Auto Proxy
Auto Proxy
Auto Proxy
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Server List from the navigation pane.
2. Click Add.
3. Configure the servers host name and address:
4. (Optional) Add backup servers to the Backup Server List. Do not use "&" or "<" characters in the name.
5. (Optional) Add load balancing servers to the Load Balancing Server List. Do not use "&" or "<" characters
in the name.
6. Specify the Primary Protocol for the client to use for this ASA:
7. (Optional) Configure SCEP for this server:
8. Click OK.
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Server List from the navigation pane.
Click Add.
Configure the servers host name and address:
a) Enter a Host Display Name, an alias used to refer to the host, an FQDN, or an IP address. Do not use "&" or "<"
characters in the name. If you enter an FQDN or an IP address, you do not need to enter the FQDN or IP Address
in the next step.
If you enter an IP address, use the Public IPv4 or the Global IPv6 address of the secure gateway. Use of the link-local
secure gateway address is not supported.
b) (Optional) Enter the hosts FQDN or IP Address if not entered in the Host Display Name.
c) (Optional) Specify a User Group.
AnyConnect uses the FQDN or IP Address in conjunction with User Group to form the Group URL.
Step 4
(Optional) Add backup servers to the Backup Server List. Do not use "&" or "<" characters in the name.
If the server you are configuring is unavailable, the client attempts to connect to the servers in this Backup Server List
before resorting to the global Backup Server List.
Step 5
(Optional) Add load balancing servers to the Load Balancing Server List. Do not use "&" or "<" characters in the name.
If the host for this server list entry specifies a load balancing cluster of security appliances, and the Always-On feature
is enabled, add the load balancing devices in the cluster to this list. If you do not, Always-On blocks access to the devices
in the load balancing cluster.
Step 6
Specify the Primary Protocol for the client to use for this ASA:
a) Choose SSL (default) or IPsec.
If you specify IPsec, the User Group must be the exact name of the connection profile (tunnel group). For SSL, the
user group is the group-url or group-alias of the connection profile.
b) If you specify IPsec, select Standard Authentication Only to disable the default authentication method (proprietary
AnyConnect EAP), and choose a method from the drop-down list.
Note
Changing the authentication method from the proprietary AnyConnect EAP to a standards-based method
disables the ability of the ASA to configure session timeout, idle timeout, disconnected timeout, split
tunneling, split DNS, MSIE proxy configuration, and other features.
Step 7
Step 8
Click OK.
DETAILED STEPS
Step 1
Step 2
Note
If you uninstall AnyConnect while leaving the VPNGINA or PLAP component installed, the VPNGINA
or PLAP component is disabled and not visible to the remote user.
SUMMARY STEPS
1.
2.
3.
4.
5.
In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Select a group policy and click Edit or Add a new group policy.
Select Advanced > AnyConnect Client in the left navigation pane.
Uncheck Inherit for the Optional Client Module for Download setting.
Select the AnyConnect SBL module in the drop-down list.
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Select a group policy and click Edit or Add a new group policy.
Select Advanced > AnyConnect Client in the left navigation pane.
Uncheck Inherit for the Optional Client Module for Download setting.
Select the AnyConnect SBL module in the drop-down list.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
2. Select Use Start Before Logon.
3. (Optional) To give the remote user control over SBL, select User Controllable.
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
Select Use Start Before Logon.
(Optional) To give the remote user control over SBL, select User Controllable.
Note
The user must reboot the remote computer before SBL takes effect.
Ensure that the AnyConnect profile is loaded on the ASA, ready to be deployed.
Delete prior profiles (search for them on the hard drive to find the location, *.xml).
Using Windows Add/Remove Programs, uninstall the SBL Components. Reboot the computer and retest.
Clear the users AnyConnect log in the Event Viewer and retest.
5. Browse back to the security appliance to install AnyConnect again.
6. Reboot once. On the next reboot, you should be prompted with the Start Before Logon prompt.
7. Collect a DART bundle and send it to your AnyConnect Administrator.
8. If you see the following error, delete the users AnyConnect profile:
9. Go back to the .tmpl file, save a copy as an.xml file, and use that XML file as the default profile.
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Ensure that the AnyConnect profile is loaded on the ASA, ready to be deployed.
Delete prior profiles (search for them on the hard drive to find the location, *.xml).
