Cisco anyconnect secure mobility client инструкция

На чтение 13 мин Просмотров 29.1к.

Максим aka WisH

Максим aka WisH

Высшее образование по специальности «Информационные системы». Опыт работы системным администратором — 5 лет.

Задать вопрос

Cisco AnyConnect – это VPN клиент от известной компании Cisco, которая занимается поставками сетевого оборудования. Их устройства дороги и сложны в настройке, но достаточно надежны и приспосабливаются под любую сеть. Настройкой оборудования занимаются или сторонние специалисты, или свои сотрудники, имеющие нужные сертификаты.

Обычный работник имеет возможность столкнуться с настройкой и использование программ от этой фирмы только в случае небольших бесплатных программ, которые они предоставляют. Cisco AnyConnect – это одна из таких программ, которые могут быть установлены на компьютере обычного работника.

Содержание

  1. Зачем использовать Cisco AnyConnect
  2. Установка и настройка Cisco AnyConnect Client на ПК
  3. Где скачать Cisco AnyConnect Secure?
  4. На Windows 10
  5. На MacOS
  6. На Linux Ubuntu
  7. Запуск и первые шаги Cisco AnyConnect Mobility для смартфонов
  8. На Android
  9. На iOS
  10. Возможные проблемы
  11. Нет соединения
  12. Ошибка инициализации
  13. Как удалить клиент
  14. Аналоги Cisco VPN Client

Зачем использовать Cisco AnyConnect

Стоит сразу сказать, несмотря на то, что Cisco AnyConnect является бесплатным приложением для использования VPN, он не предоставляет доступа ни к каким платным или бесплатным серверам. Cisco Anyconnect используется для подключения к существующим виртуальным частным сетям или VPN.

Программа является клиентом, так что в ней осуществляется только настройка подключения к самой сети. Все настройки VPN задаются на сервере или на том оборудовании Cisco, что служит шлюзом между интернетом и корпоративной сетью.

Разберем несколько особенностей, которые позволяют предоставлять удаленный доступ через это приложение:

  • Возможность получения настроек со шлюза или сервера. Если человек работает через свое оборудование и нет возможности отдать его на установку и настройку техническим специалистам, то AnyConnect может получить настройки с сервера при первом подключении.
  • Безопасность конечного устройства. Присутствует возможность настройки проверки компьютера или телефона, на котором установлено. Если устройство не соответствует заданным параметрам безопасности, то подключение не произойдет.
  • «Тихая» работа. Можно сделать так, чтобы приложение не отображалось в активных, а значка в трее не было.
  • Настройка приложения таким образом, чтобы при работе внутри корпоративной сети, не работал интернет. Это повышает безопасность корпоративной сети от взлома или занесения вредоносных программ.

К сожалению, все это задается в конфиге оборудования Cisco или на серверах компании. В самом клиенте настраивается подключение, производится ввод логина и пароля, а также задаются некоторые параметры установки соединения.

Всем остальным занимается администратор сети внутри компании. Так что вам столкнуться с этим не придется, ведь для работы с цисками требуется довольно долгое обучение и наличие некоторых сертификатов его подтверждающих.

Установка и настройка Cisco AnyConnect Client на ПК

Про места для скачивания поговорим чуть ниже, так что стоит остановиться на самой установке и настройке. Опять же, для каждой системы конкретные действия будут разными, но общий алгоритм такой: распаковать скачанный архив, запустить оттуда установочный файл. Дождаться окончания установки и запустить саму программу.

В некоторых случаях потребуется добавить программу в исключения своего антивируса и брандмауэра, но сначала попробуйте запустить её без этого. Теперь можно переходить к настройке.

как выглядит циско эни коннект

Внешний вид приложения.

Где скачать Cisco AnyConnect Secure?

Скачать программу можно всего с нескольких ресурсов. Основным является официальный сайт производителя.

Текущая версия находится по адресу: https://software.cisco.com/download/home/286281283/type/282364313/release/4.10.05095 , если соединится не получается, что удалите все до последнего слэша, должно перекинуть на последнюю версию. Здесь представлен полный список программ для Линукса, MacOS и Windows. Скачивайте и устанавливайте, для винды рекомендуется брать AnyConnect Pre-Deployment Package.

Проблема в том, что как только вы нажмете на скачивание, выскочит окно с предупреждением. Посторонние люди не могут загружать программы, так что войдите в свой аккаунт, в котором активен сервисный договор с компанией. Если такого нет, то обратитесь к своему дилеру, чтобы он предоставил вам копию программы.

У Microsoft есть свой официальный магазин, работающий с последними операционными системами. Зайдите туда и найдите нужное приложение, можете перейти по ссылке https://apps.microsoft.com/store/detail/anyconnect/9WZDNCRDJ8LH?hl=ru-ru&gl=RU. Нажмите на «Установить» и дождитесь окончания процесса. Это работает только для десятки, для Windows 7 и других ранних версий потребуется воспользоваться первым способом.

На Windows 10

окно программы на виндовс 10

Внешний вид на Windows 10.

После загрузки из официального магазина, программа станет доступна в списке установленных. Найдите её по ярлыку или через меню пуск и запустите. Нажмите на «Manage VPN», вас перебросит в стандартное окно с ВПН на десятке.

Здесь нужно установить, когда можно использовать ВПН, использовать ли его при роуминге и т.д. После выбора этих опций нажмите на «Add a VPN Connection», на русском будет «Добавить ВПН-соединение».

настройка vpn windows 10

Окно с настройками ВПН.

В открывшемся окне производятся все настройки. Главное, в верхней строке выберите создание соединения через AnyConnect. Дальше введите имя соединения, адрес сервера, а также логин и пароль, если они требуются для входа. Сохраните настройки. Теперь, для запуска соединения, вам нужно снова открыть окно с настройками ВПН и кликнуть там по нужному соединению.

данные для впн в настройках соединения

Ввод данных для подключения.

В некоторых случаях может потребоваться настройка самой программы. Тогда из пуска снова запустите её и перейдите в раздел «Settings», здесь найдите настройку «Block Untrusted Servers», часто её требуется отключить для установки соединения. В разделе Diagnostic есть параметр Сertificate, здесь будут храниться сертификаты серверов, сюда же может потребоваться установить выданный вам сертификат, если подключение происходит по нему.

настройки клиента

Вид настроек.

На MacOS

Загрузите программу из указанного источника, а потом дважды кликните на файл для начала установки. В первом окне нажмите «Continue», это просто приветствие, во втором окне выберите место, в которое хотите установить программу. Дальше все понятно, просто введите пароль и дождитесь окончания установки.

процесс установки на мак

Установка на Мас.

Теперь перейдите в раздел с приложениями и найдите там Cisco > Cisco AnyConnect Secure Mobility Client.app. Запустите его, в первом окне укажите точный адрес, выданный вам для подключения к VPN и нажмите на Connect. Появится еще одно окно, в верхней строке выберите группу, а ниже введите логин и пароль.

ввод данных в cisco anyconnect на mac

Окно подключения.

Теперь вы подключены. Для отключения снова нажмите на приложение, откроется окно с адресом сервера. Нажмите здесь на Disconnect, это позволит отключить соединение.

отключение соединения с клиентом

Отключение.

На Linux Ubuntu

Алгоритм будет одинаковым на всех линуксах, в том числе и на Debian, и Fedora. Скачайте архив из указанных источников. Распакуйте его и перейдите в новый каталог. Откройте и запустите установочный файл. В некоторых случаях все это можно проделать и через графический интерфейс, но можно работать и через консоль.

Запустите программу. На картинке вы видите интерфейс подключения, он выскочит после первого запуска программы. Введите адрес, а через двоеточие порт, если он нужен. Вводите его с точностью до каждого знака такой же, как вам выдали на работе. Потом нажмите на «Connect».

подключение к клиенту в линуксе

Вид окна подключения.

Откроется окно с предупреждениями. Нажмите здесь на «Change Settings», если вы нажмете по второй кнопке, то точно никуда не подключитесь.

окно с предупреждением

Предупреждение об опасности.

Откроется окно с настройками. Вам нужно снять галочку с последнего пункта «Block connections to untrusted servers». Остальные галки расставьте так, как рекомендовали вам в инструкции на работе.

настройки cisco впн в linux

Окно с настройками.

В следующем окне кликните по кнопке «Connect Anyway», а потом введите логин и пароль. Теперь можно пользоваться программой.

Запуск и первые шаги Cisco AnyConnect Mobility для смартфонов

Сильных отличий в работе приложений друг от друга нет. Меню выглядят похоже и алгоритм действий почти не меняется. Вот и получается, что если один раз настроить полностью работу впн, то и в другой раз проблем не будет. Особенно это характерно для телефонов. Здесь расскажем способы настройки приложений на разных аппаратах.

На Android

На андроиде загрузите приложение из официального магазина. После загрузке запустите его и попадете в первое меню. Здесь кликните по «Подключения», в новом окне на «Добавить новое подключение».

открытое android приложение

Приложение на андроиде.

Появится стандартное окно для ввода данных. Введите туда информацию, которая предоставили вам для подключения. Теперь нажмите на три точки вверху и выберите «Settings» и снимите галку с «Блокировать недоверенные серверы».

параметры андроид приложения

Настройки.

Нажмите на три точки сверху и перейдите на вкладку «Diagnostics», откройте «Управление сертификатом». Снова нажав на три точки вверху выберите «Импортировать», здесь укажите путь до сертификата. Это потребуется, если подключение осуществляется по нему.

На iOS

На iPhone алгоритм ничем не отличается от Андроида. Скачайте и установите приложение из официального магазина. Откройте его. Щелкните по строке Connections, потом кликните по Add VPN Connection. В появившемся окне введите логин и пароль, а также остальные данные для подключения.

открытое приложение на айфоне

Окно приложения на iPhone.

Для включения и отключения используйте рычажок, находящийся в верхней строке. Настройки находятся в разделе «Settings», а управление сертификатами в «Diagnostics».

Возможные проблемы

Сама программа проста, потому что представляет собой клиентскую часть программного решения. То есть, все основные действия и настройки происходят где-то далеко, на серверах и оборудовании Cisco, а Cisco AnyConnect представляет собой небольшую программу для подключения ко всей этой конструкции. Тем не менее разработчики сюда заложили и проверку клиентских устройств и ограничение на работу в интернете, так что проблемы возникают с завидным постоянством.

Нет соединения

Если не устанавливается соединение, то причин несколько:

  • Включилось ограничение на связь, вшитое в установку программы, так что во время работы не получится соединиться с интернетом.
  • Неправильно введены данные сервера, так что приложение не может к нему подключится.
  • Несовпадение версий. Эту проблему отметила компания Майрософт, что при включении ВПН от циско, на некотором оборудовании перестает подключаться беспроводной интернет. Тут только ждать обновлений от обеих компаний.

Проблема глобальная, так что стоит сначала уточнить у тех, кто делал настройки на сервере, какие параметры выставлены. Тогда вы не будете удивляться ограничениям.

При отпадании интернета вообще при включении программы, рекомендуется почистить кэш интернет-соединения.

Ошибка инициализации

При запуске программы выскакивает ошибка «failed to initialize connection subsystem». Ошибка возникала на старых версиях программы, но нет гарантий, что она решена.

Есть два способа решения проблемы:

  • Найдите исполняемый файл программы. Щелкните по ярлыку правой кнопкой мыши, а потом нажмите на «Расположение файла». Обычно это C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client.
    По найденному файлу кликните правой кнопкой мыши и выберите «Исправление неполадок». Дождитесь окончания работы.
    Нажмите на компьютер правой кнопкой, перейдите в управление, потом в службы, найдите Cisco AnyConnect Secure Mobility Agent остановите его и потом снова запустите.
    Перезапуск службы
  • Нажмите Win+R и введите в открывшемся окне regedit. Пройдите по пути HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings и создайте переменную DWORD с именем GlobalUserOffline и значением 0. Перезагрузите компьютер.

Проблема возникает из-за установки некоторых обновлений, так что можете удалить последние обновления и проблема решится. Или установите обновление MS15-018, оно решает эту проблему.

Как удалить клиент

С удалением возникают проблемы. Иногда удаляется не полностью, из-за чего возникают сбои при повторной установке. Так что тут совет один: заходите в папку с установленной программой и запускайте деинсталлятор оттуда. Если этого не сделали, то придется работать с командной строкой.

Для мака введите в терминал следующие команды:

  1. sudo /opt/cisco/anyconnect/bin/websecurity_uninstall.sh
  2. sudo /opt/cisco/anyconnect/bin/dart_uninstall.sh
  3. sudo /opt/cisco/anyconnect/bin/nvm_uninstall.sh
  4. sudo /opt/cisco/anyconnect/bin/umbrella_uninstall.sh
  5. sudo /opt/cisco/anyconnect/bin/amp_uninstall.sh

Если вы запороли удаление на виндовс, то попробуйте воспользоваться одной из программ, что чистят реестр. Если она не поможет, то остается только откат на точку восстановления или переустановка системы. Так что лучше сразу зайдите в папку с установленным приложением и используйте деинсталлятор оттуда.

Аналоги Cisco VPN Client

Есть и бесплатные аналоги этой программы, которые не предъявляют требований к договорам и остальному. Так что можете использовать их для создания туннелей, виртуальных сетей и организации удаленного доступа.

Однако, я не рекомендую использовать бесплатные решения для чего-то серьезного. Они редко хорошо защищены, да и следят за их безопасностью не очень пристально. Лучше приобрести какое-то корпоративное решение.

Аналоги:

  • OpenConnect GUI — это графический клиент OpenConnect для систем Microsoft Windows, бесплатный и с открытым исходным кодом.
  • OpenVPN — это полнофункциональное решение SSL VPN с открытым исходным кодом. Это рабочая лошадка большинства предприятия на данный момент. Обеспечивает неплохой уровень безопасности и позволяет задавать много параметров.
  • ShrewSoft VPN Client работает через IPsec на Windows 2000, XP, Vista. Можете применять в тех местах, где не подойдут современные программы.

Cisco Anyconnect – это программа для тех организаций, что используют у себя их оборудование. Поэтому проблем с настройкой возникать не должно. Параметры сервера задает специалист, он же выдаст точную инструкцию по подключению.

Программу можно использовать и с другими видами серверов, как простой ВПН-клиент, но полные возможности раскроются только при использовании вместе с сервером от того же производителя. В других случаях стоит поискать аналогичные программы для организации безопасного удаленного доступа в свою корпоративную сеть или для подключения к какому-то оборудованию – применений для VPN много.

Deploy AnyConnect

Before You Begin
Deployment

If you are deploying the Umbrella Roaming Security module, any existing installation of the Umbrella Roaming Client will be
detected and removed automatically to prevent conflicts. If the existing installation of the Umbrella Roaming Client is associated
with an Umbrella service subscription, it will automatically be migrated to the Umbrella Roaming Security module unless an OrgInfo.json file is co-located with the AnyConnect installer, configured for web deployment or predeployed in the Umbrella
module’s directory. You may wish to manually uninstall the Umbrella Roaming Client prior to deploying the Umbrella Roaming
Security module.

You must
additionally complete the following prerequisites if using the Umbrella Roaming
Security module:

  • Obtain Umbrella Roaming Account. The Umbrella dashboard http://dashboard.umbrella.com is the login page where you obtain necessary information for the operation of the AnyConnect Umbrella Roaming Security Module.
    You also use this site to manage reporting for the roaming client activity.

  • Download the OrgInfo File from the Dashboard. To prepare for deploying the AnyConnect Umbrella Roaming Security Module, obtain the OrgInfo.json file from the Umbrella
    dashboard. Click on Roaming Computer in the Identities menu structure and then click the + sign in the upper-left corner of the page. Scroll down to AnyConnect Umbrella Roaming Security Module and click Module Profile.

    The OrgInfo.json file contains specific information about your Umbrella service subscription that lets the Roaming Security
    module know where to report and which policies to enforce.

AnyConnect
Deployment Overview

Deploying AnyConnect refers to installing, configuring, and
upgrading the AnyConnect client and its related files.

The
Cisco AnyConnect Secure
Mobility Client

can be deployed to remote users by the following methods:

  • Predeploy—New installations and upgrades are done either by the end user, or by using an enterprise software management system
    (SMS).

  • Web Deploy—The AnyConnect package is loaded on the headend, which is either an ASA or FTD firewall, or an ISE server. When
    the user connects to a firewall or to ISE, AnyConnect is deployed to the client.

    • For new installations, the user connects to a headend to download the
      AnyConnect client. The client is either installed manually or
      automatically (web-launch).

    • Updates are done by AnyConnect running on a system where
      AnyConnect is already installed, or by directing the user to the ASA clientless
      portal.

  • Cloud Update—After
    the Umbrella Roaming Security module is deployed, you can update any AnyConnect
    modules using one of the above methods, as well as Cloud Update. With Cloud
    Update, the software upgrades are obtained automatically from the Umbrella
    cloud infrastructure, and the update track is dependent upon that and not any
    action of the administrator. By default, automatic updates from Cloud Update
    are disabled.


    Note

    Consider the
    following regarding Cloud Update:

    • Only the
      software modules that are currently installed are updated.

    • Customizations, localizations, and any other deployment types
      are not supported.

    • The
      updates occur only when logged in to a desktop and will not happen if a VPN is
      established.

    • With
      updates disabled, the latest software features and updates will not be
      available.

    • Disabling Cloud Update has no effect on other update mechanisms or settings (such as web deploy, deferred updates, and so
      on).

    • Cloud
      Update ignores having newer, unreleased versions of AnyConnect (such as interim
      releases and patched versions).


When you deploy AnyConnect, you can include optional modules
that enable extra features, and client profiles that configure the VPN and
optional features.

Refer to the AnyConnect release notes for system, management, and endpoint requirements for ASA, IOS, Microsoft Windows, Linux, and macOS.


Note

Some third-party applications and operating systems may restrict the ISE posture agent and
other processes from necessary file access and privilege elevation. Make sure the
AnyConnect installation directory (C:\Program Files (x86)\Cisco for Windows or
/opt/cisco for macOS) is trusted and/or in the allowed/exclusion/trusted lists for
endpoint antivirus, antimalware, antispyware, data loss prevention, privilege
manager, or group policy objects.


Decide How to
Install AnyConnect

AnyConnect can be web deployed by ISE 2.0 (or later) and ASA headends or predeployed. To
install AnyConnect initially requires administrative privileges.

To upgrade AnyConnect or install additional modules using web deploy (from
ASA/ISE/Umbrella cloud with Downloader), you do not need administrative
privileges.

  • Web Deploying from an ASA or FTD device—User connects to the AnyConnect clientless portal on the headend device, and selects
    to download AnyConnect. The ASA downloads the AnyConnect Downloader. The AnyConnect Downloader downloads the client, installs
    the client, and starts a VPN connection.
  • Web Deploying from ISE—User
    connects to the Network Access Device (NAD), such as an ASA, wireless
    controller, or switch. The NAD authorizes the user, and redirects the user to
    the ISE portal. The AnyConnect Downloader is installed on the client to manage
    the package extraction and installation, but does not start a VPN connection.

To upgrade AnyConnect or install additional modules using predeploy (out of band
deployment, either manually or using SCCM and so on), you need administrative
privileges.

  • Using an Enterprise software management system (SMS).

  • Manually distributing an AnyConnect file archive, with instructions for the user about how
    to install. File archive formats are zip for Windows, DMG for macOS, and
    gzip for Linux.

For system requirements and licensing dependencies, refer to the AnyConnect Secure Mobility Client Features, License, and OS Guide.


Note

If you are using AnyConnect Posture (HostScan) to perform root privilege activities on a
macOS or Linux platform, we recommend that you predeploy AnyConnect Posture.


Determine The
Resources You Need to Install AnyConnect

Several types of files make up an AnyConnect deployment:

  • AnyConnect core client, which is included in the AnyConnect
    package.

  • Modules that support extra features, which are included in the
    AnyConnect package.

  • Client profiles that configure AnyConnect and the extra
    features, which you create.

  • Language files, images, scripts, and help files, if you wish to
    customize or localize your deployment.

  • AnyConnect ISE
    Posture, and the compliance module (OPSWAT).

Preparing the Endpoint for AnyConnect

Using Mobile
Broadband Cards with AnyConnect

Some 3G cards require configuration steps before using
AnyConnect. For example, the VZAccess Manager has three settings:

  • modem manually connects

  • modem auto connect except when roaming

  • LAN adapter auto connect

If you choose
LAN adapter auto connect, set the preference to NDIS mode.
NDIS is an always on connection where you can stay connected even when the
VZAccess Manager is closed. The VZAccess Manager shows an autoconnect LAN
adapter as the device connection preference when it is ready for AnyConnect
installation. When an AnyConnect interface is detected, the 3G manager drops
the interface and allows the AnyConnect connection.

When you move to a higher priority connection—wired networks are
the highest priority, followed by WiFi, and then mobile broadband—AnyConnect
makes the new connection before breaking the old one.

Add the ASA to the
List of Internet Explorer Trusted Sites on Windows

An Active Directory administrator can use a group policy to add
the ASA to the list of trusted sites in Internet Explorer. This procedure is
different from the way a local user adds trusted sites in Internet Explorer.

Procedure


Step 1

On the Windows Domain server, log in as a member of the Domain
Administrators group.

Step 2

Open the Active Directory Users and Computers MMC snap-in.

Step 3

Right-click the Domain or Organizational Unit where you want to
create the Group Policy Object and click
Properties.

Step 4

Select the
Group Policy tab and click
New.

Step 5

Type a name for the new Group Policy Object and press
Enter.

Step 6

To prevent this new policy from being applied to some users or
groups, click
Properties. Select the
Security tab. Add the user or group that you want to

prevent from having this policy, and then clear the
Read
and the
Apply Group Policy check boxes in the Allow column.
Click
OK.

