как должно, поэтому компания рекомендует вместо этого использовать расширение Chrome. Просто имейте в виду, что в этом случае будет зашифрован только трафик Chrome. Весь остальной трафик не будет использовать VPN.
Ограниченное предложение: 3 месяца БЕСПЛАТНО!
После аутентификации расширения вы можете установить новое соединение, сохранить его и использовать, когда вам нужно подключиться.
Подключение Cisco AnyConnect VPN
После установки вы можете подключиться к Cisco AnyConnect VPN в любое время, если у вас есть данные для входа, предоставленные вашим колледжем или работодателем. Откройте приложение, войдите в сеть, к которой вы хотите подключиться, введите свои данные для входа, нажмите «Подключиться», и через несколько секунд вы увидите окно с подключением.
В некоторых сетях требуется двухфакторная аутентификация. Если у вас один из них, получите код и введите его в новом окне 2FA. Нажмите «Продолжить», и VPN подключится. На вашем устройстве должен появиться статус, говорящий о том, что вы подключились к службе Cisco AnyConnect.
Чтобы отключиться, либо выберите уведомление Windows, либо откройте приложение Cisco AnyConnect на своем устройстве и выберите Отключить. Дайте ему несколько секунд, чтобы отключиться от защищенной сети, и еще несколько секунд, чтобы ваши устройства применили сетевые настройки по умолчанию. Теперь вы сможете нормально пользоваться Интернетом за пределами VPN.
VPN-клиент Cisco AnyConnect быстро справляется с защитой интернет-трафика между организацией и удаленными клиентами. Это быстро, безопасно и отлично справляется с задачей упрощения для пользователей. Неудивительно, что он так популярен!
- Настройка двухфакторной аутентификации
- Установка приложения Cisco Anyconnect VPN Client
- Подключение
- Аутентификация
Прежде, чем подключаться к сети Университета, Вам необходимо настроить Ваш телефон на проверку второго фактора. Настройку проверки второго фактора необходимо сделать только один раз, поэтому если Вы уже выполняли это ранее, можете пропустить этот шаг, и перейти к шагу с установкой приложения Cisco Anyconnect VPN Client.
Внимание! С 15.09.2021 изменился способ двухфакторной аутентификации по умолчанию. Теперь вместо звонка второй фактор подтверждается через мобильное приложение Microsoft Authenticator. Приложение доступно для систем Android (Google Play) и iOS (App Store).
Для пользователей, использовавших аутентификацию по вызову (звонку), действует прежний способ проверки. Если Вы хотите изменить Ваш контактный номер телефона, воспользуйтесь инструкцией.
Чтобы сменить метод аутентификации, воспользуйтесь руководством по ссылке.
Также не забывайте, что при необходимости использования квалифицированной электронной подписи при удаленном подключении к рабочему месту носитель с электронной подписью необходимо забрать с собой, чтобы подключить его к домашнему компьютеру/ноутбуку.
Настройка двухфакторной аутентификации
Проверка второго фактора выполняется через мобильное приложение Microsoft Authenticator, которое доступно для систем Android (Google Play) и iOS (App Store). Установите данное приложение (рис. 1).
Рис. 1
При первом входе нажмите «Принимаю» для принятия соглашения о конфиденциальности. Затем нажмите «Сканировать QR-код и выдайте необходимые системные разрешения для доступа к камере. Откроется интерфейс сканирования (рис. 2). Не закрывайте приложение!
Рис. 2
Далее Вам необходимо с компьютера или другого устройства войти на портал двухфакторной проверки аутентификации, доступного по адресу: https://mfa.utmn.ru . Введите данные Вашей корпоративной учетной записи в поля и нажмите кнопку «Вход» (рис. 3).
Рис. 3
После успешного входа Вы перейдете в настройку пользователя и Вам предложат выбрать метод аутентификации. Выберете «Мобильное приложение» и нажмите «Создать код активации» (рис. 4).
Рис. 4
Вам предоставят URL-адрес и QR-код (рис. 5). Данный код будет действовать 10 минут с момента создания. Вернитесь к приложению Mircrosoft Authenticator.
Рис. 5
Если отсканировать не удалось, введите код вручную (рис. 6).
Рис. 6
После успешной регистрации Ваша учетная запись появиться в главном меню (рис. 7).
Рис. 7
Вернитесь в окно портала и нажмите «Завершить активацию» (рис. 8). Портал вернет Вас на предыдущую страничку с сообщением «Активация выполнена» (рис. 9).
Рис. 8
Рис. 9
Настройка двухфакторной аутентификации через приложение завершена. Теперь Вы можете подключаться к своему рабочему компьютеру.
Установка приложения Cisco Anyconnect VPN Client
Для установления защищенного подключения к корпоративной сети Университета Вам необходимо использовать приложение для обеспечения удаленного доступа Cisco AnyConnect Secure Mobility Client. Его можно скачать по ссылке для ОС Windows и по ссылке для ОС macOS. Данное приложение доступно для систем Android и iOS. Выполните установку, если приложение уже установлено, пропустите данный пункт.
Подключение
Откройте установленное приложение Cisco AnyConnect Secure Mobility Client. В качестве сервера подключения укажите имя «vpn.utmn.ru» в поле, указанном на рис. 10, и нажмите кнопку «Connect».
Рис. 10
Аутентификация
Для прохождения аутентификации Вам необходимо выбрать группу подключения «UTMN_MFA» и ввести данные Вашей корпоративной учетной записи в поля, представленные на рис. 11.
Рис. 11
Приложение Microsoft Authenticator пришлет уведомление с просьбой подтвердить или отклонить вход (рис. 12).
Рис. 12
После чего автоматически будет установлено защищенное подключение (рис. 13) и Вы сможете использовать корпоративные ресурсы Университета.
Рис. 13
Если у Вас остались вопросы по удаленному подключению к сети Университета, обратитесь в диспетчерскую службы технической поддержки ЦИТ:
- напишите запрос через Портал поддержки ЦИТ;
- с помощью электронной почты 597777@utmn.ru;
- по телефону: +7 (3452) 59-77-77.