Using Windows Add/Remove Programs, uninstall the SBL Components. Reboot the computer and retest.
Clear the users AnyConnect log in the Event Viewer and retest.
Browse back to the security appliance to install AnyConnect again.
Reboot once. On the next reboot, you should be prompted with the Start Before Logon prompt.
Collect a DART bundle and send it to your AnyConnect Administrator.
If you see the following error, delete the users AnyConnect profile:
Description: Unable to parse the profile C:\Documents and Settings\All Users\Application Data
\Cisco\Cisco AnyConnect Secure Mobility Client\Profile\VABaseProfile.xml. Host data not available.
Step 9
Go back to the .tmpl file, save a copy as an.xml file, and use that XML file as the default profile.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
2. Select Auto Connect On Start.
3. (Optional) To give the user control over Auto Connect on Start, select User Controllable.
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
Select Auto Connect On Start.
(Optional) To give the user control over Auto Connect on Start, select User Controllable.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
2. Select Auto Reconnect.
3. Choose the Auto Reconnect Behavior:
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
Select Auto Reconnect.
Choose the Auto Reconnect Behavior:
Disconnect On Suspend(Default) AnyConnect releases the resources assigned to the VPN session upon a system
suspend and does not attempt to reconnect after the system resume.
Reconnect After ResumeThe client retains resources assigned to the VPN session during a system suspend and
attempts to reconnect after the system resume.
Note
For the equivalent feature for the Web Security module, see Secure Trusted Network Detection in the
Configure Web Security chapter.
You configure TND in the AnyConnect VPN Client profile. No changes are required to the ASA configuration.
You need to specify the action or policy AnyConnect takes when recognizing it is transitioning between
trusted and untrusted networks, and identify your trusted networks and servers.
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
Select Automatic VPN Policy.
Choose a Trusted Network Policy.
This is the action the client takes when the user is inside the corporate network (the trusted network). The options are:
Disconnect(Default) The client terminates the VPN connection in the trusted network.
ConnectThe client starts a VPN connection in the trusted network.
Do NothingThe client takes no action in the trusted network. Setting both the Trusted Network Policy and
Untrusted Network Policy to Do Nothing disables Trusted Network Detection (TND).
PauseAnyConnect suspends the VPN session (instead of disconnecting it) if a user enters a network configured
as trusted after establishing a VPN session outside the trusted network. When the user goes outside the trusted
network again, AnyConnect resumes the session. This feature is for the users convenience because it eliminates
the need to establish a new VPN session after leaving a trusted network.
Step 4
Step 5
10
Specify the DNS suffixes (a string separated by commas) that a network interface may have when the client is in the
trusted network. You can assign multiple DNS suffixes if you add them to the split-dns list and specify a default domain
on the ASA.
The AnyConnect client builds the DNS suffix list in the following order:
The domain passed by the head end.
The split-DNS suffix list passed by the head end.
The public interfaces DNS suffixes, if configured. If not, the primary and connection-specific suffixes, along with
the parent suffixes of the primary DNS suffix (if the corresponding box is checked in the Advanced TCP/IP Settings).
To Match This DNS Suffix:
example.com (only)
*example.com
*.example.com OR asa.example.com,
anyconnect.example.com
11
12
DETAILED STEPS
Step 1
Step 2
Step 3
SUMMARY STEPS
1.
2.
3.
4.
5.
6.
7.
Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
Select Automatic VPN Policy.
Configure Trusted Network Detection.
Select Always On.
(Optional) Select or un-select Allow VPN Disconnect.
(Optional) Configure a Connect Failure Policy.
(Optional) Configure Captive Portal Remediation.
13
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
Select Automatic VPN Policy.
Configure Trusted Network Detection.
Select Always On.
(Optional) Select or un-select Allow VPN Disconnect.
(Optional) Configure a Connect Failure Policy.
(Optional) Configure Captive Portal Remediation.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Server List from the navigation pane.
2. Choose a server that is a master device of a load-balancing cluster and click Edit.
3. Enter an FQDN or IP address of any load-balancing cluster member.
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Server List from the navigation pane.
Choose a server that is a master device of a load-balancing cluster and click Edit.
Enter an FQDN or IP address of any load-balancing cluster member.
14
SUMMARY STEPS
1. Choose Configuration > Remote Access VPN > Network (Client) Access > Dynamic Access Policies
> Add or Edit.