Step 7

Click
Edit and choose
.

Step 8

Right-click
Security Zones and Content Ratings in the right
pane, and then click
Properties.

Step 9

Select
Import the current security zones and privacy
settings
. If prompted, click
Continue.

Step 10

Click
Modify Settings, select
Trusted Sites, and click
Sites.

Step 11

Type the URL for the Security Appliance that you want to add to
the list of trusted sites and click
Add. 
The format can contain a hostname
(https://vpn.mycompany.com) or IP address (https://192.168.1.100).
It can be an
exact match (https://vpn.mycompany.com) or a wildcard
(https://*.mycompany.com).

Step 12

Click
Close and click
OK continually until all dialog boxes close.

Step 13

Allow sufficient time for the policy to propagate throughout the
domain or forest.

Step 14

Click
OK in the Internet Options window.


Block Proxy Changes
in Internet Explorer

Under certain conditions, AnyConnect hides (locks down) the Internet Explorer Tools > Internet Options > Connections tab.
When exposed, this tab lets the user set proxy information. Hiding this tab prevents the user from intentionally or unintentionally
circumventing the tunnel. The tab lockdown setting is reversed upon disconnect. Tab lockdown is overridden by any administrator-defined
policies applied to that tab. The lockdown is applied when:

  • The ASA configuration specifies Connections tab lockdown

  • The ASA configuration specifies a private-side proxy

  • A Windows group policy previously locked down the Connections tab (overriding the no lockdown ASA group policy setting)

For Windows 10 version 1703 (or later), in addition to hiding the Connections Tab in Internet Explorer, AnyConnect hides (locks
down) the system proxy tab in the Settings app to prevent the user from intentionally or unintentionally circumventing the
tunnel. This lockdown is reversed upon disconnect.

Procedure


Step 1

In ASDM go to
.

Step 2

Select a group policy and click
Edit or
Add a new group policy.

Step 3

In the navigation pane, go to
. The Proxy Server Policy pane displays.

Step 4

Click
Proxy
Lockdown
to display more proxy settings.

Step 5

Uncheck
Inherit and select either:

  • Yes to enable proxy lockdown and hide the Internet
    Explorer Connections tab during the AnyConnect session.

  • No to disable proxy lockdown and expose the Internet
    Explorer Connections tab during the AnyConnect session.

Step 6

Click
OK to save the Proxy Server Policy changes.

Step 7

Click
Apply to save the Group Policy changes.


Configure How
AnyConnect Treats Windows RDP Sessions

You can configure AnyConnect to allow VPN connections from Windows RDP
sessions. By default, users connected to a computer by RDP are not able to start a VPN
connection with the Cisco AnyConnect Secure Mobility Client. The following table shows
the logon and logout options for a VPN connection from an RDP session. These preferences
are configured in the VPN client profile:

Windows Logon Enforcement—Available in SBL mode

  • Single Local Logon (Default)—Allows only one local user to
    be logged on during the entire VPN connection. Also, a local user can establish
    a VPN connection while one or more remote users are logged on to the client PC.
    This setting has no effect on remote user logons from the enterprise network
    over the VPN connection.


    Note

    If the VPN connection is configured for all-or-nothing
    tunneling, then the remote logon is disconnected because of the resulting
    modifications of the client PC routing table for the VPN connection. If the
    VPN connection is configured for split-tunneling, the remote logon might or
    might not be disconnected, depending on the routing configuration for the
    VPN connection.


  • Single Logon—Allows only one user to be logged on during
    the entire VPN connection. If more than one user is logged on, either locally or
    remotely, when the VPN connection is being established, the connection is not
    allowed. If a second user logs on, either locally or remotely, during the VPN
    connection, the VPN connection terminates. No additional logons are allowed
    during the VPN connection, so a remote logon over the VPN connection is not
    possible.


    Note

    Multiple simultaneous logons are not supported.


Windows VPN Establishment—Not Available in SBL Mode

  • Local Users Only (Default)—Prevents a remotely logged-on
    user from establishing a VPN connection. This is the same functionality as in
    prior versions of AnyConnect.

  • Allow Remote Users—Allows remote users to establish a VPN
    connection. However, if the configured VPN connection routing causes the remote
    user to become disconnected, the VPN connection terminates to allow the remote
    user to regain access to the client PC. Remote users must wait 90 seconds after
    VPN establishment if they want to disconnect their remote login session without
    causing the VPN connection to be terminated.

See
AnyConnect VPN Connectivity
Options for additional VPN session connectivity options.

Configure How AnyConnect Treats Linux SSH Sessions

You can configure AnyConect to allow VPN connections from Linux SSH sessions. By default, users connected to a computer by
SSH are not able to start a VPN connection with the Cisco AnyConnect Secure Mobility Client. The following table shows the
logon and logout options for a VPN connection from an SSH session. These options are configured in the VPN client profile.

Linux Login Enforcement— Single Local Logon (Default): Allows only one local user to be logged on during the entire VPN connection. Also, a local
user can establish a VPN connection while one or more remote users are logged on to the client PC. This setting has no effect
on remote user logons from the enterprise network over the VPN connection.


Note

If the VPN connection is configured for all-or-nothing tunneling, then the remote logon is disconnected because of the resulting
modifications of the client PC routing table for the VPN connection. If the VPN connection is configured for split-tunneling,
the remote logon might or might not be disconnected, depending on the routing configuration for the VPN connection.


Single Logon—Allows only one user to be logged on during the entire VPN connection. If more than one user is logged on (either locally
or remotely) when the VPN connection is being established, the connection is not allowed. If a second user logs on (either
locally or remotely) during the VPN connection, the VPN connection terminates. No additional logons are allowed during the
VPN connection, so a remote logon over the VPN connection is not possible.

Linux VPN Establishment

  • Local Users Only (Default)—Prevents a remotely logged-on user from establishing a VPN connection.

  • Allow Remote Users—Allows remote users to establish a VPN connection.

See AnyConnect VPN Connectivity Options for additional VPN session connectivity options.

DES-Only SSL
Encryption on Windows

By default, Windows does not support DES SSL encryption. If you
configure DES-only on the ASA, the AnyConnect connection fails. Because
configuring these operating systems for DES is difficult, we do not recommend
that you configure the ASA for DES-only SSL encryption.

Using NVM on Linux

Before using NVM on Linux, you must set up a kernel driver framework (KDF). You can choose to prebuild an AnyConnect Kernel
Module or build the driver on target. If you choose to build on target, no action is required; the build is handled automatically
during deployment or during reboot.

Prerequisites to Build the AnyConnect Kernel Module

Prepare the target device:

  • Make sure that the GNU Make Utility is installed.

  • Install the kernel header package:

    • For RHEL, install the package kernel-devel-$(uname -r), such as kernel-devel-2.6.32-642.13.1.el6.x86_64.

    • For Ubuntu, install the package linux-headers-$(uname -r), such as linux-headers-4.2.0-27-generic.

  • Make sure that the GCC compiler is installed. The major.minor version of the installed GCC compiler should match the GCC version with which the kernel was built. You can verify this in
    the /proc/version file.

Package NVM with Prebuilt AnyConnect Linux Kernel Module

Before you begin

Complete the prerequisites in Prerequisites to Build the AnyConnect Kernel Module.


Note

NVM is not supported on devices with secure boot enabled.


The AnyConnect NVM can be packaged with a pre-built
AnyConnect Linux Kernel Module so that you do not need to build it on every target
device, especially when the target devices have the same OS kernel version. If you
decide to not use the pre-built option, you can use on target, which happens
automatically during deployment or reboot without administrator input.
Alternatively, if your deployment doesn’t have the kernel prerequisites on all
endpoints, you could use the pre-built option.


Note

Web deployment is not supported with the pre-built AnyConnect Linux Kernel
Module.


Procedure


Step 1

Extract the AnyConnect predeploy package:
anyconnect-linux64-<version>-predeploy-k9.tar.gz.

Step 2

Navigate to the nvm directory.

Step 3

Invoke the script $sudo
./build_and_package_ac_ko.sh.


After running the script,
anyconnect-linux64-<version>-ac_kdf_ko-k9.tar.gz gets created,
which includes the AnyConnect Linux Kernel Module build. On Secure Boot enabled systems,
sign the module with a private key allowed by Secure Boot. This file can only be used
for predeploy.

What to do next

When the target device’s OS kernel is upgraded, you must re-deploy the AnyConnect NVM
with the updated Linux Kernel Module.

Predeploying AnyConnect

AnyConnect can be predeployed by using an SMS, manually by distributing files for end users to install, or making an AnyConnect
file archive available for users to connect to.

When you create a
file archive to install AnyConnect, the directory structure of the archive must
match the directory structure of the files installed on the client, as
described in
Locations to Predeploy the AnyConnect Profiles

Before you begin

  • If you
    manually deploy the VPN profile, you must also upload the profile to the
    headends. When the client system connects, AnyConnect verifies that the profile
    on the client matches the profile on the headend. If you have disabled profile
    updates, and the profile on the headend is different from the client, then the
    manually deployed profile will not work.

  • If you
    manually deploy the AnyConnect ISE Posture profile, you must also upload that
    file to ISE.

  • If you are using a cloned VM, refer to Guidelines for Cloning VMs With AnyConnect (Windows Only).

Procedure


Step 1

Download the AnyConnect Predeployment Package.

The AnyConnect files for predeployment are available on cisco.com.

OS

AnyConnect Predeploy Package Name

Windows

anyconnect-win-version-predeploy-k9.zip

macOS

anyconnect-macos-version-predeploy-k9.dmg

Linux (64-bit)

anyconnect-linux64-version-predeploy-k9.tar.gz

The Umbrella Roaming Security Module is not available in the Linux operating system.

Step 2

Create client profiles: some modules and features require a
client profile.

The following modules require a client profile:

  • AnyConnect VPN

  • AnyConnect Network Access Manager

  • AnyConnect
    ISE Posture

  • AnyConnect AMP Enabler

  • Network Visibility Module

  • Umbrella Roaming Security Module

The following modules do not require an AnyConnect client
profile:

  • AnyConnect VPN Start Before Logon

  • AnyConnect Diagnostic and Reporting Tool

  • AnyConnect Posture

  • AnyConnect Customer Experience Feedback

You can create client profiles in ASDM, and copy those files to your
PC. Or, you can use the stand-alone profile editor on a Windows PC.

Step 3

Optionally,
Customize and Localize the AnyConnect Client and Installer.

Step 4

Prepare the
files for distribution. The directory structure of the files is described in
Locations to Pre-Deploy the AnyConnect
Profiles .

Step 5

After you have
created all the files for AnyConnect installation, you can distribute them in
an archive file, or copy the files to the client. Make sure that the same
AnyConnect files are also on the headends you plan to connect to, ASA and ISE.


AnyConnect Module Executables for Predeploy and Web Deploy

The following table shows the filenames on the endpoint computer when
you predeploy or web deploy the Umbrella Roaming Security Module, Network Access
Manager, AMP Enabler, ISE Posture, and Network Visibility Module clients to a
Windows computer.

Table 1. Module Filenames for Web Deployment or Predeployment

Module

Web-Deploy Installer (Downloaded)

Predeploy Installer

Network Access Manager

anyconnect-win-version-nam-webdeploy-k9.msi

anyconnect-win-version-nam-predeploy-k9.msi

ISE Posture

anyconnect-win-version-iseposture-webdeploy-k9.msi

anyconnect-win-version-iseposture-predeploy-k9.msi

AMP Enabler

anyconnect-win-version-amp-webdeploy-k9.msi

anyconnect-win-version-amp-predeploy-k9.exe

Network Visibility Module

anyconnect-win-version-nvm-webdeploy-k9.exe

anyconnect-win-version-nvm-predeploy-k9.msi

Umbrella Roaming Security Module

anyconnect-win-version-umbrella-webdeploy-k9.exe

anyconnect-win-version-umbrella-predeploy-k9.msi

AnyConnect 4.3 (and later) has moved to the Visual Studio 2015
build environment and requires VS redistributable files for its Network Access
Manager Module functionality. These files are installed as part of the install
package. You can use the .msi files to upgrade the Network Access Manager
Module to 4.3 (or later), but the AnyConnect Secure Mobility Client must be
upgraded first and running release 4.3 (or later).


Note

If you have a Windows server OS, you may experience installation errors when attempting to install AnyConnect Network Access
Manager. The WLAN service is not installed by default on the server operating system, so you must install it and reboot the
PC. The WLANAutoconfig service is a requirement for the Network Access Manager to function on any Windows operating system.


Locations to Predeploy the AnyConnect Profiles

If you are copying the files to the client system, the following
tables show where you must place the files.

Table 2. AnyConnect Core Files

File

Description

anyfilename.xml

AnyConnect profile. This file specifies the features and attribute values configured for a particular user type.

AnyConnectProfile.xsd

Defines the XML schema format. AnyConnect uses this file to validate the profile.

Table 3. Profile Locations for all Operating Systems

Operating System

Module

Location

Windows

Core client with VPN

%ProgramData%\Cisco\Cisco AnyConnect Secure Mobility Client\Profile

Network Access Manager

%ProgramData%\Cisco\
Cisco AnyConnect Secure Mobility Client\Network Access Manager\newConfigFiles

Customer Experience Feedback

%ProgramData%\Cisco\
Cisco AnyConnect Secure Mobility Client\CustomerExperienceFeedback

OPSWAT

%PROGRAMFILES%\Cisco\Cisco AnyConnect Secure Mobility Client\opswat

ISE Posture

%ProgramData%\Cisco\Cisco AnyConnect Secure Mobility Client\ISE Posture

AMP Enabler

%ProgramData%\Cisco\Cisco AnyConnect Secure Mobility Client\AMP
Enabler

Network Visibility Module

%ProgramData%\Cisco\Cisco AnyConnect Secure Mobility Client\NVM

Umbrella Roaming Security Module

%ProgramData%\Cisco\Cisco AnyConnect Secure Mobility Client\Umbrella

Note 

In order to enable the Umbrella Roaming Security module, you must copy the OrgInfo.json file from the Umbrella dashboard and
place it into this target directory without any renaming. You can alternatively co-locate the OrgInfo.json file with the Umbrella
Roaming Security module installer, placing the file in \Profiles\umbrella before installation.

macOS

All other modules

/opt/cisco/anyconnect/profile

Customer Experience Feedback

/opt/cisco/anyconnect/CustomerExperienceFeedback

Binaries

/opt/cisco/anyconnect/bin

OPSWAT

/opt/cisco/anyconnect/lib/opswat

Libraries

/opt/cisco/anyconnect/lib

UI Resources

/Applications/Cisco/Cisco AnyConnect Secure Mobility Client.app/Contents/Resources/

ISE Posture

/opt/cisco/anyconnect/iseposture/

AMP Enabler

/opt/cisco/anyconnect/ampenabler/

Network Visibility Module

/opt/cisco/anyconnect/NVM/

Umbrella Roaming Security Module

/opt/cisco/anyconnect/umbrella

Note 

In order to enable the Umbrella Roaming Security module, you must copy the OrgInfo.json file from the Umbrella dashboard and
place it into this target directory without any renaming. You can alternatively co-locate the OrgInfo.json file with the Umbrella
Roaming Security module installer, placing the file in \Profiles\umbrella before installation.

Linux

NVM

/opt/cisco/anyconnect/NVM

All other modules

/opt/cisco/anyconnect/profile

Guidelines for Cloning VMs With AnyConnect (Windows Only)

AnyConnect endpoints are uniquely identified by a Universal Device Identifier (UDID), which all modules of AnyConnect use.
When a Windows VM is cloned, the UDID remains the same for all the clones from a source. To avoid any potential issues with
cloned VMs, follow this action before using AnyConnect:

  1. Navigate to C:\Program Files\Cisco\Cisco AnyConnect Secure Mobility Client and run dartcli.exe with administrator privileges as:

    dartcli.exe -nu

    or

    dartcli.exe -newudid
  2. Print the UDID prior to and after this command to ensure that the UDID has changed with this comand:

    dartcli.exe -u

    or

    dartcli.exe -udid

Predeploying AnyConnect Modules as Standalone Applications

The Network Access Manager, Web Security, and Umbrella Roaming Security modules can run as standalone applications. The AnyConnect
core client is installed, but the VPN and AnyConnect UI are not used.

Deploying
Stand-Alone Modules with an SMS on Windows

Procedure

Step 1

Disable VPN functionality by configuring your software management
system (SMS) to set the MSI property PRE_DEPLOY_DISABLE_VPN=1. For example:

msiexec /package
anyconnect-win-version-predeploy-k9.msi /norestart /passive
PRE_DEPLOY_DISABLE_VPN=1 /lvx* <log_file_name>

The MSI copies the VPNDisable_ServiceProfile.xml file embedded in
the MSI to the directory specified for profiles for VPN functionality.

Step 2

Install the module. For example, the following CLI
command installs Umbrella:

msiexec /package
anyconnect-win-version-umbrella-predeploy-k9.msi /norestart
/passive /lvx* c:\test.log

Step 3

(Optional) Install DART.

misexec /package
annyconnect-win-version-dart-predeploy-k9.msi /norestart /passive
/lvx* c:\test.log

Step 4

Save a copy of the obfuscated client profile to the proper Windows folder.

Step 5

Restart the Cisco AnyConnect service.


Deploying AnyConnect Modules as Standalone Applications

You can deploy the AnyConnect
Network Access Manager or Umbrella Roaming Security Modules as standalone applications
on a user computer. DART is supported with these applications.

Refer to Standalone NVM for details about its advantages and
method of deployment.

Requirements

The VPNDisable_ServiceProfile.xml file must also be the only
AnyConnect profile in the VPN client profile directory.

User Installation of
Stand-Alone Modules

You can break out the individual installers and distribute them
manually.

If you decide to make the zip image available to your users, and then ask to install it, be sure to instruct them to install
only the stand-alone modules.


Note

If a previous installation of Network Access Manager did not
exist on the computer, the user must reboot the computer to complete the
Network Access Manager installation. Also, if the installation is an upgrade
that required upgrading some of the system files, the user must reboot.


Procedure

Step 1

Instruct users to check the AnyConnect Network Access Manager or Umbrella
Roaming Security Module.

Step 2

Instruct users to uncheck Cisco AnyConnect VPN
Module
.

Doing so disables the VPN functionality of the core
client, and the Install Utility installs the Network Access Manager or
Umbrella Roaming Security Module as stand-alone applications with no VPN
functionality.

Step 3

(Optional) Check the Lock Down Component Services check box. The lockdown component service prevents users from switching off or stopping the Windows service.

Step 4

Instruct users to run the installers for the optional modules,
which can use the AnyConnect GUI without the VPN service. When the user clicks
the Install Selected button, the following happens:

  1. A pop-up dialog box confirms the selection of the stand-alone Network
    Access Manager or the Umbrella Roaming Security Module.

  2. When the user clicks OK, the Install Utility invokes the
    AnyConnect core installer with a setting of PRE_DEPLOY_DISABLE_VPN=1.

  3. The Install Utility removes any existing VPN profiles and then
    installs VPNDisable_ServiceProfile.xml.

  4. The Install Utility invokes the Network Access Manager or Umbrella
    Roaming Security installer.

  5. The Network Access Manager or Umbrella Roaming Security Module is
    enabled without VPN service on the computer.


Predeploying to Windows

Distributing AnyConnect Using the zip File

Predeployment zip Modifications

The zip package file contains the Install Utility, a selector menu program to launch the individual component installers,
and the MSIs for the core and optional AnyConnect modules. When you make the zip package file available to users, they run
the setup program (setup.exe). The program displays the Install Utility menu, from which users choose which AnyConnect modules
to install. You probably do not want your users to chose which modules to load. So if you decide to distribute using a zip
file, edit the zip to remove the modules you do not want to use, and edit the HTA file.

One way to distribute an ISO is by using virtual CD mount software, such as SlySoft or PowerIS.

  • Update the zip file with any profiles that you created when you bundled the files, and to remove any installers for modules
    that you do not want to distribute.

  • Edit the HTA file to personalize the installation menu, and to remove links to any module installers that you do not want
    to distribute.

Contents of the AnyConnect zip File

File

Purpose
GUI.ico AnyConnect icon image.
Setup.exe Launches the Install Utility.

anyconnect-win-version-dart-predeploy-k9.msi

MSI installer file for the DART module.

anyconnect-win-version-gina-predeploy-k9.msi

MSI installer file for the SBL module.

anyconnect-win-version-iseposture-predeploy-k9.msi

MSI installer for the ISE Posture module.

anyconnect-win-version-amp-predeploy-k9.exe

MSI installer file for the AMP Enabler.

anyconnect-win-version-nvm-predeploy-k9.msi

MSI installer file for the Network Visibility Module.

anyconnect-win-version-umbrella-predeploy-k9.msi

MSI installer file for the Umbrella Roaming Security Module.

anyconnect-win-version-nam-predeploy-k9.msi

MSI installer file for the Network Access Manager module.

anyconnect-win-version-posture-predeploy-k9.msi

MSI installer file for the posture module.

anyconnect-win-version-core-vpn-predeploy-k9.msi

MSI installer file for the AnyConnect core client.
autorun.inf Information file for setup.exe.
eula.html Acceptable Use Policy.
setup.hta Install Utility HTML Application (HTA), which you can customize for your site.

Distributing
AnyConnect Using an SMS

After extracting the installers (*.msi) for the modules you want to deploy from the zip image, you can distribute them manually.

Requirements

  • When installing AnyConnect onto Windows, you must disable either
    the AlwaysInstallElevated or the Windows User Account Control (UAC) group
    policy setting. If you do not, the AnyConnect installers may not be able to
    access some directories required for installation.