2. Configure criteria to exempt users from Always-On VPN. For example, use the Selection Criteria area to
specify AAA attributes to match user logon IDs.
3. Click the AnyConnect tab on the bottom half of the Add or Edit Dynamic Access Policy window.
4. Click Disable next to Always-On VPN for AnyConnect client."
DETAILED STEPS
Step 1
Step 2
Step 3
Choose Configuration > Remote Access VPN > Network (Client) Access > Dynamic Access Policies > Add or Edit.
Configure criteria to exempt users from Always-On VPN. For example, use the Selection Criteria area to specify AAA
attributes to match user logon IDs.
Click the AnyConnect tab on the bottom half of the Add or Edit Dynamic Access Policy window.
Step 4
15
16
Caution
A connect failure closed policy prevents network access if AnyConnect fails to establish
a VPN session. Use extreme caution when implementing a connect failure closed policy.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
2. Set the Connect Failure Policy parameter to one of the following settings:
3. If you specified a closed policy:
DETAILED STEPS
Step 1
Step 2
Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
Set the Connect Failure Policy parameter to one of the following settings:
Closed(Default) Restricts network access when the secure gateway is unreachable.
OpenPermits network access by browsers and other applications when the client cannot connect to the secure
gateway.
Step 3
17
The end user must perform captive portal remediation by meeting the requirements of the provider of
the hotspot. These requirements could be paying a fee to access the network, signing an acceptable use
policy, both, or some other requirement defined by the provider.
If Always-On is enabled and the connect failure policy is closed, captive portal remediation needs to be
explicitly enabled. If enabled, the end user can perform remediation as described above. If disabled, the
following message is displayed upon each connection attempt, and the VPN cannot be connected.
The service provider in your current location is restricting access to the Internet.
The AnyConnect protection settings must be lowered for you to log on with the service
provider. Your current enterprise security policy does not allow this.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
2. Select Allow Captive Portal Remediation.
3. Specify the Remediation Timeout.
DETAILED STEPS
Step 1
Step 2
Open the VPN Profile Editor and choose Preferences (Part 1) from the navigation pane.
Select Allow Captive Portal Remediation.
This setting lifts the network access restrictions imposed by the closed connect failure policy.
Step 3
18
19
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
2. Choose a PPP Exclusion method. Also, check User Controllable for this field to let users view and
change this setting:
3. In the PPP Exclusion Server IP field, enter the IP address of the PPP server used for the connection.
Checking User Controllable for this field lets users change this IP address of the PPP Server via the
preferences.xml file.
DETAILED STEPS
Step 1
Step 2
Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
Choose a PPP Exclusion method. Also, check User Controllable for this field to let users view and change this setting:
AutomaticEnables PPP exclusion. AnyConnect automatically uses the IP address of the PPP server. Instruct
users to change the value only if automatic detection fails to get the IP address.
OverrideAlso enables PPP exclusion. If automatic detection fails to get the IP address of the PPP server, and the
PPP Exclusion UserControllable value is true, instruct users to follow the instructions in the next section to use
this setting.
DisabledPPP exclusion is not applied.
Step 3
In the PPP Exclusion Server IP field, enter the IP address of the PPP server used for the connection. Checking User
Controllable for this field lets users change this IP address of the PPP Server via the preferences.xml file.
What to Do Next
Refer to the "Instruct Users to Override PPP Exclusion" section for information about changing the
preferences.xml file.
SUMMARY STEPS
1. Use an editor such as Notepad to open the preferences XML file.
2. Insert the PPPExclusion details under <ControllablePreferences>, while specifying the Override value
and the IP address of the PPP server. The address must be a well-formed IPv4 address. For example:
3. Save the file.
4. Exit and restart AnyConnect.
20
DETAILED STEPS
Step 1
Step 2
Insert the PPPExclusion details under <ControllablePreferences>, while specifying the Override value and the IP
address of the PPP server. The address must be a well-formed IPv4 address. For example:
<AnyConnectPreferences>
<ControllablePreferences>
<PPPExclusion>Override
<PPPExclusionServerIP>192.168.22.44</PPPExclusionServerIP></PPPExclusion>
</ControllablePreferences>
</AnyConnectPreferences>
Step 3
Step 4
21
Note
AnyConnect SBL connections through a proxy server are dependent on the Windows
operating system version and system (machine) configuration or other third-party proxy
software capabilities; therefore, refer to system wide proxy settings as provided by
Microsoft or whatever third-party proxy application you use.