  • Microsoft Internet Explorer (MSIE) users should add the headend
    to the list of trusted sites or install Java. Adding to the list of trusted
    sites enables the ActiveX control to install with minimal interaction from the
    user.

Profile
Deployment Process

  • If you are using the MSI installer, the MSI picks any profile that has been placed in the Profiles folder and places it in
    the appropriate folder during installation. The proper folder paths are available in the predeployment MSI file available
    on CCO.
  • If you are predeploying the profile manually after the installation, copy the profile manually or use an SMS, such as Altiris,
    to deploy the profile to the appropriate folder.
  • Make sure you put the same client profile on the headend that you predeploy to the client. This profile must also be tied
    to the group policy being used on the ASA. If the client profile does not match the one on the headend or if it is not tied
    to the group policy, you can get inconsistent behavior, including denied access.

Windows Predeployment MSI Examples

Module Installed

Command and Log File

AnyConnect core client No VPN capability.

Use when installing
stand-alone Network Access Manager modules.

msiexec /package anyconnect-win-version-core-vpn-predeploy-k9.msi /norestart /passive PRE_DEPLOY_DISABLE_VPN=1 /lvx*

anyconnect-win-version-core-vpn-predeploy-k9-install-datetimestamp.log

AnyConnect core client with VPN capability.

msiexec /package anyconnect-win-version-core-vpn-predeploy-k9.msi /norestart /passive /lvx*

anyconnect-win-version-core-vpn-predeploy-k9-install-datetimestamp.log

Customer Experience Feedback

msiexec /package anyconnect-win-version-core-vpn-predeploy-k9.msi /norestart /passive DISABLE_CUSTOMER_EXPERIENCE_FEEDBACK=1 /lvx*

anyconnect-win-version-core-vpn-predeploy-k9-install-datetimestamp.log

Diagnostic and Reporting Tool (DART)

msiexec /package anyconnect-win-version-dart-predeploy-k9.msi /norestart /passive /lvx*

anyconnect-win-version-dart-predeploy-k9-install-datetimestamp.log

SBL

msiexec /package anyconnect-win-version-gina-predeploy-k9.msi /norestart /passive /lvx*

anyconnect-win-version-gina-predeploy-k9-install-datetimestamp.log

Network Access Manager

msiexec /package anyconnect-win-version-nam-predeploy-k9.msi /norestart /passive /lvx*

anyconnect-win-version-nam-predeploy-k9-install-datetimestamp.log

VPN Posture (HostScan)

msiexec /package anyconnect-win-version-posture-predeploy-k9.msi /norestart/passive /lvx*

anyconnect-win-version-posture-predeploy-k9-install-datetimestamp.log

ISE Posture

msiexec /package anyconnect-win-version-iseposture-predeploy-k9.msi /norestart/passive /lvx*

anyconnect-win-version-iseposture-predeploy-k9-install-datetimestamp.log

AMP Enabler

msiexec /package
anyconnect-win-version-amp-predeploy-k9.msi /
norestart/passive /lvx*

anyconnect-win-version-amp-predeploy-k9-install-datetimestamp.log

Network Visibility Module

msiexec /package anyconnect-win-version-nvm-predeploy-k9.msi / norestart/passive /lvx*

anyconnect-win-version-nvm-predeploy-k9-install-datetimestamp.log

Umbrella Roaming Security

msiexec /package anyconnect-win-version-umbrella-predeploy-k9.msi / norestart/passive /lvx*

anyconnect-version-umbrella-predeploy-k9-install-datetimestamp.log

AnyConnect
Sample Windows Transform

Cisco provides example Windows transforms, along with documents that describe how to use the transforms. A transform that
starts with an underscore character (_) is a general Windows transform which allows you to apply only certain transforms to
certain module installers. Transforms that start with an alphabetic character are VPN transforms. Each transform has a document
that explains how to use it. The transform download is sampleTransforms-x.x.x.zip.

Windows Predeployment Security Options

Cisco recommends that end users are given limited rights on the device that
hosts the Cisco AnyConnect Secure
Mobility Client
. If an end user warrants additional rights, installers can provide a lockdown
capability that prevents users and local administrators from switching off or stopping
those Windows services established as locked down on the endpoint. You can also prevent
users from uninstalling AnyConnect.

Windows Lockdown
Property

Each MSI installer supports a common property (LOCKDOWN) which,
when set to a non-zero value, prevents the Windows service(s) associated with
that installer from being controlled by users or local administrators on the
endpoint device. We recommend that you use the sample transform
(anyconnect-vpn-transforms-X.X.xxxxx.zip) provided at the time of install to
set this property and apply the transform to each MSI installer that you want
to have locked down. The lockdown option is also a check box within the ISO
Install Utility.

Hide AnyConnect
from Add/Remove Programs List

You can hide the installed AnyConnect modules from users that
view the Windows Add/Remove Programs list. If you launch any installer using
ARPSYSTEMCOMPONENT=1, that module will not appear in the Windows Add/Remove
Programs list.

We recommend that you use the sample transform
(anyconnect-vpn-transforms-X.X.xxxxx.zip) that we provide to set this property.
Apply the transform to each MSI installer for each module that you want to
hide.

AnyConnect Module
Installation and Removal Order on Windows

The module installers verify that they are the same version as
the core client before starting to install. If the versions do not match, the
module does not install, and the installer notifies the user of the mismatch.
If you use the Install Utility, the modules in the package are built and
packaged together, and the versions always match.

Procedure


Step 1

Install the AnyConnect modules in the following order:

  1. Install the AnyConnect core client module, which installs the
    GUI and VPN capability (both SSL and IPsec).

    In Windows and macOS, a restricted user account (ciscoacvpnuser) is created to enforce the principle of least privilege only
    when the management tunnel feature is detected as enabled. This account gets removed during AnyConnect uninstallation or during
    an installation upgrade.

  2. Install the
    AnyConnect Diagnostic and Reporting Tool (DART) module, which provides useful
    diagnostic information about the AnyConnect core client installation.

  3. Install the Umbrella Roaming Security
    Module,
    Network Visibility
    Module,

    AMP Enabler, SBL, Network Access
    Manager, Posture modules, or ISE compliance modules in any
    order.

Step 2

Uninstall the
AnyConnect modules in the following order:

  1. Uninstall Umbrella Roaming Security
    Module,
    Network Visibility
    Module,

    AMP Enabler, Network Access Manager,
    Posture, ISE Compliance module, or SBL, in any order.

  2. Uninstall
    the AnyConnect core client.

  3. Uninstall
    DART last.


DART information is
valuable should the uninstall processes fail.


Note

By design, some XML files remain after uninstalling AnyConnect.


Predeploying to macOS

Install and Uninstall AnyConnect on macOS

AnyConnect for macOS is distributed in a DMG file, which includes all the AnyConnect modules. When users open the DMG file,
and then run the AnyConnect.pkg file, an installation dialog starts, which guides the user through installation. On the Installation
Type screen, the user is able to select which packages (modules) to install.

To remove any of the AnyConnect modules from your distribution, use the
Apple pkgutil tool, and sign the package after modifying it.staller with
ACTransforms.xml. You can customize the language and appearance a You can also
modify the innd change some other install actions, which is described in the
Customization chapter: Customize Installer Behavior on macOS with ACTransforms.xml.

Installing AnyConnect Modules on macOS as a Standalone Application

You can install just the Network Visibility Module or Umbrella Roaming
Security Module without the VPN. The VPN and AnyConnect UI are not used.

The following procedure explains how to customize the modules by installing the standalone Profile Editor, creating a profile,
and adding that profile to the DMG package. It also sets the AnyConnect user interface to start automatically on boot-up,
which enables AnyConnect to provide the necessary user and group information for the module.

Procedure


Step 1

Download the
Cisco AnyConnect Secure
Mobility Client

DMG package from Cisco.com.

Step 2

Open the file to
access the installer. Note that the downloaded image is a read-only file.

Step 3

Make the
installer image writable by either running the Disk Utility or using the
Terminal application, as follows:

hdiutil
convert <source dmg> -format UDRW -o <output dmg>

Step 4

Install the stand-alone Profile Editor on a computer running a Windows operating system. You must select the AnyConnect modules
you want as part of a Custom installation or a Complete installation. They are not installed by default.

Step 5

Start the
profile editor and create a profile.

Step 6

Save the profile appropriately as
OrgInfo.json (that you get from the dashboard) in a
secure location.

  1. Copy the specified .wso file from the Windows device to the macOS
    installer package in the appropriate folder path, such as
    AnyConnect x.x.x/Profiles/NVM. Or, use the
    Terminal application, as shown below for NVM instance:

    cp <path to the wso> \Volumes\"AnyConnect
    <VERSION>"\Profiles\nvm\

  2. In the macOS installer, go to the AnyConnect
    x.x.x/Profiles
    directory and open the
    ACTransforms.xml file in TextEdit for editing.
    Set the <DisableVPN> element to
    true to ensure that VPN functionality is not
    installed:

    <ACTransforms>

    <DisableVPN>true</DisableVPN>

    </ACTransforms>

  3. The AnyConnect DMG package is now ready to distribute to your users.

Step 7

Save the profile appropriately as
NVM_ServiceProfile.xml or
OrgInfo.json (that you get from the dashboard) in a
secure location.

For these modules, the profile editor creates an additional obfuscated
version of the profile, such as NVM_ServiceProfile.wso
for NVM and saves it to the same location as you saved the file, such as
NVM_ServiceProfile.xml for NVM. Follow these steps
to complete the obfuscation:

  1. Copy the specified .wso file from the Windows device to the macOS
    installer package in the appropriate folder path, such as
    AnyConnect x.x.x/Profiles/nvm for NVM. Or, use
    the Terminal application, as shown below for NVM instance:

    cp <path to the wso> \Volumes\"AnyConnect
    <VERSION>"\Profiles\nvm\

  2. In the macOS installer, go to the AnyConnect
    x.x.x/Profiles
    directory and open the
    ACTransforms.xml file in TextEdit for editing.
    Set the <DisableVPN> element to
    true to ensure that VPN functionality is not
    installed:

    <ACTransforms>

    <DisableVPN>true</DisableVPN>

    </ACTransforms>

  3. The AnyConnect DMG package is now ready to distribute to your users.


Restrict Applications on macOS

Gatekeeper restricts which applications are allowed to run on
the system. You can choose to permit applications downloaded from:

  • Mac App Store

  • Mac App Store and identified developers

  • Anywhere

The default setting is Mac App Store and identified developers
(signed applications).

The current version of AnyConnect is signed application using an Apple certificate. If Gatekeeper is configured for Mac App
Store (only), then you must either select the Anywhere setting or control-click to bypass the selected setting to install
and run AnyConnect from a predeployed installation. For more information see: http://www.apple.com/macosx/mountain-lion/security.html.

Predeploying to Linux

Installing Modules for Linux

You can break out the individual installers for Linux and distribute them manually. Each installer in the predeploy package
can run individually. Use a compressed file utility to view and extract the files in the tar.gz file.

Procedure


Step 1

Install the AnyConnect core client module, which installs the GUI and VPN capability (both SSL and IPsec).

Step 2

Install the DART module, which provides useful diagnostic information about the AnyConnect core client installation.

Step 3

Install the posture module or ISE compliance module.

Step 4

Install the NVM.


Uninstalling Modules
for Linux

The order that the user uninstalls
AnyConnect is important.

DART information is valuable if the uninstall processes fails.

Procedure


Step 1

Uninstall the NVM.

Step 2

Uninstall the posture module or ISE compliance module.

Step 3

Uninstall the AnyConnect core
client.

Step 4

Uninstall DART.


Manually Installing/Uninstalling NVM on a Linux Device

Procedure


Step 1

Extract the AnyConnect predeploy package.

Step 2

Navigate to the nvm directory.

Step 3

Invoke the script $sudo ./nvm_install.sh.


You can uninstall NVM using /opt/cisco/anyconnect/bin/nvm_uninstall.sh.

Certificate Store for Server Certificate Verification

If you will be using server
certificates with AnyConnect, you must make a certificate store available for AnyConnect
to access and verify certificates as trusted. By default, AnyConnect uses the Firefox
certificate store.

To Activate a Firefox Certificate Store

After you have AnyConnect installed on a Linux device, and
before you attempt an AnyConnect connection for the first time, open up a Firefox
browser. When you open Firefox, a profile is created, which includes a certficate
store.

If You Do Not Use the Firefox Certificate
Store

If you opt not to use Firefox, you must configure the local
policy to exclude the Firefox certificate store, and must configure the PEM store.

Multiple Module
Requirement

If you deploy the core client plus one or more optional modules,
you must apply the lockdown property to each of the installers. Lockdown is
described in the
Windows Predeployment MSI Examples.

This action is available for the VPN installer, Network Access Manager,
Network Visibility Module, and Umbrella Roaming Security Module.


Note

If you choose to activate lockdown to the VPN installer, you
will consequently be locking down AMP Enabler as well.


Manually Installing
DART on a Linux Device

  1. Store anyconnect-dart-linux-(ver)-k9.tar.gz locally.

  2. From a terminal, extract the tar.gz file using the
    tar -zxvf <path to tar.gz file including
    the file name
    command.

  3. From a terminal, navigate to the extracted folder and run
    dart_install.sh using the
    sudo ./dart_install.sh command.

  4. Accept the license agreement and wait for the installation to
    finish.


Note

You can only uninstall DART using
/opt/cisco/anyconnect/dart/dart_uninstall.sh.


Web Deploying AnyConnect

Web deployment refers to the AnyConnect Downloader on the client system
getting AnyConnect software from a headend, or to using the portal on the headend to
install or update AnyConnect. As an alternative to our traditional web launch which
relied too heavily on browser support (and Java and ActiveX requirements), we improved
the flow of auto web deploy, which is presented at initial download and upon launch from
a clientless page. Automatic provisioning (Weblaunch) works on Windows operating systems
with Internet Explorer browsers only.

Web Deployment with the ASA

The Clientless Portal on the ASA web deploys AnyConnect. The process flow is:

Users open a browser and connect to the ASA’s
clientless portal. On the portal, the users click the Start AnyConnect Client
button. They can then download the AnyConnect package manually. If they are running
a browser that supports NPAPI (Netscape Plugin Application Programming Interface)
plugins, they can also use the tab to launch the automatic web provisioning using
weblaunch (ActiveX or Java).

ASA Web-Deployment
Restrictions

  • Loading multiple AnyConnect packages for the same O/S to the ASA is not
    supported.

  • The OPSWAT definitions are not included in the VPN posture (HostScan) module
    when web deploying. You must either manually deploy the HostScan module or
    load it on the ASA in order to deliver the OPSWAT definitions to the client.

  • If your ASA has only the default internal flash memory
    size, you could have problems storing and loading multiple AnyConnect client
    packages on the ASA. Even if you have enough space on flash to hold the
    package files, the ASA could run out of cache memory when it unzips and
    loads the client images. For more information about the ASA memory
    requirements when deploying AnyConnect, and possibly upgrading the ASA
    memory, see the latest release notes for your VPN Appliance.

  • Users can connect to the ASA using the IP address or
    DNS, but the link-local secure gateway address is not supported.

  • You must add the URL of the security appliance
    supporting web launch to the list of trusted sites in Internet Explorer.
    This can be done with a group policy, as described in Add the ASA to the List of Internet Explorer Trusted Sites
    on Windows.

  • For Windows 7 SP1 users, we recommend that you install Microsoft .NET framework 4.0 before
    installation or initial use. At startup, the Umbrella service checks if .NET
    framework 4.0 (or newer) is installed. If it is not detected, the Umbrella
    Roaming Security module is not activated, and a message is displayed. To go
    and then install the .NET Framework, you must reboot to activate the
    Umbrella Roaming Security module.

Web Deployment with ISE

Policies on ISE
determine when the AnyConnect client will be deployed. The user opens a browser
and connects to a resource controlled by ISE and is redirected to the
AnyConnect Client Portal. That ISE Portal helps the user download and install
AnyConnect. In Internet Explorer, ActiveX controls guide the installation. For
other browsers, the Portal downloads the Network Setup Assistant, and that
tools helps the user install AnyConnect.

ISE Deployment
Restrictions

  • If both ISE and ASA are web deploying AnyConnect, the configurations must match on both headends.

  • The ISE server
    can only be discovered by the AnyConnect ISE Posture agent if that agent is
    configured in the ISE Client Provisioning Policy. The ISE administrator
    configures either the NAC Agent or the AnyConnect ISE Posture module under
    Agent Configuration > Policy > Client Provisioning.

Configuring Web Deployment on the ASA

Browser
Restrictions for WebLaunch

Table 4. AnyConnect Browser
Support for Weblaunch by Operating System

Operating
System

Browser

Current Microsoft supported versions of Windows 10 x86 (32-bit) and x64 (64-bit)

Internet
Explorer 11

Windows 8.x
x86 (32-bit) and x64 (64-bit)

Internet
Explorer 11

Windows 7 SP1 x86 (32-bit) and x64 (64-bit)

Internet
Explorer 11

macOS 10.13, 10.14 (64-bit), and 10.15 (64-bit)

Safari 11


Note

Because the EDGE browser does not support ActiveX, our provisioning page hides the Automatic Provisioning options.



Note

Web launch works on all browsers that support NPAPI (Netscape Plugin Application Programming Interface) plugins.


Also, with the
addition of the AnyConnect Umbrella Roaming Security Module, Microsoft .NET 4.0
is required.

Download the
AnyConnect Package

Download the latest Cisco AnyConnect Secure
Mobility Client
package from the Cisco AnyConnect Software Download
webpage.

OS

AnyConnect
Web-Deploy Package Names

Windows

anyconnect-win-version-webdeploy-k9.pkg

macOS

anyconnect-macos-version-webdeploy-k9.pkg

Linux
(64-bit)

anyconnect-linux64-version-webdeploy-k9.pkg


Note

You should not
have different versions for the same operating system on the ASA.


Load the AnyConnect Package on the ASA

Procedure


Step 1

Navigate to . The AnyConnect Client Images panel displays the AnyConnect
images currently loaded on the ASA. The order in which the images appear is the
order the ASA downloads them to remote computers.

Step 2

To add an AnyConnect image, click Add.

  • Click Browse Flash
    to select an AnyConnect image you have already uploaded to the ASA.

  • Click Upload to
    browse to an AnyConnect image you have stored locally on your
    computer.

Step 3

Click OK or
Upload.

Step 4

Click Apply.


Enable Additional
AnyConnect Modules

To enable additional features, specify the new module names in
the group-policy or Local Users configuration. Be aware that enabling
additional modules impacts download time. When you enable features, AnyConnect
must download those modules to the VPN endpoints.


Note

If you choose
Start Before Logon, you must also enable this feature in the AnyConnect client
profile.


Procedure


Step 1

In ASDM go to
.

Step 2

Select a group policy and click
Edit or
Add a new group policy.

Step 3

In the
navigation pane, select
. At
Client Modules to Download,
click
Add and choose each module you want to add to this
group policy. The modules that are available are the ones you added or uploaded
to the ASA.

Step 4

Click
Apply and save your changes to the group policy.


Create a Client Profile in ASDM

You must add an AnyConnect web-deployment package to the ASA
before you can create a client profile on the ASA.

Procedure


Step 1

Navigate to

Step 2

Select the client profile you want to associate with a
group and click Change Group
Policy
.

Step 3

In the Change Policy for Profile policy name window,
choose a group policy from the Available Group Policies field and click the
right arrow to move it to the Policies field.

Step 4

Click OK.

Step 5

In the AnyConnect Client Profile page, click Apply.

Step 6

Click Save.

Step 7

When you have finished with the configuration, click
OK.


Configuring Web Deployment on ISE

ISE can configure and
deploy the AnyConnect core, ISE Posture module and OPSWAT (compliance module)
to support posture for ISE. ISE can also deploy all the AnyConnect modules and
resources that can be used when connecting to an ASA. When a user browses to a
resource controlled by ISE:

  • If ISE is behind
    an ASA, the user connects the ASA, downloads AnyConnect, and makes a VPN
    connection. If AnyConnect ISE Posture was not installed by the ASA, then the
    user is redirected to the AnyConnect Client Portal to install the ISE Posture.

  • If ISE is not
    behind an ASA, the user connects to the AnyConnect Client Portal, which guides
    him to install the AnyConnect resources defined in the AnyConnect configuration
    on ISE. A common configuration is to redirect the browser to AnyConnect client
    provisioning portal if the ISE Posture status is unknown.

  • When the user is
    directed to the AnyConnect Client Provisioning Portal in ISE:

    • If the browser is Internet Explorer, ISE downloads AnyConnect Downloader, and the Downloader loads AnyConnect.

    • For all other browsers, ISE opens the client provisioning redirection portal, which displays a link to download the Network
      Setup Assistant (NSA) tool. The user runs the NSA, which finds the ISE server, and downloads the AnyConnect downloader.

      When the NSA is done running in Windows, it deletes itself. When it is done running on macOS, it must be manually deleted.

The ISE documentation
describes how to:

  • Create AnyConnect
    Configuration profiles in ISE

  • Add AnyConnect Resources to ISE from a local device

  • Add AnyConnect
    Provisioning Resources from a Remote Site

  • Deploy the
    AnyConnect client and resources


Note

Because AnyConnect ISE posture module does not support web proxy based redirection in discovery, Cisco recommends that you
use non-redirection based discovery. You can find further information in the Client Provisioning Without URL Redirection for
Different Networks section of the Cisco Identity Services Engine Administrator Guide.


ISE can configure and
deploy the following AnyConnect resources:

  • AnyConnect core
    and modules, including the ISE Posture module

  • Profiles: Network Visibility Module, AMP Enabler, VPN, Network Access Manager,
    Customer Feedback and AnyConnect ISE Posture

  • Files for
    customization

    • UI Resources

    • Binaries,
      connection scripts and help files

  • Localization
    files

    • AnyConnect
      gettext translations for message localizations

    • Windows
      Installer Transforms

Prepare AnyConnect
Files for ISE Upload

  • Download the
    AnyConnect packages for your operating systems, and other AnyConnect resources
    that you want to deploy to your local PC.


    Note

    With ASA, installation happens with the VPN downloader. With the download, the ISE posture profile is pushed via ASA, and
    the discovery host needed for later provisioning the profile is available before the ISE posture module contacts ISE. Whereas
    with ISE, the ISE posture module will get the profile only after ISE is discovered, which could result in errors. Therefore,
    ASA is recommended to push the ISE posture module when connected to a VPN.


  • Create profiles for the modules you plan to deploy. At a minimum, create an AnyConnect ISE
    Posture profile (ISEPostureCFG.xml).


    Note

    An ISE posture profile with a Call Home List is mandatory for predeploying
    the ISE posture module, if non-redirection based discovery is used.


  • Combine
    customization and localization resources into a ZIP archive, which is called a
    bundle in ISE. A bundle can contain:

    • AnyConnect UI
      resources

    • VPN Connection
      Scripts

    • Help file(s)

    • Installer
      Transforms

    An AnyConnect
    localization bundle can contain:

    • AnyConnect
      gettext translations, in binary format

    • Installer
      transforms

Creating ISE bundles is described in Prepare AnyConnect Customizations and Localizations for ISE Deployment .

Configure ISE to
Deploy AnyConnect

You must upload the AnyConnect package to ISE before you upload and create additional AnyConnect
resources.


Note

When configuring the AnyConnect Configuration object in ISE, unchecking the VPN module under AnyConnect Module Selection
does not disable the VPN on the deployed/provisioned client.


  1. In ISE, select Expand Client Provisioning to show Resources, and select Resources.

  2. Select
    , and upload the AnyConnect package file. Repeat
    adding agent resources from local disk for any other AnyConnect resources that
    you plan to deploy.

  3. Select This AnyConnect Configuration configures modules, profiles, customization/language packages, and the OPSWAT package, as described
    in the following table.

    The AnyConnect ISE
    Posture profile can be created and edited in ISE, on the ASA, or in the Windows
    AnyConnect Profile Editor. The following table describes the name of each
    AnyConnect resource, and the name of the resource type in ISE.

    Table 5. AnyConnect
    Resources in ISE

    Prompt

    ISE Resource Type and Description

    AnyConnect
    Package

    AnyConnectDesktopWindows

    AnyConnectDesktopOSX

    AnyConnectWebAgentWindows

    AnyConnectWebAgentOSX

    Compliance
    Module

    AnyConnectComplianceModuleWindows

    AnyConnectComplianceModuleOSX

    AnyConnect
    Profiles

    AnyConnectProfile

    ISE displays
    a checkbox for each profile provided by the uploaded AnyConnect package.

    Customization
    Bundle

    AnyConnectCustomizationBundle

    Localization
    Bundle

    AnyConnectLocalizationBundle

  4. Create a Role or
    OS-based client provisioning policy. AnyConnect and the ISE legacy NAC/MAC
    agent can be selected for Client provisioning posture agents. Each CP policy
    can only provision one agent, either the AnyConnect agent or the legacy NAC/MAC
    agent. When configuring the AnyConnect agent, select one AnyConnect
    Configuration created in step 2.

Configuring Web Deployment on FTD

A Firepower Threat Defense (FTD) device is a Next Generation Firewall (NGFW) that provides secure gateway capabilities similar
to the ASA. FTD devices support Remote Access VPN (RA VPN) using the AnyConnect Secure Mobility Client only, no other clients,
or clientless VPN access is supported. Tunnel establishment and connectivity are done with IPsec IKEv2 or SSL. IKEv1 is not
supported when connecting to an FTD device.

Windows, macOS, and Linux AnyConnect clients are configured on the FTD headend and deployed upon
connectivity; giving remote users the benefits of an SSL or IKEv2 IPsec VPN client
without the need for client software installation and configuration. In the case of a
previously installed client, when the user authenticates, the FTD headend examines the
revision of the client, and upgrades the client as necessary.

Without a previously installed client, remote users enter the IP address of an interface configured to download and install
the AnyConnect client. The FTD headend downloads and installs the client that matches the operating system of the remote computer,
and establishes a secure connection.

The AnyConnect apps for Apple iOS and Android devices are installed from the platform app store. They require a minimum configuration
to establish connectivity to the FTD headend. As with other headend devices and environments, alternative deployment methods,
as described in this chapter, can also be used to distribute the AnyConnect software.

Currently, only the core AnyConnect VPN module and the AnyConnect VPN Profile can be configured on the FTD and distributed
to endpoints. A Remote Access VPN Policy wizard in the Firepower Management Center (FMC) quickly and easily sets up these
basic VPN capabilities.

Guidelines and Limitations for AnyConnect and FTD

  • The only supported VPN client is the Cisco AnyConnect Secure Mobility Client. No other clients or native VPNs are supported.
    Clientless VPN is not supported as its own entity; it is only used to deploy the AnyConnect Client.

  • Using AnyConnect with FTD requires version 4.0 or later of AnyConnect, and version 6.2.1 or later of the FMC.

  • There is no inherent support for the AnyConnect Profile Editor in the FMC; you must configure the VPN profiles independently.
    The VPN Profile and AnyConnect VPN package are added as File Objects in the FMC, which become part of the RA VPN configuration.

  • Secure Mobility, Network Access Management, and all the other AnyConnect modules and their profiles beyond the core VPN capabilities
    are not currently supported.

  • VPN Load balancing is not supported.

  • Browser Proxy is not supported.

  • All posture variants (HostScan, Endpoint Posture Assessment, and ISE) and Dynamic Access Policies based on the client posture
    are not supported.

  • The Firepower Threat Defense device does not configure or deploy the files necessary to customize or localize AnyConnect.

  • Features requiring Custom Attributes on the AnyConnect Client are not supported on FTD such as: Deferred Upgrade on desktop
    clients and Per-App VPN on mobile clients.

  • Authentication cannot be done on the FTD headend locally; therefore, configured users are not available for remote connections,
    and the FTD cannot act as a Certificate Authority. Also, the following authentication features are not supported:

    • Secondary or double authentication

    • Single Sign-on using SAML 2.0

    • TACACS, Kerberos (KCD Authentication) and RSA SDI

    • LDAP Authorization (LDAP Attribute Map)

    • RADIUS CoA

For details on configuring and deploying AnyConnect on an FTD, see the Firepower Threat Defense Remote Access VPN chapter in the appropriate release of the Firepower Management Center Configuration Guide, Release 6.2.1 or later.

Updating AnyConnect
Software and Profiles

AnyConnect can be updated in several ways.

  • AnyConnect Client—When AnyConnect connects to the ASA, the
    AnyConnect Downloader checks to see if any new software or profiles have been
    loaded on the ASA. It downloads those updates to the client, and the VPN tunnel
    is established.

  • Cloud Update—The Umbrella Roaming Security Module can provide automatic updates for all installed AnyConnect modules from
    the Umbrella Cloud infrastructure. With Cloud Update, the software upgrades are obtained automatically from the Umbrella Cloud
    infrastructure, and the update track is dependent upon that and not any action of the administrator. By default, automatic
    updates from Cloud Update are disabled.

  • ASA or FTD Portal—You instruct your users to connect to the ASA’s Clientless Portal to get updates. FTD downloads the core
    VPN module only.

  • ISE—When a user connects to ISE, ISE uses its AnyConnect configuration to decide if there are updated components or new posture
    requirements. Upon authorization, the Network Access Device (NAD) redirects the users to the ISE portal, and the AnyConnect
    downloader is installed on the client to manage the package extraction and installation. We recommend that you upload the
    deploy package to the ASA headend and make sure that the versions of AnyConnect client match the ASA and ISE deployment package
    versions.

    Receiving a message that «automatic software updates are required but cannot be performed while the VPN tunnel is established»
    indicates that the configured ISE policy requires updates. When the AnyConnect version on the local device is older than what’s
    configured on ISE, you have the following options, because client updates are not allowed while the VPN is active:

    • Deploy AnyConnect update out of band

    • Configure the same version of AnyConnect on the ASA and ISE

You can allow the end user to delay updates, and you can also
prevent clients from updating even if you do load updates to the headend.

Upgrade Example
Flows

Prerequisites

The following
examples assume that:

  • You have created a Dynamic
    Authorization Control List (DACL) in ISE that uses the posture status of the
    client to determine when to redirect the client to the AnyConnect Client
    Provisioning portal on ISE, and that DACL has been pushed to the ASA.

  • ISE is behind
    the ASA.

AnyConnect is Installed on
the Client

  1. User starts
    AnyConnect, provides credentials, and clicks Connect.

  2. ASA opens SSL
    connection with client, passes authentication credentials to ISE, and ISE
    verifies the credentials.

  3. AnyConnect launches the
    AnyConnect Downloader, which performs any upgrades, and initiates a VPN tunnel.

If ISE Posture was
not installed by the ASA, then

  1. A user browses
    to any site and is redirected to AnyConnect client provisioning portal on ISE
    by the DACL.

  2. If the browser
    is Internet Explorer, ActiveX control launches AnyConnect Downloader. On other
    browsers, the user downloads and executes Network Setup Assistant (NSA), which
    downloads and starts the AnyConnect Downloader.

  3. The AnyConnect
    Downloader performs any AnyConnect upgrades configured on ISE, which now
    includes the AnyConnect ISE Posture module.

  4. The ISE Posture
    agent on the client starts posture.

AnyConnect is Not
Installed

  1. The user browses
    to a site, which starts a connection to the ASA Clientless Portal.

  2. The user
    provides authentication credentials, which are passed to ISE, and verified.

  3. AnyConnect
    Downloader is launched by ActiveX control on Internet Explorer and by Java
    applet on other browsers.

  4. AnyConnect
    Downloader performs upgrades configured on ASA and then initiates VPN tunnel.
    Downloader finishes.

If ISE Posture was
not installed by the ASA, then

  1. User browses to
    a site again and is redirected to AnyConnect client provisioning portal on ISE.

  2. On Internet
    Explorer, an ActiveX control launches AnyConnect Downloader. On other browsers,
    the user downloads and executes Network Setup Assistant, which downloads and
    launches the AnyConnect Downloader.

  3. The AnyConnect
    Downloader performs any upgrades configured on ISE through the existing VPN
    tunnel, which includes adding the AnyConnect ISE Posture module.

  4. ISE Posture
    agent starts posture assessment.

Disabling AnyConnect
Auto Update

It is possible to disable or limit AnyConnect automatic updates
by configuring and distributing client profiles.

  • In the VPN Client Profile:

    • Auto
      Update
      disables automatic updates. You can include this profile with
      the AnyConnect web-deployment installation or add to an existing client
      installation. You can also allow the user to toggle this setting.

  • In the VPN Local Policy Profile:

    • Bypass Downloader
      prevents any updated content on the ASA from being
      downloaded to the client.

    • Update Policy offers granular control over software
      and profiles updates when connecting to different headends.

Prompting Users to Download AnyConnect During WebLaunch

You can configure the ASA to prompt remote users to start web
deployment, and configure a time period within which they can choose to download
AnyConnect or go to the clientless portal page.

Prompting users to download AnyConnect is configured on a group
policy or user account. The following steps show how to enable this feature on a
group policy.

Procedure


Step 1

In ASDM go to
.

Step 2

Select a group policy and click
Edit or
Add a new group policy.

Step 3

In the navigation pane, choose . Uncheck the Inherit
check box, if necessary, and select a Post Login setting.

If you choose to prompt users, specify a timeout period
and select a default action to take when that period expires in the Default
Post Login Selection area.

Step 4

Click OK and be sure to apply your
changes to the group policy, then click Save.


Allowing Users to
Defer Upgrade

You can force users to accept an AnyConnect update by disabling
AutoUpdate, as described in
Disabling AnyConnect Auto
Update. AutoUpdate is on by default.

You can also allow users to defer client update until later by
setting Deferred Update. If Deferred Update is configured, then when a client
update is available, AnyConnect opens a dialog asking the user if they would
like to update, or to defer. Deferred Upgrade is supported by all Windows,
Linux and OS X.

Configure Deferred
Update on an ASA

On an ASA, Deferred
Update is enabled by adding custom attributes and then referencing and
configuring those attributes in the group policies. You must create and
configure
all
custom attributes to use Deferred Upgrade.

The procedure to add
custom attributes to your ASA configuration is dependent on the ASA/ASDM
release you are running. See the
Cisco ASA
Series VPN ASDM Configuration Guide
or the
Cisco ASA
Series VPN CLI Configuration Guide
that corresponds to your ASA/ASDM
deployed release for custom attribute configuration procedures.

The following attributes and values configure Deferred Update in
ASDM:

Custom Attribute *

Valid 
Values

Default Value

Notes

DeferredUpdateAllowed

true
false

false

True enables deferred update. If deferred update is disabled (false), the settings below are ignored.

DeferredUpdateMinimumVersion x.x.x

0.0.0

Minimum version of AnyConnect that must be installed for updates to be deferrable.

The minimum version check applies to all modules enabled on the head end. If any enabled module (including VPN) is not installed
or does not meet the minimum version, then the connection is not eligible for deferred update.

If this attribute is not specified, then a deferral prompt is displayed (or auto-dismissed) regardless of the version installed
on the endpoint.

DeferredUpdateDismissTimeout 0-300
(seconds)

150 seconds

Number of seconds that the deferred upgrade prompt is displayed before being dismissed automatically. This attribute only
applies when a deferred update prompt is to be displayed (the minimum version attribute is evaluated first).

If this attribute is missing, then the auto-dismiss feature is disabled, and a dialog is displayed (if required) until the
user responds.

Setting this attribute to zero allows automatic deferral or upgrade to be forced based on:

  • The installed version and the value of DeferredUpdateMinimumVersion.

  • The value of DeferredUpdateDismissResponse.

DeferredUpdateDismissResponse defer
update

update

Action to take when DeferredUpdateDismissTimeout occurs.

* The custom attribute values are case-sensitive.

Configure Deferred
Update in ISE
Procedure

Step 1

Follow this navigation:

  1. Choose .

  2. Expand Client Provisioning.

  3. Select Resources, and click .

  4. Upload the AnyConnect pkg file, and choose Submit.

Step 2

Upload any other
AnyConnect resources you have created.

Step 3

On
Resources, add an
AnyConnect Configuration using the AnyConnect
package that you uploaded. The AnyConnect Configuration has fields to configure
Deferred Update.


Deferred Update
GUI

The following figure shows the UI that the user sees when an
update is available, and Deferred Update is configured. The right part of the
figure shows the UI when
DeferredUpdateDismissTimeout is configured.

Set the Update
Policy

Update Policy
Overview

AnyConnect software and profile updates occur when they are
available and allowed by the client upon connecting to a headend. Configuring
the headend for AnyConnect updates makes them available. The Update Policy
settings in the VPN Local Policy file determine if they are allowed.

Update policy is
sometimes referred to as software locks. When multiple headends are configured,
the update policy is also referred to as the multiple domain policy.

By default, the Update Policy settings allow software and
profile updates from any headend. Set the Update Policy parameters to restrict
this as follows:

  • Allow, or authorize, specific headends to update all AnyConnect
    software and profiles by specifying them in the
    Server Name
    list.

    The headend server name can be an FQDN or an IP Address. They
    can also be wild cards, for example: *.example.com.

    See
    Authorized Server Update Policy
    Behavior below for a full description of how the update occurs.

  • For all other unspecified, or unauthorized headends:

    • Allow or disallow software updates of the VPN core module and
      other optional modules using the
      Allow
      Software Updates From Any Server
      option.

    • Allow or disallow VPN Profile updates using the
      Allow
      VPN Profile Updates From Any Server
      option.

    • Allow or disallow other service module profile updates using the

      Allow
      Service Profile Updates From Any Server
      option.

    • Allow or disallow ISE
      Posture Profile updates using the
      Allow ISE
      Posture Profile Updates From Any Server
      option.

    • Allow or disallow Compliance
      Module updates using the
      Allow
      Compliance Module Updates From Any Server
      option.

      See
      Unauthorized Server Update Policy
      Behavior below for a full description of how the update occurs.

Authorized Server
Update Policy Behavior

When connecting to an authorized headend identified in the
Server Name
list, the other Update Policy parameters do not apply and the following occurs:

  • The version of the AnyConnect package on the headend is compared
    to the version on the client to determine if the software should be updated.

    • If the version of the AnyConnect package is older than the
      version on the client, no software updates occur.

    • If the version of the AnyConnect package is the same as the
      version on the client, only software modules that are configured for download
      on the headend and not present on the client are downloaded and installed.

    • If the version of the AnyConnect package is newer than the
      version on the client, software modules configured for download on the headend,
      as well as software modules already installed on the client, are downloaded and
      installed.

  • The VPN profile, ISE Posture profile, and each service profile
    on the headend is compared to that profile on the client to determine if it
    should be updated:

    • If the profile on the headend is the same as the profile on the
      client, it is not updated.

    • If the profile on the headend is different than the profile on
      the client, it is downloaded.

Unauthorized Server
Update Policy Behavior

When connecting to an unauthorized headend, the
Allow … Updates From Any
Server
options are used to determine how AnyConnect is updated as
follows:

  • Allow Software Updates From
    Any Server:

    • If this option is checked, software updates are allowed for this
      unauthorized ASA. Updates are based on version comparisons as described above
      for authorized headends.

    • If this option is not checked, software updates do not occur. In
      addition, VPN connection attempts will terminate if updates, based on version
      comparisons, should have occurred.

  • Allow VPN Profile Updates
    From Any Server:

    • If this option is checked, the VPN profile is updated if the VPN
      profile on the headend is different than the one on the client.

    • If this option is not checked, the VPN profile is not updated.
      In addition, VPN connection attempts will terminate if theVPN profile update,
      based on differentiation, should have occurred.

  • Allow Service Profile Updates
    From Any Server:

    • If this option is checked, each service profile is updated if
      the profile on the headend is different than the one on the client.

    • If this option is not checked, the service profiles are not
      updated.

  • Allow ISE Posture Profile Updates From Any
    Server:

    • If this option is checked, the ISE Posture profile is updated
      when the ISE Posture profile on the headend is different than the one on the
      client.

    • If this option is not checked, the ISE Posture profile is not
      updated. ISE Posture profile is required for the ISE Posture agent to work.

  • Allow Compliance Module Updates From Any
    Server:

    • If this option is checked, the Compliance Module is updated when
      the Compliance Module on the headend is different than the one on the client.

    • If this option is not checked, the Compliance Module is not
      updated. The Compliance Module is required for the ISE Posture agent to work.

Update Policy
Guidelines

  • Enable remote users to connect to a headend using its IP address
    by listing that server’s IP address in the authorized
    Server Name
    list. If the user attempts to connect using the IP address but the headend is
    listed as an FQDN, the attempt is treated as connecting to an unauthorized
    domain.

  • Software updates include downloading customizations, localizations, scripts and transforms. When software updates are disallowed,
    these items will not be downloaded. Do not rely on scripts for policy enforcement if some clients will not be allowing script
    updates.

  • Downloading a VPN profile with
    Always-On
    enabled deletes all other VPN profiles on the client. Consider this when
    deciding whether to allow or disallow VPN profiles updates from unauthorized,
    or non-corporate, headends.

  • If no VPN profile is downloaded to the client due to your installation
    and update policy, the following features are unavailable:

    Service Disable

    Untrusted Network Policy

    Certificate Store Override

    Trusted DNS Domains

    Show Pre-connect Message

    Trusted DNS Servers

    Local LAN Access

    Always-On

    Start Before Logon

    Captive Portal Remediation

    Local proxy connections

    Scripting

    PPP Exclusion

    Retain VPN on Logoff

    Automatic VPN Policy

    Device Lock Required

    Trusted Network Policy

    Automatic Server Selection

  • In Windows, the downloader creates a separate text log
    (UpdateHistory.log) that records the download history. This log includes the
    time of the updates, the ASA that updated the client, the modules updated, and
    what version was installed before and after the upgrade. This log file is stored
    here:

    %ALLUSERESPROFILE%\Cisco\Cisco AnyConnect Secure Mobility
    Client\Logs
    directory.

  • You must restart the AnyConnect service to pick up any changes in the Local Policy file.

Update Policy
Example

This example shows the client update behavior when the
AnyConnect version on the client differs from various ASA headends.