Windows
Mac OS X
Linux
Local Proxy
Yes
No
No
Private Proxy
No
Public Proxy
Yes (Override)
22
DETAILED STEPS
Step 1
Step 2
Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
Select (default) or unselect Allow Local Proxy Connections.
Note
SUMMARY STEPS
1. Open Internet Options from Internet Explorer or the Control Panel.
2. Select the Connections Tab, and click the LAN Settings button.
3. Configure the LAN to use a proxy server, and enter the IP address of the proxy server.
23
DETAILED STEPS
Step 1
Step 2
Step 3
Step 1
Step 2
Go to system preferences and choose the appropriate interface on which you are connected.
Click Advanced.
Step 3
Step 4
Step 5
Step 1
Step 2
Export the https_proxy from the terminal. The expected format is servername.domain:port, such as export
https_proxy=proxy.cisco.com:80.
Run AnyConnect from the same terminal window.
Step 1
Step 2
Step 3
24
Open .profile from your home folder. If this file is not present on your system, create it.
Add the following lines at the bottom of this file: export https_proxy=proxy.address:port.
Log off and log back in.
DETAILED STEPS
Step 1
Step 2
Step 3
Configure the private proxy information in the ASA group policy. See Configuring a Browser Proxy for an Internal
Group Policy in the Cisco ASA Series VPN ASDM Configuration Guide.
Note
In a Mac environment, the proxy information that is pushed down from the ASA (upon a VPN connection) is
not viewed in the browser until you open up a terminal and issue a scutil --proxy.
(Optional) Configure the Client to Ignore Browser Proxy Settings.
(Optional) Lock Down the Internet Explorer Connections Tab.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
2. In the Proxy Settings drop-down list, choose IgnoreProxy. Ignore Proxy causes the client to ignore all
proxy settings. No action is taken against proxies that are downloaded from the ASA.
DETAILED STEPS
Step 1
Step 2
Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
In the Proxy Settings drop-down list, choose IgnoreProxy. Ignore Proxy causes the client to ignore all proxy settings.
No action is taken against proxies that are downloaded from the ASA.
25
SUMMARY STEPS
1.
2.
3.
4.
5.
In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Select a group policy and click Edit or Add a new group policy.
In the navigation pane, go to Advanced > Browser Proxy. The Proxy Server Policy pane displays.
Click Proxy Lockdown to display more proxy settings.
Uncheck Inherit and select Yes to enable proxy lockdown and hide the Internet Explorer Connections
tab for the duration of the AnyConnect session or; select No to disable proxy lockdown and expose the
Internet Explorer Connections tab for the duration of the AnyConnect session.
6. Click OK to save the Proxy Server Policy changes.
7. Click Apply to save the Group Policy changes.
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
26
In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Select a group policy and click Edit or Add a new group policy.
In the navigation pane, go to Advanced > Browser Proxy. The Proxy Server Policy pane displays.
Click Proxy Lockdown to display more proxy settings.
Uncheck Inherit and select Yes to enable proxy lockdown and hide the Internet Explorer Connections tab for the duration
of the AnyConnect session or; select No to disable proxy lockdown and expose the Internet Explorer Connections tab
for the duration of the AnyConnect session.
Click OK to save the Proxy Server Policy changes.
Click Apply to save the Group Policy changes.
27
SUMMARY STEPS
1.
2.
3.
4.
In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Select a group policy and click Edit or Add a new group policy.
Select Advanced > AnyConnect.
Next to Client Bypass Protocol, uncheck Inherit if this is a group policy other than the default group
policy.
5. Choose one of these options:
6. Click OK.
7. Click Apply.
28
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Select a group policy and click Edit or Add a new group policy.
Select Advanced > AnyConnect.
Next to Client Bypass Protocol, uncheck Inherit if this is a group policy other than the default group policy.
Choose one of these options:
Click Disable to drop IP traffic for which the ASA did not assign an address.
Click Enable to send that IP traffic in the clear.
Step 6
Step 7
Click OK.
Click Apply.