Given the following
Update Policy in the VPN Local Policy XML file:


<?xml version="1.0" encoding="UTF-8"?>
<AnyConnectLocalPolicy acversion="2.4.140"
xmlns=http://schemas.xmlsoap.org/encoding/
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="http://schemas.xmlsoap.org/encoding/ AnyConnectLocalPolicy.xsd">
<FipsMode>false</FipsMode>
<BypassDownloader>false</BypassDownloader><RestrictWebLaunch>false</RestrictWebLaunch>
<StrictCertificateTrust>false</StrictCertificateTrust>
<RestrictPreferenceCaching>false</RestrictPreferenceCaching>
<RestrictTunnelProtocols>false</RestrictTunnelProtocols>
<UpdatePolicy>
<AllowSoftwareUpdatesFromAnyServer>false</AllowSoftwareUpdatesFromAnyServer>
<AllowVPNProfileUpdatesFromAnyServer>false</AllowVPNProfileUpdatesFromAnyServer>
<AllowServiceProfileUpdatesFromAnyServer>false</AllowServiceProfileUpdatesFromAnyServer>
<AllowISEProfileUpdatesFromAnyServer>true</AllowISEProfileUpdatesFromAnyServer>
<AllowComplianceModuleUpdatesFromAnyServer>true</AllowComplianceModuleUpdatesFromAnyServer>
<AllowManagementVPNProfileUpdatesFromAnyServer>true</AllowManagementVPNProfileUpdatesFromAnyServer>
<AuthorizedServerList>
   <ServerName>seattle.example.com</ServerName>
   <ServerName>newyork.example.com</ServerName>
</AuthorizedServerList>
</UpdatePolicy>
</AnyConnectLocalPolicy>

With the following ASA headend configuration:

ASA Headend

AnyConnect Package Loaded

Modules to Download

seattle.example.com

Version 4.7.01076

VPN, Network Access Manager

newyork.example.com

Version 4.7.03052

VPN, Network Access Manager

raleigh.example.com

Version 4.7.04056

VPN, Posture

The following update sequence is possible when the client is
currently running AnyConnect VPN and Network Access Manager modules:

  • The client connects to seattle.example.com, an authorized server
    configured with the same version of AnyConnect. If the VPN and Network Access
    Manager profiles are available for download and different than the ones on the
    client, they will also be downloaded.

  • The client then connects to newyork.example.com, an authorized ASA
    configured with a newer version of AnyConnect. The VPN and Network Access
    Manager modules are upgraded. Profiles that are available for download and
    different than the ones on the client are also downloaded.

  • The client then connects to raleigh.example.com, an unauthorized ASA.
    Even though a software update is necessary and a software update is available,
    the update is not allowed due to the policy determining version upgrades are not
    allowed. The connection terminates.

AnyConnect Reference Information

Locations of User
Preferences Files on the Local Computer

AnyConnect stores some profile settings on the user computer in
a user preferences file and a global preferences file. AnyConnect uses the
local file to configure user-controllable settings in the Preferences tab of
the client GUI and to display information about the last connection, such as
the user, the group, and the host.

AnyConnect uses the global file for actions that occur before
logon, for example, Start Before Logon and AutoConnect On Start.

The following table shows the filenames and installed paths for
preferences files on the client computer:

Operating System

Type

File and Path

Windows

User

C:\Users\username\AppData\Local\Cisco\
Cisco AnyConnect VPN Client\preferences.xml

Global

C:\ProgramData\Cisco\Cisco AnyConnect VPN Client\
preferences_global.xml

macOS

User

/Users/username/.anyconnect

Global

/opt/cisco/anyconnect/.anyconnect_global

Linux

User

/home/username/.anyconnect

Global

/opt/cisco/anyconnect/.anyconnect_global

Port Used by AnyConnect

The following tables list the ports used by the Cisco AnyConnect Secure
Mobility Client
for each protocol.

Protocol

Cisco AnyConnect Client Port

TLS (SSL)

TCP 443

SSL Redirection

TCP 80 (optional)

DTLS

UDP 443 (optional, but highly recommended)

IPsec/IKEv2

UDP 500, UDP 4500

  • Настройка двухфакторной аутентификации
  • Установка приложения Cisco Anyconnect VPN Client
  • Подключение
  • Аутентификация

Прежде, чем подключаться к сети Университета, Вам необходимо настроить Ваш телефон на проверку второго фактора. Настройку проверки второго фактора необходимо сделать только один раз, поэтому если Вы уже выполняли это ранее, можете пропустить этот шаг, и перейти к шагу с установкой приложения Cisco Anyconnect VPN Client.


Внимание! С 12.09.2023 изменился сервис двухфакторной аутентификации. Потребуется повторная настройка в новом сервисе, следуя пункту с настройкой двухфакторной аутентификации ниже. Приложение доступно для систем Android (Google Play) и iOS (App Store).


Также не забывайте, что при необходимости использования квалифицированной электронной подписи при удаленном подключении к рабочему месту носитель с электронной подписью необходимо забрать с собой, чтобы подключить его к домашнему компьютеру/ноутбуку.


Настройка двухфакторной аутентификации

Войдите на портал регистрации по адресу https://mfa.utmn.ru.  Введите данные Вашей корпоративной учетной записи и нажмите кнопку «Войти» как показано на рисунке ниже.

После успешного входа Вы перейдете в настройку Мультифактора. Нажмите кнопку «Далее».

Вам на выбор предоставляется 2 способа проверки:

  • Мобильное приложение Multifactor
  • Оповещения от Телеграм-бота

Двухфакторная аутентификация с приложением Multifactor

Портал предложит установить приложение на мобильное устройство. Данное приложение доступно в магазинах Play Store, App Store и AppGallery. Установите данное приложение. Не закрывайте портал.

Пользователи устройств компании Huawei для корректной работы приложения должны установить приложение ТОЛЬКО из AppGallery.

 

После установки приложения нажмите кнопку Далее на портале в форме «Установите приложение».

Далее вам предоставят QR-код и ссылку, который будет необходимо отсканировать с помощью приложения. Данный код будет действовать 20 минут с момента создания. Вернитесь к приложению Мультфактор.

В приложении нажмите на кнопку добавления нового аккаунта (кнопка +), разрешите приложению доступ к камере (при запросе) и отсканируйте QR-код.

         

После успешной регистрации Ваша учетная запись появиться в главном меню приложения. Портал предложит выполнить вход для проверки работы приложения. Нажмите кнопку «Выполнить вход».

      

На портале появится окно, показывающее какой способ аутентификации используется. В приложении придет оповещение с просьбой «Подтвердить вход» или «Отклонить его». Подтвердите вход.

          

Вас перенаправит на страничку, где показаны все настроенные методы аутентификации с возможностью их настройки и удаления.

Настройка двухфакторной аутентификации через приложение Multifactor завершена. 

Двухфакторная аутентификация через Телеграм-бот

Для настройки двухфакторной аутентификации через Телеграм-бот потребуется активный аккаунт в приложении Телеграм и установленное приложение Телеграм.

На портале mfa.utmn.ru в шаге «Установите приложение» нажмите на меню в виде трех вертикальных точек ⋮ , чтобы открыть контекстное меню. В нем выберете Расширенные настройки.

Появится список доступных способ аутентификации. В поле Telegram нажмите +Добавить контакт.

 

Далее вам предоставят QR-код и ссылку. Отсканируйте QR-код через любое доступное приложение для сканирования или перейдите по ссылке.

QR-код или ссылка перенаправит на установленное приложение Телеграм и откроет чат с ботом @MultifactorBot.

Нажмите «Начать», чтобы зарегистрировать ваш аккаунт. Бот @MultifactorBot ответит, что ваша регистрация завершена. Далее в этом чате будут появляться запросы на подтверждение.

Если вы просто найдете данный бот через поиске в Telegram и нажмете Начать, то Ваш аккаунт не привяжется в портале MULTIFACTOR. Обязательно пройдите по сгенерированной ссылке или отсканируйте QR-код.

    

На портале mfa.utmn.ru появится имя аккаунта Телеграм. Нажмите кнопку «ОК» в правом верхнему углу.

Далее портал отправит тестовое подтверждение для проверки работы. В чате бот @MultifactorBot отправит сообщение о подтверждение подключения. Нажмите кнопку «Да, это я».

        

После успешной аутентификации вас перенаправит на страничку, где показаны все настроенные способы проверки доступа.

Настройка двухфакторной аутентификации через Телеграм-бот завершена. 

Установка приложения Cisco Anyconnect VPN Client

Для установления защищенного подключения к корпоративной сети Университета Вам необходимо использовать приложение для обеспечения удаленного доступа Cisco AnyConnect Secure Mobility Client. Его можно скачать по ссылке для ОС Windows и по ссылке для ОС macOS. Данное приложение доступно для систем Android и iOS. Выполните установку, если приложение уже установлено, пропустите данный пункт.

Подключение

Откройте установленное приложение Cisco AnyConnect Secure Mobility Client. В качестве сервера подключения укажите имя «vpn.utmn.ru» и нажмите кнопку «Connect». 

Изображение

Аутентификация

Для прохождения аутентификации Вам необходимо выбрать группу подключения «UTMN_MFA» и ввести данные Вашей корпоративной учетной записи .

   Изображение

Приложение Microsoft Authenticator пришлет уведомление с просьбой подтвердить или отклонить вход.

После чего автоматически будет установлено защищенное подключение и Вы сможете использовать корпоративные ресурсы Университета.

Изображение

Если у Вас остались вопросы по удаленному подключению к сети Университета, обратитесь в диспетчерскую службы технической поддержки ЦИТ:

  • напишите запрос через Портал поддержки ЦИТ;
  • с помощью электронной почты 597777@utmn.ru;
  • по телефону: +7 (3452) 59-77-77.
  • Home
  • Partition Manager
  • How to Download and Install Cisco AnyConnect on PC

By Linda | Follow |
Last Updated

Cisco AnyConnect is a VPN client launched by Cisco for Windows, Android, iOS, OS X, Ubuntu, and WebOS. This post from MiniTool Partition Wizard offers you the Cisco AnyConnect download and installation guide.

AnyConnect is a VPN client launched by Cisco. Its main function is to allow employees to use any device to access the corporate network anytime and anywhere. At present, there are Cisco AnyConnect clients for Windows, Android, iOS, OS X, Ubuntu, and WebOS.

Do you want to use Cisco AnyConnect on your PC? If you want, you can refer to the following guide to download and install it.

Cisco AnyConnect Download

You can follow the guide below to download Cisco AnyConnect for Windows, macOS, and Linux.

Step 1: Go to the Cisco software download page. In the search box, type “anyconnect” and then click AnyConnect Secure Mobility Client v4.x from the result list. It is also the latest AnyConnect software version.

download Cisco AnyConnect

Step 2: After going to the Cisco AnyConnect Secure Mobility Client download page, you need to choose a proper Cisco AnyConnect version.

  • To get the Cisco AnyConnect download Mac, you need to choose the AnyConnect Pre-Deployment Package (Mac OS) option.
  • To download Cisco AnyConnect Windows 10, you need to choose the AnyConnect Pre-Deployment Package (Windows) – includes individual MSI files option.
  • To run Cisco AnyConnect on Linux, you need to choose the AnyConnect Pre-Deployment Package (Linux 64-bit) option.

Tips:

Before you get the Cisco AnyConnect download, you need to purchase it.

2022 11 Best Free VPN Service for Windows 10/11 PC and Laptop

How to Install Cisco AnyConnect on a PC

To install Cisco AnyConnect on Windows, the process is as follows:

  1. Extract the Cisco AnyConnect installer filer.
  2. In the extracted folder, double-click Setup.exe to initiate the installation process.
  3. A pop-up window may ask for permissions, in this case, select Yes. If your pop-up asks if you are sure you want to run this software, select Run.
  4. Choose the components to be installed and click Install Selected.
  5. Click OK.
  6. Review the Supplemental End User License Agreement and then click Accept.

To install Cisco AnyConnect on macOS, the process is as follows:

  1. Double-click the installer file.
  2. Click Continue.
  3. Go over the Supplemental End User License Agreement and then click Continue.
  4. Click Agree.
  5. Choose the components to be installed and click Continue.
  6. Click Install.
  7. Enter your password in the Password field and then click Install Software.

To install Cisco AnyConnect on Linux, the process is as follows:

  1. Open the Terminal by pressing Ctrl+Alt+T on your keyboard.
  2. Execute the command “cd desktop” to navigate to Desktop where the downloaded file is saved.
  3. Execute the command “tar xvf anyconnect-linux64-4.10.05111-predeploy-k9.tar.gz” to extract the downloaded file.
  4. Execute the command “cd anyconnect-linux64-4.10.05111” to navigate into the folder.
  5. Execute the command “cd vpn” to navigate into the vpn sub-folder.
  6. Execute the command “sudo ./vpn_install.sh” to begin the installation process.
  7. Type “y” to accept the license agreement to complete the installation.

If you want to know how to connect and disconnect to a VPN, you can read the content on this page.  

Bottom Line

This post shows you how to download and install Cisco AnyConnect on your PC. If you are interested in MiniTool Partition Wizard software, you can download it from the official website. This software can manage your disk better.

About The Author

Linda

Position: Columnist

Linda has been working as an editor at MiniTool for 5 years. She is always curious about computer knowledge and learns it crazily. Her articles are simple and easy to understand. Even people who do not understand computer can gain something. By the way, her special focuses are disk management, data recovery and PDF editing.

На чтение 13 мин Просмотров 20.9к.

Максим aka WisH

Максим aka WisH

Высшее образование по специальности «Информационные системы». Опыт работы системным администратором — 5 лет.

Задать вопрос

Cisco AnyConnect – это VPN клиент от известной компании Cisco, которая занимается поставками сетевого оборудования. Их устройства дороги и сложны в настройке, но достаточно надежны и приспосабливаются под любую сеть. Настройкой оборудования занимаются или сторонние специалисты, или свои сотрудники, имеющие нужные сертификаты.

Обычный работник имеет возможность столкнуться с настройкой и использование программ от этой фирмы только в случае небольших бесплатных программ, которые они предоставляют. Cisco AnyConnect – это одна из таких программ, которые могут быть установлены на компьютере обычного работника.

Содержание

  1. Зачем использовать Cisco AnyConnect
  2. Установка и настройка Cisco AnyConnect Client на ПК
  3. Где скачать Cisco AnyConnect Secure?
  4. На Windows 10
  5. На MacOS
  6. На Linux Ubuntu
  7. Запуск и первые шаги Cisco AnyConnect Mobility для смартфонов
  8. На Android
  9. На iOS
  10. Возможные проблемы
  11. Нет соединения
  12. Ошибка инициализации
  13. Как удалить клиент
  14. Аналоги Cisco VPN Client

Стоит сразу сказать, несмотря на то, что Cisco AnyConnect является бесплатным приложением для использования VPN, он не предоставляет доступа ни к каким платным или бесплатным серверам. Cisco Anyconnect используется для подключения к существующим виртуальным частным сетям или VPN.

Программа является клиентом, так что в ней осуществляется только настройка подключения к самой сети. Все настройки VPN задаются на сервере или на том оборудовании Cisco, что служит шлюзом между интернетом и корпоративной сетью.

Разберем несколько особенностей, которые позволяют предоставлять удаленный доступ через это приложение:

  • Возможность получения настроек со шлюза или сервера. Если человек работает через свое оборудование и нет возможности отдать его на установку и настройку техническим специалистам, то AnyConnect может получить настройки с сервера при первом подключении.
  • Безопасность конечного устройства. Присутствует возможность настройки проверки компьютера или телефона, на котором установлено. Если устройство не соответствует заданным параметрам безопасности, то подключение не произойдет.
  • «Тихая» работа. Можно сделать так, чтобы приложение не отображалось в активных, а значка в трее не было.
  • Настройка приложения таким образом, чтобы при работе внутри корпоративной сети, не работал интернет. Это повышает безопасность корпоративной сети от взлома или занесения вредоносных программ.

К сожалению, все это задается в конфиге оборудования Cisco или на серверах компании. В самом клиенте настраивается подключение, производится ввод логина и пароля, а также задаются некоторые параметры установки соединения.

Всем остальным занимается администратор сети внутри компании. Так что вам столкнуться с этим не придется, ведь для работы с цисками требуется довольно долгое обучение и наличие некоторых сертификатов его подтверждающих.

Установка и настройка Cisco AnyConnect Client на ПК

Про места для скачивания поговорим чуть ниже, так что стоит остановиться на самой установке и настройке. Опять же, для каждой системы конкретные действия будут разными, но общий алгоритм такой: распаковать скачанный архив, запустить оттуда установочный файл. Дождаться окончания установки и запустить саму программу.

В некоторых случаях потребуется добавить программу в исключения своего антивируса и брандмауэра, но сначала попробуйте запустить её без этого. Теперь можно переходить к настройке.

как выглядит циско эни коннект

Внешний вид приложения.

Где скачать Cisco AnyConnect Secure?

Скачать программу можно всего с нескольких ресурсов. Основным является официальный сайт производителя.

Текущая версия находится по адресу: https://software.cisco.com/download/home/286281283/type/282364313/release/4.10.05095 , если соединится не получается, что удалите все до последнего слэша, должно перекинуть на последнюю версию. Здесь представлен полный список программ для Линукса, MacOS и Windows. Скачивайте и устанавливайте, для винды рекомендуется брать AnyConnect Pre-Deployment Package.

Проблема в том, что как только вы нажмете на скачивание, выскочит окно с предупреждением. Посторонние люди не могут загружать программы, так что войдите в свой аккаунт, в котором активен сервисный договор с компанией. Если такого нет, то обратитесь к своему дилеру, чтобы он предоставил вам копию программы.

У Microsoft есть свой официальный магазин, работающий с последними операционными системами. Зайдите туда и найдите нужное приложение, можете перейти по ссылке https://apps.microsoft.com/store/detail/anyconnect/9WZDNCRDJ8LH?hl=ru-ru&gl=RU. Нажмите на «Установить» и дождитесь окончания процесса. Это работает только для десятки, для Windows 7 и других ранних версий потребуется воспользоваться первым способом.

На Windows 10

окно программы на виндовс 10

Внешний вид на Windows 10.

После загрузки из официального магазина, программа станет доступна в списке установленных. Найдите её по ярлыку или через меню пуск и запустите. Нажмите на «Manage VPN», вас перебросит в стандартное окно с ВПН на десятке.

Здесь нужно установить, когда можно использовать ВПН, использовать ли его при роуминге и т.д. После выбора этих опций нажмите на «Add a VPN Connection», на русском будет «Добавить ВПН-соединение».

настройка vpn windows 10

Окно с настройками ВПН.

В открывшемся окне производятся все настройки. Главное, в верхней строке выберите создание соединения через AnyConnect. Дальше введите имя соединения, адрес сервера, а также логин и пароль, если они требуются для входа. Сохраните настройки. Теперь, для запуска соединения, вам нужно снова открыть окно с настройками ВПН и кликнуть там по нужному соединению.

данные для впн в настройках соединения

Ввод данных для подключения.

В некоторых случаях может потребоваться настройка самой программы. Тогда из пуска снова запустите её и перейдите в раздел «Settings», здесь найдите настройку «Block Untrusted Servers», часто её требуется отключить для установки соединения. В разделе Diagnostic есть параметр Сertificate, здесь будут храниться сертификаты серверов, сюда же может потребоваться установить выданный вам сертификат, если подключение происходит по нему.

настройки клиента

Вид настроек.

На MacOS

Загрузите программу из указанного источника, а потом дважды кликните на файл для начала установки. В первом окне нажмите «Continue», это просто приветствие, во втором окне выберите место, в которое хотите установить программу. Дальше все понятно, просто введите пароль и дождитесь окончания установки.

процесс установки на мак

Установка на Мас.

Теперь перейдите в раздел с приложениями и найдите там Cisco > Cisco AnyConnect Secure Mobility Client.app. Запустите его, в первом окне укажите точный адрес, выданный вам для подключения к VPN и нажмите на Connect. Появится еще одно окно, в верхней строке выберите группу, а ниже введите логин и пароль.

ввод данных в cisco anyconnect на mac

Окно подключения.

Теперь вы подключены. Для отключения снова нажмите на приложение, откроется окно с адресом сервера. Нажмите здесь на Disconnect, это позволит отключить соединение.

отключение соединения с клиентом

Отключение.

На Linux Ubuntu

Алгоритм будет одинаковым на всех линуксах, в том числе и на Debian, и Fedora. Скачайте архив из указанных источников. Распакуйте его и перейдите в новый каталог. Откройте и запустите установочный файл. В некоторых случаях все это можно проделать и через графический интерфейс, но можно работать и через консоль.

Запустите программу. На картинке вы видите интерфейс подключения, он выскочит после первого запуска программы. Введите адрес, а через двоеточие порт, если он нужен. Вводите его с точностью до каждого знака такой же, как вам выдали на работе. Потом нажмите на «Connect».

подключение к клиенту в линуксе

Вид окна подключения.

Откроется окно с предупреждениями. Нажмите здесь на «Change Settings», если вы нажмете по второй кнопке, то точно никуда не подключитесь.

окно с предупреждением

Предупреждение об опасности.

Откроется окно с настройками. Вам нужно снять галочку с последнего пункта «Block connections to untrusted servers». Остальные галки расставьте так, как рекомендовали вам в инструкции на работе.

настройки cisco впн в linux

Окно с настройками.

В следующем окне кликните по кнопке «Connect Anyway», а потом введите логин и пароль. Теперь можно пользоваться программой.

Запуск и первые шаги Cisco AnyConnect Mobility для смартфонов

Сильных отличий в работе приложений друг от друга нет. Меню выглядят похоже и алгоритм действий почти не меняется. Вот и получается, что если один раз настроить полностью работу впн, то и в другой раз проблем не будет. Особенно это характерно для телефонов. Здесь расскажем способы настройки приложений на разных аппаратах.

На Android

На андроиде загрузите приложение из официального магазина. После загрузке запустите его и попадете в первое меню. Здесь кликните по «Подключения», в новом окне на «Добавить новое подключение».

открытое android приложение

Приложение на андроиде.

Появится стандартное окно для ввода данных. Введите туда информацию, которая предоставили вам для подключения. Теперь нажмите на три точки вверху и выберите «Settings» и снимите галку с «Блокировать недоверенные серверы».

параметры андроид приложения

Настройки.

Нажмите на три точки сверху и перейдите на вкладку «Diagnostics», откройте «Управление сертификатом». Снова нажав на три точки вверху выберите «Импортировать», здесь укажите путь до сертификата. Это потребуется, если подключение осуществляется по нему.

На iOS

На iPhone алгоритм ничем не отличается от Андроида. Скачайте и установите приложение из официального магазина. Откройте его. Щелкните по строке Connections, потом кликните по Add VPN Connection. В появившемся окне введите логин и пароль, а также остальные данные для подключения.

открытое приложение на айфоне

Окно приложения на iPhone.

Для включения и отключения используйте рычажок, находящийся в верхней строке. Настройки находятся в разделе «Settings», а управление сертификатами в «Diagnostics».

Возможные проблемы

Сама программа проста, потому что представляет собой клиентскую часть программного решения. То есть, все основные действия и настройки происходят где-то далеко, на серверах и оборудовании Cisco, а Cisco AnyConnect представляет собой небольшую программу для подключения ко всей этой конструкции. Тем не менее разработчики сюда заложили и проверку клиентских устройств и ограничение на работу в интернете, так что проблемы возникают с завидным постоянством.

Нет соединения

Если не устанавливается соединение, то причин несколько:

  • Включилось ограничение на связь, вшитое в установку программы, так что во время работы не получится соединиться с интернетом.
  • Неправильно введены данные сервера, так что приложение не может к нему подключится.
  • Несовпадение версий. Эту проблему отметила компания Майрософт, что при включении ВПН от циско, на некотором оборудовании перестает подключаться беспроводной интернет. Тут только ждать обновлений от обеих компаний.

Проблема глобальная, так что стоит сначала уточнить у тех, кто делал настройки на сервере, какие параметры выставлены. Тогда вы не будете удивляться ограничениям.

При отпадании интернета вообще при включении программы, рекомендуется почистить кэш интернет-соединения.

Ошибка инициализации

При запуске программы выскакивает ошибка «failed to initialize connection subsystem». Ошибка возникала на старых версиях программы, но нет гарантий, что она решена.

Есть два способа решения проблемы:

  • Найдите исполняемый файл программы. Щелкните по ярлыку правой кнопкой мыши, а потом нажмите на «Расположение файла». Обычно это C:Program Files (x86)CiscoCisco AnyConnect Secure Mobility Client.
    По найденному файлу кликните правой кнопкой мыши и выберите «Исправление неполадок». Дождитесь окончания работы.
    Нажмите на компьютер правой кнопкой, перейдите в управление, потом в службы, найдите Cisco AnyConnect Secure Mobility Agent остановите его и потом снова запустите.
    Перезапуск службы
  • Нажмите Win+R и введите в открывшемся окне regedit. Пройдите по пути HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings и создайте переменную DWORD с именем GlobalUserOffline и значением 0. Перезагрузите компьютер.

Проблема возникает из-за установки некоторых обновлений, так что можете удалить последние обновления и проблема решится. Или установите обновление MS15-018, оно решает эту проблему.

Как удалить клиент

С удалением возникают проблемы. Иногда удаляется не полностью, из-за чего возникают сбои при повторной установке. Так что тут совет один: заходите в папку с установленной программой и запускайте деинсталлятор оттуда. Если этого не сделали, то придется работать с командной строкой.

Для мака введите в терминал следующие команды:

  1. sudo /opt/cisco/anyconnect/bin/websecurity_uninstall.sh
  2. sudo /opt/cisco/anyconnect/bin/dart_uninstall.sh
  3. sudo /opt/cisco/anyconnect/bin/nvm_uninstall.sh
  4. sudo /opt/cisco/anyconnect/bin/umbrella_uninstall.sh
  5. sudo /opt/cisco/anyconnect/bin/amp_uninstall.sh

Если вы запороли удаление на виндовс, то попробуйте воспользоваться одной из программ, что чистят реестр. Если она не поможет, то остается только откат на точку восстановления или переустановка системы. Так что лучше сразу зайдите в папку с установленным приложением и используйте деинсталлятор оттуда.

Аналоги Cisco VPN Client

Есть и бесплатные аналоги этой программы, которые не предъявляют требований к договорам и остальному. Так что можете использовать их для создания туннелей, виртуальных сетей и организации удаленного доступа.

Однако, я не рекомендую использовать бесплатные решения для чего-то серьезного. Они редко хорошо защищены, да и следят за их безопасностью не очень пристально. Лучше приобрести какое-то корпоративное решение.

Аналоги:

  • OpenConnect GUI — это графический клиент OpenConnect для систем Microsoft Windows, бесплатный и с открытым исходным кодом.
  • OpenVPN — это полнофункциональное решение SSL VPN с открытым исходным кодом. Это рабочая лошадка большинства предприятия на данный момент. Обеспечивает неплохой уровень безопасности и позволяет задавать много параметров.
  • ShrewSoft VPN Client работает через IPsec на Windows 2000, XP, Vista. Можете применять в тех местах, где не подойдут современные программы.

Cisco Anyconnect – это программа для тех организаций, что используют у себя их оборудование. Поэтому проблем с настройкой возникать не должно. Параметры сервера задает специалист, он же выдаст точную инструкцию по подключению.

Программу можно использовать и с другими видами серверов, как простой ВПН-клиент, но полные возможности раскроются только при использовании вместе с сервером от того же производителя. В других случаях стоит поискать аналогичные программы для организации безопасного удаленного доступа в свою корпоративную сеть или для подключения к какому-то оборудованию – применений для VPN много.

Configure VPN
Access

Connect and Disconnect to a VPN

AnyConnect VPN
Connectivity Options

The AnyConnect client provides many options for automatically
connecting, reconnecting, or disconnecting VPN sessions. These options provide
a convenient way for your users to connect to your VPN, and they also support
your network security requirements.

Starting and
Restarting AnyConnect Connections

Configure VPN Connection
Servers to provide the names and addresses of the secure gateways your
users will manually connect to.

Choose from the following AnyConnect capabilities to provide convenient, automatic VPN connectivity:

  • Automatically Start Windows VPN Connections Before Logon

  • Automatically Start VPN Connections when AnyConnect Starts

  • Automatically Restart VPN Connections

Also, consider using the following Automatic VPN Policy options to enforce greater network security or restrict network access
to the VPN only:

  • Use Trusted Network Detection to Connect and Disconnect

  • Require VPN Connections Using Always On

  • Use Captive Portal Hotspot Detection and Remediation

Renegotiating
and Maintaining the AnyConnect Connection

You can limit how long the ASA keeps an AnyConnect VPN
connection available to the user even with no activity. If a VPN session goes
idle, you can terminate the connection or re-negotiate the connection.

  • Keepalive—The ASA sends keepalive messages at regular intervals.
    These messages are ignored by the ASA, but are useful in maintaining
    connections with devices between the client and the ASA.

    For instructions to configure Keepalive with the ASDM or CLI, see the
    Enable Keepalive section in the Cisco ASA Series VPN Configuration Guide.

  • Dead Peer Detection—The ASA and AnyConnect client send «R-U-There» messages. These messages are sent less frequently than
    IPsec’s keepalive messages. You can enable both the ASA (gateway) and the AnyConnect client to send DPD messages, and configure
    a timeout interval.

    • If the client does not respond to the ASA’s DPD messages, the ASA tries once more before putting the session into «Waiting
      to Resume» mode. This mode allows the user to roam networks, or enter sleep mode and later recover the connection. If the
      user does not reconnect before the idle timeout occurs, the ASA will terminate the tunnel. The recommended gateway DPD interval
      is 300 seconds.

    • If the ASA does not respond to the client’s DPD messages, the client tries again before terminating the tunnel. The recommended
      client DPD interval is 30 seconds.

      For instructions to configure DPD within the ASDM, refer to Configure Dead Peer
      Detection
      in the appropriate release of the Cisco ASA Series VPN Configuration
      Guide.

  • Best Practices:

    • Set Client DPD to 30 seconds (Group Policy > Advanced >
      AnyConnect Client > Dead Peer Detection).

    • Set Server DPD to 300 seconds (Group Policy > Advanced >
      AnyConnect Client > Dead Peer Detection).

    • Set Rekey, for both SSL and IPsec to 1 hour (Group Policy >
      Advanced > AnyConnect Client > Key Regeneration).

Terminating an
AnyConnect Connection

Terminating an AnyConnect connection requires the user to
re-authenticate their endpoint to the secure gateway and create a new VPN
connection.

The following connection parameters terminate the VPN session based on timeouts:

  • Maximum Connect Time—Sets the maximum user connection time in minutes. At the end of this time, the system terminates the
    connection. You can also allow unlimited connection time(default).

  • VPN Idle Timeout—Terminates any user’s session when the session is inactive for the specified time. If the VPN idle timeout
    is not configured, then the default idle timeout is used.

  • Default Idle Timeout—Terminates any user’s session when the session is inactive for the specified time. The default value
    is 30 minutes. The default is 1800 second.

See the Specify a VPN Session Idle Timeout for a Group Policy section in the
appropriate release of the Cisco ASA Series VPN Configuration Guide to set these
parameters.

Configure VPN Connection Servers

The AnyConnect VPN server list consists of host name and host
address pairs identifying the secure gateways that your VPN users will connect to.
The host name can be an alias, an FQDN, or an IP address.

The hosts added to the server list display in the Connect to
drop-down list in the AnyConnect GUI. The user can then select from the drop-down
list to initiate a VPN connection. The host at the top of the list is the default
server, and appears first in the GUI drop-down list. If the user selects an
alternate server from the list, the selected server becomes the new default server.

Once you add a server to the server list, you can view its
details and edit or delete the server entry. To add a server to the server list,
follow this procedure.

Procedure


Step 1

Open the VPN
Profile Editor and choose
Server
List
from the navigation pane.

Step 2

Click Add.

Step 3

Configure the server’s host name and address:

  1. Enter a Host
    Display Name
    , an alias used to refer to the host, an
    FQDN, or an IP address. Do not use «&» or «<» characters in the
    name. If you enter an FQDN or an IP address, you do not need to enter
    the FQDN or IP Address in the next step.

    If you enter an IP address, use the Public IPv4
    or the Global IPv6 address of the secure gateway. Use of the
    link-local secure gateway address is not supported.

  2. (Optional) Enter the host’s FQDN or IP Address if not entered in the
    Host Display Name.

  3. (Optional) Specify a User Group.

    AnyConnect uses the FQDN or IP Address in
    conjunction with User Group to form the Group URL.

Step 4

Enter the server to fall back to as the backup server in
the Backup Server List. Do not use
«&» or «<» characters in the name.

Note 

Conversely, the Backup Server tab on the Server menu is a global entry
for all connection entries. Any entries put in that Backup Server
location are overwritten with what is entered here for an individual
server list entry. This setting takes precedence and is the recommended
practice.

Step 5

(Optional) Add load balancing servers to the Load Balancing Server List. Do not use «&» or «<»
characters in the name.

If the host for this server list entry specifies a load
balancing cluster of security appliances, and the Always-On feature is enabled, add the load balancing devices in the cluster to this
list. If you do not, Always-On blocks access to the devices in the load balancing cluster.

Step 6

Specify the Primary
Protocol
for the client to use for this ASA:

  1. Choose SSL (default) or IPsec.

    If you specify IPsec, the User Group must be
    the exact name of the connection profile (tunnel group). For SSL,
    the user group is the group-url or group-alias of the connection
    profile.

  2. If you specify IPsec, select Standard Authentication Only to
    disable the default authentication method (proprietary AnyConnect EAP),
    and choose a method from the drop-down list.

    Note 

    Changing the authentication method from the
    proprietary AnyConnect EAP to a standards-based method disables
    the ability of the ASA to configure session timeout, idle
    timeout, disconnected timeout, split tunneling, split DNS, MSIE
    proxy configuration, and other features.

Step 7

(Optional) Configure SCEP for this server:

  1. Specify the URL of the SCEP CA server. Enter an
    FQDN or IP Address. For example, http://ca01.cisco.com.

  2. Check Prompt For
    Challenge PW
    to enable the user to make certificate
    requests manually. When the user clicks Get Certificate, the client prompts the user for a
    username and one-time password.

  3. Enter the certificate thumbprint of the CA. Use
    SHA1 or MD5 hashes. Your CA server administrator can provide the CA URL
    and thumbprint and should retrieve the thumbprint directly from the
    server and not from a “fingerprint” or “thumbprint” attribute field in a
    certificate it issued.

Step 8

Click OK.


Automatically Start Windows VPN Connections Before Logon

About Start Before
Logon

This feature called Start Before Logon (SBL) allows users to
establish their VPN connection to the enterprise infrastructure before logging
onto Windows.


Note

When using Start Before Logon (SBL) and HostScan, you must install the
AnyConnect/HostScan posture predeploy module on the endpoints to achieve full
HostScan functionality, since SBL is pre-login.


When SBL is installed and enabled, AnyConnect
starts before the Windows logon dialog box appears, ensuring users are
connected to their corporate infrastructure before logging on. After VPN
authentication, the Windows logon dialog appears, and the user logs in as
usual.

SBL also includes the Network Access Manager tile and allows connections using user configured home network profiles. Network
profiles allowed in SBL mode include all media types employing non-802.1X authentication modes, such as open WEP, WPA/WPA2
Personal, and static key (WEP) networks.

SBL is available on Windows systems only, and is implemented
using different mechanisms depending on the version of Windows:

  • On Windows, the Pre-Login Access Provider (PLAP) is used to
    implement AnyConnect SBL.

    With PLAP, the Ctrl+Alt+Del key combination opens a window where
    the user can choose either to log in to the system or activate Network
    Connections (PLAP components) using the Network Connect button in the
    lower-right corner of the window.

    PLAP supports 32-bit and 64-bit versions of the Windows.

Reasons you might consider enabling SBL for your users include:

  • The user’s computer is joined to an Active Directory
    infrastructure.

  • A user has network-mapped drives that require authentication
    with the Microsoft Active Directory infrastructure.

  • The user cannot have cached credentials on the computer (the
    group policy disallows cached credentials). In this scenario, users must be
    able to communicate with a domain controller on the corporate network for their
    credentials to be validated before gaining access to the computer.

  • The user must run logon scripts that execute from a network
    resource or need access to a network resource. With SBL enabled, the user has
    access to the local infrastructure and logon scripts that would normally run
    when a user is in the office. This includes domain logon scripts, group policy
    objects and other Active Directory functionality that normally occurs when
    users log on to their system.

  • Networking components (such as MS NAP/CS NAC) exist that might
    require connection to the infrastructure.

Limitations on Start
Before Logon

  • AnyConnect is not compatible with fast user switching.

  • AnyConnect cannot be started by third-party Start Before Logon
    applications.

  • Because SBL is pre-login and will not have access to the user store, you
    cannot do multiple certificate authentication (MCA) with it. MCA requires a
    machine certificate and a user certificate, or two user certificates.

Configure Start Before Logon

Procedure


Install the AnyConnect Start Before Logon Module

The AnyConnect installer detects the underlying operating
system and places the appropriate AnyConnect DLL from the AnyConnect SBL module in
the system directory. On Windows 7, or the Windows 2008 server, the installer
determines whether the 32-bit or 64-bit version of the operating system is in use
and installs the appropriate PLAP component, vpnplap.dll or vpnplap64.dll.


Note

If you uninstall AnyConnect while leaving the VPNGINA or
PLAP component installed, the VPNGINA or PLAP component is disabled and not
visible to the remote user.


You can predeploy the SBL module or configure the ASA to
download it. When predeploying AnyConnect, the Start Before Logon module requires
that the core client software is installed first. If you are predeploying AnyConnect
Core and the Start Before Logon components using MSI files, you must get the order
right.

Procedure

Step 1

In ASDM go to
.

Step 2

Select a group policy and click
Edit or
Add a new group policy.

Step 3

Select in the left navigation pane.

Step 4

Uncheck Inherit for the Optional Client Module for Download setting.

Step 5

Select the AnyConnect
SBL
module in the drop-down list.


Enable SBL in the AnyConnect Profile
Before you begin
  • SBL requires a network connection to be present at the
    time it is invoked. In some cases, this might not be possible, because a
    wireless connection might depend on credentials of the user to connect to
    the wireless infrastructure. Since SBL mode precedes the credential phase of
    a logon, a connection would not be available in this scenario. In this case,
    the wireless connection needs to be configured to cache the credentials
    across logon, or another wireless authentication needs to be configured, for
    SBL to work.

  • If the Network Access Manager is installed, you must
    deploy device connection to ensure that an appropriate connection is
    available.

Procedure

Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 1) from the navigation pane.

Step 2

Select Use Start Before
Logon
.

Step 3

(Optional) To give the remote user control over SBL,
select User Controllable.

Note 

The user must reboot the remote computer before SBL
takes effect.


Troubleshoot Start Before Logon

Procedure

Step 1

Ensure that the AnyConnect profile is loaded on the ASA,
ready to be deployed.

Step 2

Delete prior profiles (search for them on the hard drive
to find the location, *.xml).

Step 3

Using Windows Add/Remove Programs, uninstall the SBL
Components. Reboot the computer and retest.

Step 4

Clear the user’s AnyConnect log in the Event Viewer and
retest.

Step 5

Browse back to the security appliance to install
AnyConnect again.

Step 6

Reboot once. On the next reboot, you should be prompted
with the Start Before Logon prompt.

Step 7

Collect a DART bundle and send it to your AnyConnect
Administrator.

Step 8

If you see the following error, delete the user’s
AnyConnect profile:


Description: Unable to parse the profile C:Documents and SettingsAll UsersApplication Data
CiscoCisco AnyConnect Secure Mobility ClientProfileVABaseProfile.xml. Host data not available.
Step 9

Go back to the .tmpl file, save a copy as an.xml file,
and use that XML file as the default profile.


Automatically Start VPN Connections When AnyConnect Starts

This feature called Auto Connect On Start, automatically
establishes a VPN connection with the secure gateway specified by the VPN client
profile when AnyConnect starts.

Auto Connect On Start is disabled by default, requiring the
user to specify or select a secure gateway.

Procedure


Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 1) from the navigation pane.

Step 2

Select Auto Connect On
Start
.

Step 3

(Optional) To give the user control over Auto Connect on
Start, select User Controllable.


Configure Start
Before Logon (PLAP) on Windows Systems

The Start Before Logon (SBL) feature
starts a VPN connection before the user logs in to Windows. This ensures that
users connect to their corporate infrastructure before logging on to their
computers.

The SBL AnyConnect feature is known as the Pre-Login Access Provider
(PLAP), which is a connectable credential provider. This feature lets
programmatic network administrators perform specific tasks, such as collecting
credentials or connecting to network resources before logon. PLAP provides SBL
functions on all of the supported Windows operating systems. PLAP supports
32-bit and 64-bit versions of the operating system with vpnplap.dll and
vpnplap64.dll, respectively. The PLAP functions supports x86 and x64.

Automatically Restart VPN Connections

When Auto Reconnect is enabled (default), AnyConnect recovers
from VPN session disruptions and reestablishes a session, regardless of the media
used for the initial connection. For example, it can reestablish a session on wired,
wireless, or 3G. When Auto Reconnect is enabled, you also specify the reconnect
behavior upon system suspend or system resume. A system suspend is a low-power
standby, such as Windows “hibernation” or macOS or Linux “sleep.” A system resume is
a recovery following a system suspend.

If you disable Auto Reconnect, the client does not attempt to
reconnect regardless of the cause of the disconnection. Cisco highly recommends
using the default setting (enabled) for this feature. Disabling this setting can
cause interruptions in VPN connectivity over unstable connections.

Procedure


Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 1) from the navigation pane.

Step 2

Select Auto
Reconnect
.

Step 3

Choose the Auto Reconnect Behavior:

  • Disconnect On Suspend—(Default) AnyConnect
    releases the resources assigned to the VPN session upon a system
    suspend and does not attempt to reconnect after the system resume.

  • Reconnect After Resume—The client retains
    resources assigned to the VPN session during a system suspend and
    attempts to reconnect after the system resume.


Use Trusted Network Detection to Connect and Disconnect

About Trusted
Network Detection

Trusted Network Detection (TND) gives you the ability to have
AnyConnect automatically disconnect a VPN connection when the user is inside
the corporate network (the trusted network) and start the VPN connection when
the user is outside the corporate network (the untrusted network).

TND does not interfere with the ability of the user to manually
establish a VPN connection. It does not disconnect a VPN connection that the
user starts manually in the trusted network. TND only disconnects the VPN
session if the user first connects in an untrusted network and moves into a
trusted network. For example, TND disconnects the VPN session if the user makes
a VPN connection at home and then moves into the corporate office.

You configure TND in the AnyConnect VPN Client profile. No
changes are required to the ASA configuration. You need to specify the action
or policy AnyConnect takes when recognizing it is transitioning between trusted
and untrusted networks, and identify your trusted networks and servers.

Guidelines for
Trusted Network Detection

  • Because the TND feature controls the AnyConnect GUI and
    automatically starts connections, the GUI should run at all times. If the user
    exits the GUI, TND does not automatically start the VPN connection.

  • If AnyConnect is also running Start Before Logon (SBL), and the
    user moves into the trusted network, the SBL window displayed on the computer
    automatically closes.

  • Trusted Network Detection with or without
    Always-On
    configured is supported on IPv6 and IPv4 VPN connections to the ASA over IPv4
    and IPv6 networks.

  • Multiple profiles on a user computer may present problems if the
    TND configuration is different.

    If the user has received a TND-enabled profile in the past, upon
    system restart, AnyConnect attempts to connect to the security appliance it was
    last connected to, which may not be the behavior you desire. To connect to a
    different security appliance, they must manually disconnect and re-connect to
    that headend. The following workarounds will help you prevent this problem:

    • Enable TND in the client profiles loaded on all the ASAs on your
      corporate network.

    • Create one profile listing all the ASAs in the host entry
      section, and load that profile on all your ASAs.

    • If users do not need to have multiple, different profiles, use
      the same profile name for the profiles on all the ASAs. Each ASA overrides the
      existing profile.