Split DNS
When split DNS is configured in the Network (Client) Access group policy, AnyConnect tunnels specific
DNS queries to the private DNS server (also configured in the group policy). All other DNS queries go to the
DNS resolver on the client operating system, in the clear, for DNS resolution. If split DNS is not configured,
AnyConnect tunnels all DNS queries.
29
SUMMARY STEPS
1. Configure at least one DNS server.
2. Configure split-include tunneling:
3. Configure split DNS:
DETAILED STEPS
Step 1
Step 2
Step 3
What to Do Next
After making changes to the group policy in ASDM, be sure the group policy is associated with a Connection
Profile in Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Connection
Profiles > Add/Edit > Group Policy.
30
SUMMARY STEPS
1. Run ipconfig/all and record the domains listed next to DNS Suffix Search List.
2. Establish a VPN connection and again check the domains listed next to DNS Suffix Search List.
DETAILED STEPS
Step 1
Step 2
Run ipconfig/all and record the domains listed next to DNS Suffix Search List.
Establish a VPN connection and again check the domains listed next to DNS Suffix Search List.
Those extra domains added after establishing the tunnel are the domains used for split DNS.
Note
This process assumes that the domains pushed from the ASA do not overlap with the ones already configured
on the client host.
31
32
33
Note
The dialogs for Linux may look different from the ones shown in this document.
34
If the user checks Always trust this VPN server and import the certificate, then future connections to this
secure gateway will not prompt the user to continue.
Note
If the user checks Block connections to untrusted servers in AnyConnect Advanced > VPN >
Preferences, or if the users configuration meets one of the conditions in the list of the modes described
under the guidelines and limitations section, then AnyConnect rejects invalid server certificates.
35
Note
The certificate used to authenticate the client to the secure gateway must be valid and trusted (signed by
a CA). A self-signed client certificate will not be accepted.
SUMMARY STEPS
1. Go to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Connection
Profiles. Select a connection profile and click Edit. The Edit AnyConnect Connection Profile window
opens.
2. If it is not already, click the Basic node of the navigation tree on the left pane of the window. In the right
pane of the window, in the Authentication area, enable the method Certificate.
3. Click OK and apply your changes.
DETAILED STEPS
Step 1
Step 2
Step 3
Go to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Connection Profiles.
Select a connection profile and click Edit. The Edit AnyConnect Connection Profile window opens.
If it is not already, click the Basic node of the navigation tree on the left pane of the window. In the right pane of the
window, in the Authentication area, enable the method Certificate.
Click OK and apply your changes.
36
37
Note
If access to the CA relies on the VPN tunnel being established, manual enrollment cannot be done at this
time because there is currently no VPN tunnel established (AAA credentials have not been entered).
5 The user enters AAA credentials and establishes a VPN connection.
6 The client knows it needs to initiate SCEP enrollment (see Step 2). It initiates an enrollment request to the
CA through the established VPN tunnel, and a response is received from the CA.
7 If SCEP enrollment is successful, the client presents a (configurable) message to the user and disconnects
the current session. The user can now connect using certificate authentication to an ASA tunnel group.
If SCEP enrollment fails, the client displays a (configurable) message to the user and disconnects the
current session. The user should contact his/her administrator.
Other Legacy SCEP operational considerations:
If the client is configured for manual enrollment and the Certificate Expiration Threshold value is
met, a Get Certificate button displays on a presented tunnel group selection dialog box. Users can
manually renew their certificate by clicking this button.
If the certificate expires and the client no longer has a valid certificate, the client repeats the Legacy
SCEP enrollment process.
38
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Certificate Enrollment from the navigation pane.
Select Certificate Enrollment.
Configure the Certificate Contents to be requested in the enrollment certificate. For definitions of the certificate fields,
see AnyConnect Profile Editor, Certificate Enrollment .
Note
If you use %machineid%, then Hostscan/Posture must be loaded for the desktop
client.
For mobile clients, at least one certificate field must be specified.
Step 1
Create a group policy, for example, cert_group. Set the following fields:
On General, enter the URL to the CA in SCEP Forwarding URL.
39
On the Advanced > AnyConnect Client pane, uncheck Inherit for Client Profiles to Download and specify the
client profile configured for SCEP Proxy. For example, specify the ac_vpn_scep_proxy client profile.
Step 2
Create a connection profile for certificate enrollment and certificate authorized connection, for example, cert_tunnel.