Configure Trusted Network Detection

Procedure


Step 1

Open the VPN profile editor and choose Preferences (Part
2)
from the navigation pane.

Step 2

Select Automatic VPN Policy.

Step 3

Choose a Trusted Network
Policy.

This is the action the client takes when the user is inside the corporate
network (the trusted network). The options are:

  • Disconnect—(Default) The client terminates the
    VPN connection in the trusted network.

  • Connect—The client starts a VPN connection in
    the trusted network.

  • Do Nothing—The client takes no action in the
    trusted network. Setting both the Trusted Network Policy and
    Untrusted Network Policy to Do Nothing disables Trusted Network
    Detection (TND).

  • Pause—AnyConnect suspends the VPN session
    (instead of disconnecting it) if a user enters a network configured
    as trusted after establishing a VPN session outside the trusted
    network. When the user goes outside the trusted network again,
    AnyConnect resumes the session. This feature is for the user’s
    convenience because it eliminates the need to establish a new VPN
    session after leaving a trusted network.

Step 4

Choose an Untrusted Network
Policy
.

This is the action the client takes when the user is outside the corporate
network. The options are:

  • Connect—The client starts a VPN connection upon
    the detection of an untrusted network.

  • Do Nothing—The client takes no action upon
    detection of an untrusted network. This option disablesAlways-On VPN. Setting both the Trusted Network Policy and Untrusted
    Network Policy to Do
    Nothing
    disables Trusted Network Detection.

Step 5

Specify Trusted DNS Domains.

Specify the DNS suffixes (a string separated by commas) that a network
interface may have when the client is in the trusted network. You can assign
multiple DNS suffixes if you add them to the split-dns list and specify a
default domain on the ASA.

The AnyConnect client builds the DNS suffix list in the following order:

  • The domain passed by the head end.

  • The split-DNS suffix list passed by the head
    end.

  • The public interface’s DNS suffixes, if
    configured. If not, the primary and connection-specific suffixes,
    along with the parent suffixes of the primary DNS suffix (if the
    corresponding box is checked in the Advanced TCP/IP Settings).

    To Match This DNS Suffix:

    Use This Value for
    TrustedDNSDomains:

    example.com (only)

    *example.com

    example.com 
AND
    
anyconnect.example.com

    *.example.com 
OR
    
example.com, anyconnect.example.com

    asa.example.com 
AND
    
anyconnect.example.com

    *.example.com 
OR

    asa.example.com, anyconnect.example.com

Step 6

Specify Trusted DNS Servers.

All DNS server addresses (a string separated by commas) that a network
interface may have when the client is in the trusted network. For example:
203.0.113.1,2001:DB8::1. Wildcards (*) are supported for IPv4 and IPv6 DNS
server addresses.

You must have a DNS entry for the headend server that is resolvable via DNS.
If your connections are by IP address, you need a DNS server that can
resolve mus.cisco.com. If mus.cisco.com is not resolvable via DNS, captive
portal detection will not work as expected.

Note 

You can configure either TrustedDNSDomains, TrustedDNSServers, or both.
If you configure TrustedDNSServers, be sure to enter all your DNS
servers, so your site(s) will all be part of the Trusted Network.

An active interface will be considered as an In-Trusted-Network if it matches
all the rules in the VPN profile.

Step 7

Specify a host URL that you want to add as trusted. You must have a secure web
server that is accessible with a trusted certificate to be considered trusted.
After you click Add, the URL is added and the certificate
hash is pre-filled. If the hash is not found, an error message prompts the user
to enter the certificate hash manually and click
Set.

Note 

You can configure this parameter only when at least one of the
Trusted DNS Domains or Trusted DNS Servers is defined. If Trusted
DNS Domains or Trusted DNS Servers are not defined, this field is
disabled.


Require VPN
Connections Using
Always-On

About
Always-On VPN

Always-On operation prevents access to Internet
resources when the computer is not on a trusted network, unless a VPN session
is active. Enforcing the VPN to always be on in this situation protects the
computer from security threats.

When
Always-On is enabled, it establishes a VPN
session automatically after the user logs in and upon detection of an untrusted
network. The VPN session remains open until the user logs out of the computer,
or the session timer or idle session timer (specified in the ASA group policy)
expires. AnyConnect continually attempts to reestablish the connection to
reactivate the session if it is still open; otherwise, it continually attempts
to establish a new VPN session.

When
Always-On is enabled in the VPN Profile,
AnyConnect protects the endpoint by deleting all the other downloaded
AnyConnect profiles and ignores any public proxies configured to connect to the
ASA.

The following AnyConnect options also need to be considered when
enabling
Always-On:

  • Allowing the user to disconnect the Always-On VPN session: AnyConnect provides the ability for the user to disconnect Always-On VPN sessions. If you enable Allow VPN
    Disconnect
    , AnyConnect displays a Disconnect button upon
    the establishment of a VPN session. By default, the profile editor enables the
    Disconnect button when you enableAlways-On VPN.

    Pressing the disconnect button locks all interfaces to prevent data
    from leaking out and to protect the computer from internet access except for
    establishing a VPN session. Users of Always-On VPN sessions may want to click Disconnect so they can choose an alternative
    secure gateway due to performance issues with the current VPN session, or
    reconnection issues following the interruption of a VPN session.

  • Setting a connect failure policy: The connect failure policy determines
    whether the computer can access the internet if Always-On VPN is enabled and AnyConnect cannot establish a VPN session. See Set a Connect Failure Policy.

  • Handling captive portal hotspots: See Use Captive Portal Hotpost Detection and Remediation.

Limitations of
Always-On VPN

  • Always On is available only on Windows and macOS

  • If
    Always-On
    is enabled, but the user does not log on, AnyConnect does not establish the VPN
    connection. AnyConnect starts the VPN connection only post-login.

  • Always-On VPN does not support connecting though
    a proxy.

Guidelines for
Always-On VPN

To enhance protection against threats, we recommend the
following additional protective measures if you configure
Always-On VPN:

  • We strongly recommend purchasing a digital certificate from a
    certificate authority (CA) and enrolling it on the secure gateways. The ASDM
    provides an
    Enroll ASA SSL VPN with Entrust button on the
    Configuration > Remote Access VPN > Certificate Management
    > Identity Certificates
    panel to facilitate enrollment of a
    public certificate.

  • If you are using always-on VPN, external SAML IdP is not supported (however,
    with internal SAML IdP, the ASA proxies all traffic to IdP and is supported)

  • Predeploy a profile configured with Always-On to the endpoints to limit connectivity to the pre-defined ASAs. Predeployment prevents contact with a rogue server.

  • Restrict administrator rights so that users cannot terminate
    processes. A PC user with admin rights can bypass an
    Always-On policy by stopping the agent. If you
    want to ensure fully-secure
    Always-On, you must deny local admin rights to
    users.

  • Restrict access to the Cisco sub-folders on Windows computers,
    typically
    C:ProgramData.

  • Users with limited or standard privileges may sometimes have
    write access to their program data folders. They could use this access to
    delete the AnyConnect profile file and thereby circumvent the
    Always-On feature.

  • Predeploy a group policy object (GPO) for Windows users to prevent users with limited rights from terminating the GUI. Predeploy
    equivalent measures for macOS users.

Configure Always-On VPN

Procedure



Configure Always-On in the AnyConnect VPN Client Profile

Before you begin

Always-On VPN requires that a valid, trusted server certificate be configured on the ASA;
otherwise, it fails and logs an event indicating the certificate is invalid. In
addition, ensuring that the server certificate can pass Strict Certificate Trust
mode prevents the download of an Always-On VPN profile that locks a VPN connection to a rogue server.

Procedure

Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 2) from the navigation pane.

Step 2

Select Automatic VPN
Policy
.

Step 3

Configure Trusted Network Detection

Step 4

Select Always
On
.

Step 5

(Optional) Select or un-select Allow VPN Disconnect.

Step 6

(Optional) Configure a Connect Failure Policy.

Step 7

(Optional) Configure Captive Portal Remediation.


Add Load-Balancing Backup Cluster Members to the Server List

Always-On VPN affects the load balancing of AnyConnect VPN sessions. With Always-On VPN disabled, when the client connects to a primary device within a load
balancing cluster, the client complies with a redirection from the primary device to
any of the backup cluster members. With Always-On enabled, the client does not comply with a redirection from the primary device
unless the address of the backup cluster member is specified in the server list of
the client profile. Therefore, be sure to add any backup cluster members to the
server list.

To specify the addresses of backup cluster members in the
client profile, use ASDM to add a load-balancing backup server list by following
these steps:

Procedure

Step 1

Open the VPN
Profile Editor and choose
Server
List
from the navigation pane.

Step 2

Choose a server that is a primary device of a
load-balancing cluster and click Edit.

Step 3

Enter an FQDN or IP address of any load-balancing cluster
member.


Exempt Users from Always-On VPN

You can configure exemptions to override an Always-On policy. For example, you might want to let certain individuals establish VPN
sessions with other companies or exempt the Always-On policy for noncorporate assets.

Exemptions set in group policies and dynamic access policies on
the ASA override the Always-On policy. You specify exceptions according to the matching criteria used to assign
the policy. If an AnyConnect policy enables Always-On and a dynamic access policy or group policy disables it, the client retains the
disable setting for the current and future VPN sessions as long as its criteria
match the dynamic access policy or group policy on the establishment of each new
session.

This procedure configures a dynamic access policy that uses AAA
endpoint criteria to match sessions to noncorporate assets.

Procedure

Step 1

Choose Configuration > Remote
Access VPN
> Network
(Client) Access
> Dynamic
Access Policies
> Add or Edit.

Step 2

Configure criteria to exempt users from Always-On VPN. For example, use the Selection Criteria area to specify AAA attributes
to match user logon IDs.

Step 3

Click the AnyConnect tab on the bottom half of the Add or Edit Dynamic
Access Policy window.

Step 4

Click Disable next to “Always-On VPN for AnyConnect client.»


Set a Connect
Failure Policy for Always-On

About the Connect
Failure Policy

The connect failure policy determines whether the computer can
access the internet if
Always-On
VPN is enabled and AnyConnect cannot establish a VPN session. This can occur
when a secure gateway is unreachable, or when AnyConnect fails to detect the
presence of a captive portal hotspot.

An open policy permits full network access, letting users
continue to perform tasks where access to the Internet or other local network
resources is needed.

A closed policy disables all network connectivity until the VPN
session is established. AnyConnect does this by enabling packet filters that
block all traffic from the endpoint that is not bound for a secure gateway to
which the computer is allowed to connect.

Regardless of the connect failure policy, AnyConnect continues
to try to establish the VPN connection.

Guidelines for
Setting the Connect Failure Policy

Consider the following when using an open policy which permits
full network access:

  • Security and protection are not available until the VPN session
    is established; therefore, the endpoint device may get infected with web-based
    malware or sensitive data may leak.

  • An open connect failure policy does not apply if you enable the
    Disconnect button and the user clicks
    Disconnect.

Consider the following when using a closed policy which disables
all network connectivity until the VPN session is established:

  • A closed policy can halt productivity if users require Internet
    access outside the VPN.

  • The purpose of closed is to help protect corporate assets from
    network threats when resources in the private network that protect the endpoint
    are not available.The endpoint is protected from web-based malware and
    sensitive data leakage at all times because all network access is prevented
    except for local resources such as printers and tethered devices permitted by
    split tunneling.

  • This option is primarily for organizations where security
    persistence is a greater concern than always-available network access.

  • A closed policy prevents captive portal remediation unless you
    specifically enable it.

  • You can allow the application of the local resource rules
    imposed by the most recent VPN session if
    Apply Last VPN Local Resources is enabled in the
    client profile. For example, these rules could determine access to active sync
    and local printing.

  • The network is unblocked and open during an AnyConnect software
    upgrade when
    Always-On
    is enabled regardless of a closed policy.

  • If you deploy a closed connection policy, we highly recommend
    that you follow a phased approach. For example, first deploy
    Always-On
    with a connect failure open policy and survey users for the frequency with
    which AnyConnect does not connect seamlessly. Then deploy a small pilot
    deployment of a connect failure closed policy among early-adopter users and
    solicit their feedback. Expand the pilot program gradually while continuing to
    solicit feedback before considering a full deployment. As you deploy a connect
    failure closed policy, be sure to educate the VPN users about the network
    access limitation as well as the advantages of a connect failure closed policy.


    Caution

    A connect failure closed policy prevents network access if
    AnyConnect fails to establish a VPN session. Use extreme caution when
    implementing a connect failure closed policy.


Configure a Connect Failure Policy

You configure a Connect Failure Policy only when the Always-On feature is enabled. By default, the connect failure policy is closed, preventing
Internet access if the VPN is unreachable. To allow Internet access in this
situation the connect failure policy must be set to open.

Procedure

Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 2) from the navigation pane.

Step 2

Set the Connect Failure
Policy
parameter to one of the following settings:

  • Closed—(Default) Restricts network access when
    the secure gateway is unreachable.

  • Open—Permits network access by browsers and
    other applications when the client cannot connect to the secure
    gateway.

Step 3

If you specified a closed policy:

  1. Configure Captive Portal Remediation.

  2. Select Apply
    Last VPN Local Resources
    if you would like to retain the
    last VPN session’s local device rules while network access is disabled.


Use Captive Portal
Hotspot Detection and Remediation

About Captive
Portals

Many facilities that offer Wi-Fi and wired access, such as
airports, coffee shops, and hotels, require the user to pay before obtaining
access, to agree to abide by an acceptable use policy, or both. These
facilities use a technique called captive portal to prevent applications from
connecting until the user opens a browser and accepts the conditions for
access. Captive portal detection is the recognition of this restriction, and
captive portal remediation is the process of satisfying the requirements of a
captive portal hotspot in order to obtain network access.

Captive portals are detected automatically by AnyConnect when
initiating a VPN connection requiring no additional configuration. Also,
AnyConnect does not modify any browser configuration settings during captive
portal detection and does not automatically remediate the captive portal. It
relies on the end user to perform the remediation. AnyConnect reacts to the
detection of a captive portal depending on the current configuration:

  • If
    Always-On
    is disabled, or if
    Always-On
    is enabled and the Connect Failure Policy is open, the following message is
    displayed on each connection attempt:

    
    The service provider in your current location is restricting access to the Internet. You need to log on with the service provider before you can establish a VPN session. You can try this by visiting any website with your browser.
    

    The end user must perform captive portal remediation by meeting
    the requirements of the provider of the hotspot. These requirements could be
    paying a fee to access the network, signing an acceptable use policy, both, or
    some other requirement defined by the provider.

  • If
    Always-On
    is enabled and the connect failure policy is closed, captive portal remediation
    needs to be explicitly enabled. If enabled, the end user can perform
    remediation as described above. If disabled, the following message is displayed
    upon each connection attempt, and the VPN cannot be connected.

    
    The service provider in your current location is restricting access to the Internet. The AnyConnect protection settings must be lowered for you to log on with the service provider. Your current enterprise security policy does not allow this.
    

Configure Captive Portal Remediation

You configure captive portal remediation only when the Always-On feature is enabled and the Connect Failure Policy is set to closed. In this
situation, configuring captive portal remediation allows AnyConnect to connect to
the VPN when a captive portal is preventing it from doing so.

If the Connect Failure Policy is set to open or Always-On is not enabled, your users are not restricted from network access and are capable
of remediating a captive portal without any specific configuration in the AnyConnect
VPN client profile.

By default, captive portal remediation is disabled on platforms
supporting Always on (Windows and macOS) to provide the greatest security.
AnyConnect does not provide data leakage protection capabilities during the captive
portal remediation phase. If data loss protection is desired, you should employ a
relevant endpoint security product.

Procedure


Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 1) from the navigation pane.

Step 2

Select Allow Captive
Portal Remediation
.

This setting lifts the network access restrictions
imposed by the closed connect failure policy.

Step 3

Specify the Remediation Timeout.

Enter the number of minutes for which AnyConnect lifts
the network access restrictions. The user needs enough time to satisfy the
captive portal requirements.


Troubleshoot Captive
Portal Detection and Remediation

AnyConnect can falsely assume that it is in a captive portal in
the following situations.

  • If AnyConnect attempts to contact an ASA with a certificate
    containing an incorrect server name (CN), then the AnyConnect client will think
    it is in a “captive portal” environment.

    To prevent this, make sure the ASA certificate is properly
    configured. The CN value in the certificate must match the name of the ASA
    server in the VPN client profile.

  • If there is another device on the network before the ASA, and
    that device responds to the client’s attempt to contact an ASA by blocking
    HTTPS access to the ASA, then the AnyConnect client will think it is in a
    “captive portal” environment. This situation can occur when a user is on an
    internal network, and connects through a firewall to connect to the ASA.

    If you need to restrict access to the ASA from inside the corporation,
    configure your firewall such that HTTP and HTTPS traffic  to the ASA’s
    address does not return an HTTP status. HTTP/HTTPS access to the ASA should
    either be allowed or completely blocked to ensure that HTTP/HTTPS requests
    sent to the ASA will not return an unexpected response.

If users cannot access a captive portal remediation page, ask
them to try the following:

  • Terminate any applications that use HTTP, such as instant
    messaging programs, e-mail clients, IP phone clients, and all but one browser
    to perform the remediation.

    The captive portal may be actively inhibiting DoS attacks by
    ignoring repetitive attempts to connect, causing them to time out on the client
    end. The attempt by many applications to make HTTP connections exacerbates this
    problem.

  • Disable and re-enable the network interface. This action
    triggers a captive portal detection retry.

  • Restart the computer.

Configure AnyConnect over L2TP or PPTP

ISPs in some countries require support of the Layer 2 Tunneling
Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP).

To send traffic destined for the secure gateway over a
Point-to-Point Protocol (PPP) connection, AnyConnect uses the point-to-point adapter
generated by the external tunnel. When establishing a VPN tunnel over a PPP
connection, the client must exclude traffic destined for the ASA from the tunneled
traffic intended for destinations beyond the ASA. To specify whether and how to
determine the exclusion route, use the PPP Exclusion setting in the AnyConnect
profile. The exclusion route appears as a non-secured route in the Route Details
display of the AnyConnect GUI.

Procedure


Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 2) from the navigation pane.

Step 2

Choose a PPP
Exclusion
method. Also, check User Controllable for this field to let users view and change
this setting:

  • Automatic—Enables PPP exclusion. AnyConnect automatically determines
    the IP address of the PPP server.

  • Override—Enables PPP Exclusion using a predefined server IP address
    specified in the PPP Exclusion Server IP field. The PPP
    Exclusion Server IP
    field is only applicable to this
    Override method and should only be used when the Automatic options
    fails to detect the IP address of the PPP server.

    Checking User Controllable for the PPP Exclusion Server IP field
    allows the end user to manually update the IP address via the
    preferences.xml file. Refer to the Instruct Users to Override PPP Exclusion section.

  • Disabled—PPP exclusion is not applied.


Instruct Users to Override PPP Exclusion

If automatic detection does not work and you configured the PPP
Exclusion fields as user controllable, the user can override the setting by editing
the AnyConnect preferences file on the local computer.

Procedure


Step 1

Use an editor such as Notepad to open the preferences XML
file.

This file is at one of the following paths on the
user’s computer:

  • Windows: %LOCAL_APPDATA%CiscoCisco AnyConnect
    Secure Mobility Clientpreferences.xml. For example,

  • macOS: /Users/username/.anyconnect

  • Linux: /home/username/.anyconnect

Step 2

Insert the PPPExclusion details under <ControllablePreferences>, while
specifying the Override value and the IP address of the PPP server. The address
must be a well-formed IPv4 address. For example:


<AnyConnectPreferences>
<ControllablePreferences>
<PPPExclusion>Override
<PPPExclusionServerIP>192.168.22.44</PPPExclusionServerIP></PPPExclusion>
</ControllablePreferences>
</AnyConnectPreferences>
Step 3

Save the file.

Step 4

Exit and restart AnyConnect.


Configure AnyConnect Proxy Connections

About AnyConnect
Proxy Connections

AnyConnect supports VPN sessions through Local, Public, and
Private proxies:

  • Local Proxy Connections:

    A local proxy runs on the same PC as AnyConnect, and is
    sometimes used as a transparent proxy. Some examples of a transparent proxy
    service include acceleration software provided by some wireless data cards, or
    a network component on some antivirus software, such as Kaspersky.

    The use of a local proxy is enabled or disabled in the
    AnyConnect VPN client profile, see
    Allow
    a Local Proxy Connection.

  • Public Proxy Connections:

    Public proxies are usually used to anonymize web traffic. When Windows is configured to use a public proxy, AnyConnect uses
    that connection. Public proxy is supported on macOS and Linux for both native and override.

  • Private Proxy Connections:

    Private proxy servers are used on a corporate network to prevent
    corporate users from accessing certain Web sites based on corporate usage
    policies, for example, pornography, gambling, or gaming sites.

    You configure a group policy to download private proxy settings to the browser after the tunnel is established. The settings
    return to their original state after the VPN session ends. See Configure a Private Proxy Connection.


    Note

    AnyConnect SBL
    connections through a proxy server are dependent on the Windows operating
    system version and system (machine) configuration or other third-party proxy
    software capabilities; therefore, refer to system wide proxy settings as
    provided by Microsoft or whatever third-party proxy application you use.


Control Client
Proxy with VPN Client Profile

The VPN Client
profile can block or redirect the client system’s proxy connection. For Windows
and Linux, you can configure, or you can allow the user to configure, the
address of a public proxy server.

For more information about configuring the proxy settings in the VPN client profile, see AnyConnect Profile Editor, Preferences (Part 2).