Authentication: Both (AAA and Certificate).
Default Group Policy: cert_group.
On Advanced > General, check Enable SCEP Enrollment for this Connction Profile.
On Advanced > GroupAlias/Group URL, create a Group URL containing the group (cert_group) for this connection
profile.
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Certificate Enrollment from the navigation pane.
Select Certificate Enrollment.
Specify an Automatic SCEP Host to direct the client to retrieve the certificate.
Enter the FQDN or IP address, and the alias of the connection profile (tunnel group) that is configured for SCEP certificate
retrieval. For example, if asa.cisco.com is the host name of the ASA and scep_eng is the alias of the connection profile,
enter asa.cisco.com/scep-eng.
When the user initiates the connection, the address chosen or specified must match this value exactly for Legacy SCEP
enrollment to succeed. For example, if this field is set to an FQDN, but the user specifies an IP address, SCEP enrollment
will fail.
Step 4
Step 5
Configure which Certificate Contents to request in the enrollment certificate. For definitions of the certificate fields,
see AnyConnect Profile Editor, Certificate Enrollment.
Note
If you use %machineid%, load HostScan/Posture on the
client.
40
Step 6
Step 7
(Optional) Check Display Get Certificate Button to permit users to manually request provisioning or renewal of
authentication certificates. The button is visible to users if the certificate authentication fails.
(Optional) Enable SCEP for a specific host in the server list. Doing this overrides the SCEP settings in the Certificate
Enrollment pane described above.
a) Choose Server List from the navigation pane.
b) Add or Edit a server list entry.
c) Specify the Automatic SCEP Host and Certificate Authority attributes as described in Steps 5 and 6 above.
Step 1
Create a group policy for enrollment, for example, cert_enroll_group. Set the following fields:
On the Advanced > AnyConnect Client pane, uncheck Inherit for Client Profiles to Download and specify the client
profile configured for Legacy SCEP. For example, specify the ac_vpn_legacy_scep client profile.
Step 2
Step 3
Step 4
Create a connection profile for authorization, for example, cert_auth_tunnel. Set the following fields.
On the Basic pane, set the Authentication Method to Certificate.
On the Basic pane, set the Default Group Policy to cert_auth_group.
Do not enable this connection profile on the ASA. It is not necessary to expose the group to users in order for them
to access it.
Step 5
(Optional) On the General pane of each group policy, set Connection Profile (Tunnel Group) Lock to the corresponding
SCEP connection profile, which restricts traffic to the SCEP-configured connection profile.
41
Step 1
On the Certificate Authority server, launch the Registry Editor. You can do this by selecting Start > Run, typing
regedit, and clicking OK.
Step 2
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MSCEP\EnforcePassword.
If the EnforcePassword key does not exist, create it as a new Key.
Step 3
Step 4
Edit EnforcePassword, and set it to '0'. If it does not exist, create it as a REG-DWORD.
Exit regedit, and reboot the certificate authority server.
Step 1
Step 2
Step 3
Step 4
Step 5
Launch the Server Manager. You can do this by selecting Start > Admin Tools > Server Manager.
Expand Roles > Certificate Services (or AD Certificate Services).
Navigate to CA Name > Certificate Templates.
Right-click Certificate Templates > Manage.
From the Cert Templates Console, right-click User template and choose Duplicate
Step 6
Step 7
Step 8
Step 9
Step 10
Step 11
Choose Windows Server 2008 version for new template, and click OK.
Change the template display name to something descriptive, such as NDES-IPSec-SSL.
Adjust the Validity Period for your site. Most sites choose three or more years to avoid expired certificates.
On the Cryptography tab, set the minimum key size for your deployment.
On the Subject Name tab, select Supply in Request.
On the Extensions tab, set the Application Policies to include at least:
Client Authentication
IP security end system
IP security IKE intermediate
IP security tunnel termination
42
IP security user
These values are valid for SSL or IPsec.
Step 12
Step 13
Step 14
Step 15
Step 16
Step 17
Note
SUMMARY STEPS
1.
2.
3.
4.
Open the VPN Profile Editor and choose Certificate Enrollment from the navigation pane.
Select Certificate Enrollment.
Specify a Certificate Expiration Threshold.
Click OK.
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Certificate Enrollment from the navigation pane.
Select Certificate Enrollment.
Specify a Certificate Expiration Threshold.
This is the number of days before the certificate expiration date, that AnyConnect warns users that their certificate is
going to expire.
43
Click OK.
SUMMARY STEPS
1.
2.
3.
4.
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
For Mac and Linux environments: Create a PEM Certificate Store for Mac and Linux, on page 46
For Mac and Linux environments: Select which certificate stores to exclude in the VPN Local Policy profile.
Configure Certificate Matching, on page 47
Configure keys that AnyConnect tries to match, when searching for a certificate in the store. You can specify keys,
extended keys, and add custom extended keys. You can also specify a pattern for the value of an operator in a distinguished
name for AnyConnect to match.
44
Note
Access-control for the machine store can vary depending on the Windows version and security settings.
Because of this, the user may be unable to use certificates in the machine store even though they have
administrative privileges. In this case, select Certificate Store Override to allow machine store access.
The following table describes how AnyConnect searches for certificates on a Windows client based on what
Certificate Store is searched, and whether Certificate Store Override is checked.
Certificate Store
Setting
All
cleared
All
checked
Machine
checked
Machine
cleared
User
SUMMARY STEPS
1. Set Certificate Store.
2. Select Certificate Store Override if you want to allow AnyConnect to search the machine certificate
store when users do not have administrative privileges.
45
DETAILED STEPS
Step 1
Step 2
Select Certificate Store Override if you want to allow AnyConnect to search the machine certificate store when users
do not have administrative privileges.
SUMMARY STEPS
1. Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
2. To enable certificate selection, uncheck Disable Certificate Selection.
3. Uncheck User Controllable, unless you want users to be able to turn automatic certificate selection on
and off in the Advanced > VPN > Preferences pane.
DETAILED STEPS
Step 1
Step 2
Step 3
Open the VPN Profile Editor and choose Preferences (Part 2) from the navigation pane.
To enable certificate selection, uncheck Disable Certificate Selection.
Uncheck User Controllable, unless you want users to be able to turn automatic certificate selection on and off in the
Advanced > VPN > Preferences pane.
46
Tip
Instead of keeping copies of the PEM files, you can use soft links to PEM files.
To create the PEM file certificate store, create the paths and folders listed below. Place the appropriate
certificates in these folders:
PEM File Certificate Store Folders
~/.cisco/certificates/ca(1) ~
Note
This is the home
directory.
~/.cisco/certificates/client
Client certificates
~/.cisco/certificates/client/private
Private keys
Machine certificates are the same as PEM file certificates, except for the root directory. For machine certificates,
substitute /opt/.cisco for ~/.cisco. Otherwise, the paths, folders, and types of certificates listed apply.
47
OID
ServerAuth
1.3.6.1.5.5.7.3.1
ClientAuth
1.3.6.1.5.5.7.3.2
CodeSign
1.3.6.1.5.5.7.3.3
EmailProtect
1.3.6.1.5.5.7.3.4
IPSecEndSystem
1.3.6.1.5.5.7.3.5
IPSecTunnel
1.3.6.1.5.5.7.3.6
IPSecUser
1.3.6.1.5.5.7.3.7
TimeStamp
1.3.6.1.5.5.7.3.8
OCSPSign
1.3.6.1.5.5.7.3.9
DVCS
1.3.6.1.5.5.7.3.10
IKE Intermediate
1.3.6.1.5.5.8.2.2
48
Description
CN
SubjectCommonName
SN
SubjectSurName
GN
SubjectGivenName
SubjectUnstructName
SubjectInitials
GENQ
SubjectGenQualifier
DNQ
SubjectDnQualifier
SubjectCountry
SubjectCity
SP
SubjectState
ST
SubjectState
SubjectCompany
OU
SubjectDept
SubjectTitle
EA
SubjectEmailAddr
DC
DomainComponent
ISSUER-CN
IssuerCommonName
ISSUER-SN
IssuerSurName
ISSUER-GN
IssuerGivenName
ISSUER-N
IssuerUnstructName
ISSUER-I
IssuerInitials
49
Description
ISSUER-GENQ
IssuerGenQualifier
ISSUER-DNQ
IssuerDnQualifier
ISSUER-C
IssuerCountry
ISSUER-L
IssuerCity
ISSUER-SP
IssuerState
ISSUER-ST
IssuerState
ISSUER-O
IssuerCompany
ISSUER-OU
IssuerDept
ISSUER-T
IssuerTitle
ISSUER-EA
IssuerEmailAddr
ISSUER-DC
IssuerDomainComponent
Distinguished Name can contain zero or more matching criteria. A certificate must match all specified criteria
to be considered a matching certificate. Distinguished Name matching specifies that a certificate must or
must not have the specified string, and whether wild carding for the string is allowed.
50
Note
The SDI Token Type only has meaning for the automatic setting. You can ignore logs
of the SKI Token Type when the authentication mode is not automatic. HardwareToken
as the default avoids triggering next token mode.
SoftwareTokenThe client always interprets the user input as a software token PIN, and the input field
label is PIN:.
HardwareTokenThe client always interprets the user input as a token passcode, and the input field
label is Passcode:.
51
Note
AnyConnect does not support token selection from multiple tokens imported into the RSA Software Token
client software. Instead, the client uses the default selected via the RSA SecurID Software Token GUI.
52
53
SUMMARY STEPS
1. Go to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Connection
Profiles.
2. Select the connection profile you want to configure to interpret SDI-specific RADIUS reply messages and
click Edit.
3. In the Edit AnyConnect Connection Profile window, expand the Advanced node in the navigation pane
on the left and select Group Alias / Group URL.
4. Check Enable the display of SecurID messages on the login screen.
5. Click OK.
6. Choose Configuration > Remote Access VPN > AAA/Local Users > AAA Server Groups.
7. Click Add to Add a AAA Server group.
8. Configure the AAA server group in the Edit AAA Server Group dialog and click OK.
9. In the AAA Server Groups area, select the AAA server group you just created and then click Add in the
Servers in the Selected Group area.
10. In the SDI Messages area, expand the Message Table area. Double-click a message text field to edit the
message. Configure the RADIUS reply message text on the ASA to match (in whole or in part) the message
text sent by the RADIUS server.
11. Click OK, then Apply, then Save.
54
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
Go to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Connection Profiles.
Select the connection profile you want to configure to interpret SDI-specific RADIUS reply messages and click Edit.
In the Edit AnyConnect Connection Profile window, expand the Advanced node in the navigation pane on the left and
select Group Alias / Group URL.
Check Enable the display of SecurID messages on the login screen.
Click OK.
Choose Configuration > Remote Access VPN > AAA/Local Users > AAA Server Groups.
Click Add to Add a AAA Server group.
Configure the AAA server group in the Edit AAA Server Group dialog and click OK.
In the AAA Server Groups area, select the AAA server group you just created and then click Add in the Servers in
the Selected Group area.
In the SDI Messages area, expand the Message Table area. Double-click a message text field to edit the message.
Configure the RADIUS reply message text on the ASA to match (in whole or in part) the message text sent by the
RADIUS server.
The following table shows the message code, the default RADIUS reply message text, and the function of each message:
Note
The default message text used by the ASA is the default message text used by Cisco Secure Access Control
Server (ACS). If you are using Cisco Secure ACS, and it is using the default message text, you do not need to
configure the message text on the ASA.
Because the security appliance searches for strings in the order in which they appear in the table, you must
ensure that the string you use for the message text is not a subset of another string. For example, new PIN is
a subset of the default message text for both new-pin-sup and next-ccode-and-reauth. If you configure new-pin-sup
as new PIN, when the security appliance receives new PIN with the next card code from the RADIUS server,
it will match the text to the new-pin-sup code instead of the next-ccode-and-reauth code.
Message Code
Function
next-code
Indicates the user must enter the NEXT tokencode without the
PIN.
new-pin-sup
Indicates the new system PIN has been supplied and displays that
PIN for the user.
new-pin-meth
Requests from the user which new PIN method to use to create a
new PIN.
new-pin-req
Indicates a user-generated PIN and requests that the user enter the
PIN.
new-pin-reenter
Reenter PIN:
new-pin-sys-ok
55
Message Code
ready-for-sys- pin
Step 11
56
ACCEPT A SYSTEM
GENERATED PIN
Function
Follows a PIN operation and indicates the user must wait for the
next tokencode and to enter both the new PIN and next tokencode
to authenticate.
Used internally by the ASA to indicate the user is ready for the
system-generated PIN.