Proxy
Auto-Configuration File Generation for Clientless Support

Some versions of the
ASA require AnyConnect configuration to support clientless portal access
through a proxy server after establishing an AnyConnect session. AnyConnect
uses a proxy auto-configuration (PAC) file to modify the client-side proxy
settings to let this occur. AnyConnect generates this file only if the ASA does
not specify private-side proxy settings.

Requirements for
AnyConnect Proxy Connections

OS support of proxy connections varies as shown:

Proxy Connection Type

Windows

macOS

Linux

Local Proxy

Yes

Yes (Override)

Yes

Private Proxy

Yes (on Internet Explorer)

Yes (set as system proxy settings)

No

Public Proxy

Yes (IE and Override)

Yes (Override)

Limitations on Proxy
Connections

  • IPv6 proxies are not supported for any type of proxy
    connection.

  • Connecting through a proxy is not supported with the
    Always-On feature enabled.

  • A VPN client profile is required to allow access to a local proxy.

Allow a Local Proxy Connection

Procedure


Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 2) from the navigation pane.

Step 2

Select (default) or unselect Allow Local Proxy Connections. Local proxy
is disabled by default.


Configure a Private Proxy Connection

Procedure


Step 1

Configure the private proxy information in the ASA group
policy. See the Configuring a Browser Proxy for an Internal Group
Policy section in the Cisco ASA Series VPN Configuration
Guide
.

Note 

In a macOS environment, the proxy information that
is pushed down from the ASA (upon a VPN connection) is not viewed in the
browser until you open up a terminal and issue a scutil
--proxy
.

Step 2

(Optional) Configure the Client to Ignore Browser Proxy
Settings.

Step 3

(Optional) Lockdown the Internet Explorer Connections Tab.


Configure the Client to Ignore Browser Proxy Settings

You can specify a policy in the AnyConnect profile to bypass
the Microsoft Internet Explorer or Safari proxy configuration settings on the user’s
PC. This prevents the user from establishing a tunnel from outside the corporate
network, and prevents AnyConnect from connecting through an undesirable or
illegitimate proxy server.

Procedure

Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 2) from the navigation pane.

Step 2

In the Proxy Settings drop-down list, choose IgnoreProxy. Ignore Proxy causes the
client to ignore all proxy settings. No action is taken against proxies that are
downloaded from the ASA.


Lock Down the Internet Explorer Connections Tab

Under certain conditions, AnyConnect hides the Internet
Explorer Tools > Internet Options > Connections tab. When exposed, this tab
lets the user set proxy information. Hiding this tab prevents the user from
intentionally or unintentionally circumventing the tunnel. The tab lockdown is
reversed on disconnect, and it is superseded by any administrator-defined policies
applied to that tab. The conditions under which this lock down occurs are the
following:

  • The ASA configuration specifies Connections tab
    lockdown.

  • The ASA configuration specifies a private-side proxy.

  • A Windows group policy previously locked down the
    Connections tab (overriding the no lockdown ASA group policy setting).

You can configure the ASA to allow or not allow proxy lockdown,
in the group policy. To do this using ASDM, follow this procedure:

Procedure

Step 1

In ASDM go to
.

Step 2

Select a group policy and click
Edit or
Add a new group policy.

Step 3

In the navigation pane, go to . The Proxy Server Policy pane displays.

Step 4

Click Proxy
Lockdown
to display more proxy settings.

Step 5

Uncheck Inherit and select Yes to enable proxy lockdown and hide the Internet Explorer
Connections tab for the duration of the AnyConnect session or; select No to disable proxy lockdown and expose
the Internet Explorer Connections tab for the duration of the AnyConnect
session.

Step 6

Click OK to
save the Proxy Server Policy changes.

Step 7

Click Apply
to save the Group Policy changes.


Verify the Proxy
Settings

  • For Windows: Find the proxy settings in the registry under:

    
    HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings

    
  • For macOS: Open a terminal window, and type:

    
    scutil --proxy
    

Select and Exclude VPN Traffic

Configure IPv4 or IPv6 Traffic to Bypass the VPN

You can configure how the AnyConnect client manages IPv4
traffic when the ASA is expecting only IPv6 traffic or how AnyConnect manages IPv6
traffic when the ASA is only expecting IPv4 traffic using the Client Bypass Protocol
setting.

When the AnyConnect client makes a VPN connection to the ASA,
the ASA can assign the client an IPv4, IPv6, or both an IPv4 and IPv6 address.

If Client Bypass Protocol is enabled for an IP protocol and an
address pool is not configured for that protocol (in other words, no IP address for
that protocol was assigned to client by the ASA), any IP traffic using that protocol
will not be sent through the VPN tunnel. It will be sent outside the tunnel.

If Client Bypass Protocol is disabled, and an address pool is
not configured for that protocol, the client drops all traffic for that IP protocol
once the VPN tunnel is established.

For example, assume that the ASA assigns only an IPv4 address
to an AnyConnect connection and the endpoint is dual stacked. When the endpoint
attempts to reach an IPv6 address, if Client Bypass Protocol is disabled, the IPv6
traffic is dropped. If Client Bypass Protocol is enabled, the IPv6 traffic is sent
from the client in the clear.

If establishing an IPsec tunnel (as opposed to an SSL connection), the ASA is not
notified whether or not IPv6 is enabled on the client, so ASA always pushes down the
client bypass protocol setting.

You configure the Client Bypass Protocol on the ASA in the
group policies.

Procedure


Step 1

In ASDM go to
.

Step 2

Select a group policy and click
Edit or
Add a new group policy.

Step 3

Select .

Step 4

Next to Client Bypass
Protocol
, uncheck Inherit if this is a group policy other than the default group
policy.

Step 5

Choose one of these options:

  • Click Disable to drop IP traffic for which the ASA did
    not assign an address.

  • Click Enable to send that IP traffic in the clear.

Step 6

Click OK.

Step 7

Click Apply.


Configure a Client
Firewall with Local Printer and Tethered Device Support

See the Client Firewall with Local Printer and Tethered Device Support section in the Cisco ASA Series Configuration Guide.

Split DNS

When split DNS is configured in the
Network (Client) Access group policy, AnyConnect tunnels specific DNS queries to the
private DNS server (also configured in the group policy). All other DNS queries go to
the DNS resolver on the client operating system, in the clear, for DNS resolution. If
split DNS is not configured, AnyConnect tunnels all DNS queries.

If split DNS is not configured, AnyConnect tunnels all DNS queries.

Requirements for
Split DNS

Split DNS supports
standard and update queries (including A, AAAA, NS, TXT, MX, SOA, ANY, SRV, PTR, and
CNAME). PTR queries matching any of the tunneled networks are allowed through the
tunnel.

Split DNS is supported on Windows and macOS platforms.

  • Limited support is available on Linux, namely only tunneled DNS requests
    are subject to the split DNS policy. Consequently, some DNS requests
    sent outside the tunnel may not comply with the split DNS policy.

For macOS, AnyConnect can use true split-DNS for a certain IP
protocol only if one of the following conditions is met:

  • Split-DNS is configured for one IP protocol (such as
    IPv4), and Client Bypass Protocol is configured for the other IP protocol
    (such as IPv6) in the group policy (with no address pool configured for the
    latter IP protocol).

  • Split-DNS is configured for both IP protocols.

Configure Split DNS for Split Include Tunneling

To configure split DNS for split include tunneling in the group policy,
do the following:

Procedure

Step 1

Configure at least one DNS server.

See the Configure Server Attributes for an Internal
Group Policy
section in the Cisco ASA Series VPN Configuration Guide.

Ensure the private DNS servers specified do not overlap with the DNS
servers configured for the client platform. If they do, name resolution may
not function properly.

Step 2

Configure split-include tunneling:

On the Configuration
> Remote Access VPN > Network (Client) Access > Group Policies
> Advanced > Split Tunneling
pane, choose the
Tunnel Network List Below
policy, and specify a Network
List
of addresses to be tunneled.

Split-DNS does not support the
Exclude Network List Below split-tunneling policy. You must use the Tunnel
Network List Below split-tunneling policy to configure split-DNS.

Step 3

On the Configuration > Remote Access VPN
> Network (Client) Access > Group Policies > Advanced > Split
Tunneling
pane, uncheck Send
All DNS lookups through tunnel
, and specify the names of the
domains whose queries will be tunneled in DNS
Names
.


What to do next

After making changes to the group policy in ASDM, be sure the
group policy is associated with a Connection Profile in Configuration > Remote Access VPN > Network (Client)
Access > AnyConnect Connection Profiles > Add/Edit > Group
Policy
.

Verify Split DNS Using AnyConnect Logs

Check Which Domains Use Split DNS

You can use any tool or application that relies on the
operating system’s DNS resolver for domain name resolution. For example, you can use
a ping or web browser to test the split DNS solution. Other tools such as nslookup
or dig circumvent the OS DNS resolver.

To use the client to check which domains are used for split
DNS, follow these steps:

Procedure

Step 1

Run
ipconfig/all
and record the domains listed next to DNS Suffix
Search List.

Step 2

Establish a VPN connection and again check the domains
listed next to DNS Suffix Search List.

Those extra domains added after establishing the tunnel
are the domains used for split DNS.

Note 

This process assumes that the domains pushed from
the ASA do not overlap with the ones already configured on the client
host.


Manage VPN Authentication

Important Security
Considerations

We do not recommend using a self-signed certificate on your secure
gateway

  • because of the possibility that a user could inadvertently configure a
    browser to trust a certificate on a rogue server, and

  • because of the inconvenience to users of having to respond to a security
    warning when connecting to your secure gateway.

We strongly recommend that you enable Strict Certificate Trust for the AnyConnect client. To
configure Strict Certificate Trust, see the Local Policy
Parameters and Values
section: Local Policy Preferences.

Configure Server Certificate Handling

Server Certificate
Verification

  • The AnyConnect
    client does not support certificate verification using certificate revocation
    lists (CRL).

    Many sites
    position the Certificate Authority  they use to validate server certificates
    inside the corporate network. That means that a client cannot verify CRL when
    it is trying to connect to a headend, since the CRL is not accessible on the
    public network. The client operating system can be configured to verify CRL in
    Windows and Mac OS X, but we ignore that setting.

  • (Windows only) For both SSL and IPsec VPN connections, you have the
    option to perform Certificate Revocation List (CRL) checking. When enabled in
    the profile editor, AnyConnect retrieves the updated CRL for all certificates
    in the chain. It then verifies whether the certificate in question is among
    those revoked certificates which should no longer be trusted; and if found to
    be a certificate revoked by the Certificate Authority, it does not connect.
    Refer to
    Local Policy Preferences
    for further information.

  • When a user connects to an ASA that is configured with a server
    certificate, the checkbox to trust and import that certificate will still
    display, even if there is a problem with the trust chain (Root, Intermediate,
    etc.) If there are any other certificate problems, that checkbox will not
    display.

  • SSL connections being performed via FQDN do not make a secondary
    server certificate verification with the FQDN’s resolved IP address for name
    verification if the initial verification using the FQDN fails.

  • IPsec and SSL connections require that if a server
    certificate contains Key Usage, the attributes must contain DigitalSignature AND
    (KeyAgreement OR KeyEncipherment). If the server certificate contains an EKU,
    the attributes must contain serverAuth (for SSL and IPsec) or ikeIntermediate
    (for IPsec only). Note that server certificates are not required to have a KU or
    an EKU to be accepted.

  • IPsec and SSL connections perform name verification on server certificates. The following rules are applied for the purposes
    of IPsec and SSL name verification:

    • If a Subject Alternative Name extension is present with relevant
      attributes, name verification is performed solely against the Subject
      Alternative Name. Relevant attributes include DNS Name attributes for all
      certificates, and additionally include IP address attributes if the connection
      is being performed to an IP address.

    • If a Subject Alternative Name extension is not present, or is
      present but contains no relevant attributes, name verification is performed
      against any Common Name attributes found in the Subject of the certificate.

    • If a certificate uses a wildcard for the purposes of name
      verification, the wildcard must be in the first (left-most) subdomain only, and
      additionally must be the last (right-most) character in the subdomain. Any
      wildcard entry not in compliance is ignored for the purposes of name
      verification.

  • For OSX, expired certificates are displayed only when  Keychain
    Access is configured to “Show Expired Certificates.” Expired certificates are
    hidden by default, which may confuse users.

Invalid Server
Certificate Handling

In response to the increase of targeted attacks against mobile
users on untrusted networks, we have improved the security protections in the
client to help prevent serious security breaches. The default client behavior
has been changed to provide an extra layer of defense against Man-in-the-middle
attacks.

User
Interaction

When the user tries to connect to a secure gateway, and there is
a certificate error (due to expired, invalid date, wrong key usage, or CN
mismatch), the user sees a red-colored dialog with Change Settings and Keep Me
Safe buttons.


Note

The dialogs for Linux may look different from the ones shown in
this document.


  • Clicking
    Keep Me Safe cancels the connection.

  • Clicking
    Change Settings opens AnyConnect’s Advanced > VPN
    >Preferences dialog, where the user can enable connections to untrusted
    servers. The current connection attempt is canceled.

If the user un-checks
Block
connections to untrusted servers
, and the only issue with the
certificate is that the CA is untrusted, then the next time the user attempts
to connect to this secure gateway, the user will not see the Certificate
Blocked Error Dialog dialog; they only see the following dialog:

If the user checks
Always trust this VPN server and import the certificate,
then future connections to this secure gateway will not prompt the user to
continue.


Note

If the user checks Block connections to
untrusted servers
in AnyConnect Advanced
> VPN > Preferences
, or if the user’s configuration meets one
of the conditions in the list of the modes described under the guidelines
and limitations section, then AnyConnect rejects invalid server certificates
and connections to untrusted servers, regardless of whether the Strict
Certificate Trust option in the Profile Editor is enabled.


Improved
Security Behavior

When the client accepts an invalid server certificate, that
certificate is saved in the client’s certificate store. Previously, only the
thumbprint of the certificate was saved. Note that invalid certificates are
saved only when the user has elected to always trust and import invalid server
certificates.

There is no administrative override to make the end user less
secure automatically. To completely remove the preceding security decisions
from your end users, enable
Strict Certificate Trust in the user’s local policy file.
When Strict Certificate Trust is enabled, the user sees an error message, and
the connection fails; there is no user prompt.

For information about enabling Strict Certificate Trust in the
local policy file, see the
AnyConnect
Local Policy Parameters and Values
section:
Local Policy Preferences.

Guidelines and
Limitations

Invalid server certificates are rejected when:

  • Always On is enabled in the AnyConnect VPN client profile and is
    not turned off by an applied group policy or DAP.

  • The client has a Local Policy with Strict Certificate Trust
    enabled.

  • AnyConnect is configured to start before logon.

  • A client certificate from the machine certificate store is used
    for authentication.

Configure Certificate-Only Authentication

You can specify whether you want users to authenticate using
AAA with a username and password or using a digital certificate (or both). When you
configure certificate-only authentication, users can connect with a digital
certificate and are not required to provide a user ID and password.

To support certificate-only authentication in an environment
where multiple groups are used, you may provision more than one group-url. Each
group-url would contain a different client profile with some piece of customized
data that would allow for a group-specific certificate map to be created. For
example, the Department_OU value of Engineering could be provisioned on the ASA to
place the user in this group when the certificate from this process is presented to
the ASA.


Note

The certificate used to authenticate the client to the
secure gateway must be valid and trusted (signed by a CA). A self-signed client
certificate will not be accepted.


Procedure


Step 1

Go to . Select a connection profile and click Edit. The Edit AnyConnect
Connection Profile window opens.

Step 2

If it is not already, click the Basic node of the navigation tree on the
left pane of the window. In the right pane of the window, in the Authentication area, enable the method
Certificate.

Step 3

Click OK and
apply your changes.


Configure
Certificate Enrollment

The
Cisco AnyConnect Secure
Mobility Client

uses the Simple Certificate Enrollment Protocol (SCEP) to provision and renew a
certificate as part of client authentication. Certificate enrollment using SCEP
is supported by AnyConnect IPsec and SSL VPN connections to the ASA in the
following ways:

  • SCEP Proxy: The ASA acts as a proxy for SCEP requests and
    responses between the client and the Certificate Authority (CA).

    • The CA must be accessible to the ASA, not the AnyConnect client,
      since the client does not access the CA directly.

    • Enrollment is always initiated automatically by the client. No
      user involvement is necessary.

  • Legacy SCEP: The AnyConnect client communicates with the CA directly to enroll and obtain a certificate.

    • The CA must be accessible to the AnyConnect client, not the ASA, through an established VPN tunnel or directly on the same
      network the client is on.

    • Enrollment is initiated automatically by the client and may be initiated manually by the user if configured.

SCEP Proxy
Enrollment and Operation

The following steps describe how a certificate is obtained and a
certificate-based connection is made when AnyConnect and the ASA are configured
for SCEP Proxy.

  1. The user connects to the ASA headend using a connection profile
    configured for both certificate and AAA authentication. The ASA requests a
    certificate and AAA credentials for authentication from the client.

  2. The user enters his/her AAA credentials, but a valid certificate
    is not available. This situation triggers the client to send an automatic SCEP
    enrollment request after the tunnel has been established using the entered AAA
    credentials.

  3. The ASA forwards the enrollment request to the CA and returns
    the CA’s response to the client.

  4. If SCEP enrollment is successful, the client presents a
    (configurable) message to the user and disconnects the current session. The
    user can now connect using certificate authentication to an ASA tunnel group.

    If SCEP enrollment fails, the client displays a (configurable)
    message to the user and disconnects the current session. The user should
    contact his/her administrator.

Other SCEP Proxy operational considerations:

  • If configured to do so, the client automatically renews the
    certificate before it expires, without user intervention.

  • SCEP Proxy enollment uses SSL for both SSL and IPsec tunnel
    certificate authentication.

Legacy SCEP
Enrollment and Operation

The following steps describe how a certificate is obtained and a
certificate-based connection is made when AnyConnect is configured for Legacy
SCEP.

  1. When the user initiates a connection to the ASA headend using a
    tunnel group configured for certificate authentication, the ASA requests a
    certificate for authentication from the client.

  2. A valid certificate is not available on the client. The
    connection cannot be established. This certificate failure indicates that SCEP
    enrollment needs to occur.

  3. The user must then initiate a connection to the ASA headend
    using a tunnel group configured for AAA authentication only whose address
    matches the Automatic SCEP Host configured in the client profile. The ASA
    requests the AAA credentials from the client.

  4. The client presents a dialog box for the user to enter AAA
    credentials.

    If the client is configured for manual enrollment and the client
    knows it needs to initiate SCEP enrollment (see Step 2), a
    Get Certificate button displays on the credentials
    dialog box. If the client has direct access to the CA on his/her network, the
    user will be able to manually obtain a certificate by clicking this button at
    this time.


    Note

    If access to the CA relies on the VPN tunnel being established,
    manual enrollment cannot be done at this time because there is currently no VPN
    tunnel established (AAA credentials have not been entered).


  5. The user enters AAA credentials and establishes a VPN
    connection.

  6. The client knows it needs to initiate SCEP enrollment (see Step
    2). It initiates an enrollment request to the CA through the established VPN
    tunnel, and a response is received from the CA.

  7. If SCEP enrollment is successful, the client presents a
    (configurable) message to the user and disconnects the current session. The
    user can now connect using certificate authentication to an ASA tunnel group.

    If SCEP enrollment fails, the client displays a (configurable)
    message to the user and disconnects the current session. The user should
    contact his/her administrator.

Other Legacy SCEP operational considerations:

  • If the client is configured for manual enrollment and the
    Certificate Expiration Threshold value is met, a
    Get Certificate button displays on a presented
    tunnel group selection dialog box. Users can manually renew their certificate
    by clicking this button.

  • If the certificate expires and the client no longer has a valid
    certificate, the client repeats the Legacy SCEP enrollment process.

Certificate
Authority Requirements

  • All SCEP-compliant CAs, including IOS CS, Windows Server 2003
    CA, and Windows Server 2008 CA, are supported.

  • The CA must be in auto-grant mode; polling for certificates is
    not supported.

  • You can configure some CAs to email users an enrollment password for an additional layer of security. The CA password is the
    challenge password or token that is sent to the certificate authority to identify the user. The password can then be configured
    in the AnyConnect client profile, which becomes part of SCEP request that the CA verifies before granting the certificate.

Guidelines for Certificate Enrollment

  • Clientless (browser-based) VPN access to the ASA does not support SCEP proxy, but WebLaunch (clientless-initiated AnyConnect)
    does.

  • ASA Load balancing is supported with SCEP enrollment.

  • The ASA does not indicate why an enrollment failed, although it does log the requests received from the client. Connection
    problems must be debugged on the CA or the client.

  • Certificate-Only Authentication and Certificate Mapping on the ASA:

    To support certificate-only authentication in an environment where multiple groups are used, you may provision more than one
    group-url. Each group-url would contain a different client profile with some piece of customized data that would allow for
    a group-specific certificate map to be created. For example, the Department_OU value of Engineering could be provisioned on
    the ASA to place the user in this tunnel group when the certificate from this process is presented to the ASA.

  • Identifying Enrollment Connections to Apply Policies:

    On the ASA, the aaa.cisco.sceprequired attribute can be used to catch the enrollment connections and apply the appropriate
    policies in the selected DAP record.

  • Windows Certificate Warning:

    When Windows clients first attempt to retrieve a certificate from a certificate authority they may see a warning. When prompted,
    users must click Yes. This allows them to import the root certificate. It does not affect their ability to connect with the
    client certificate.

Configure SCEP Proxy Certificate Enrollment

Configure a VPN Client Profile for SCEP Proxy Enrollment

Procedure

Step 1

Open the VPN
Profile Editor and choose
Certificate Enrollment from the navigation pane.

Step 2

Select Certificate
Enrollment
.

Step 3

Configure the Certificate Contents to be requested in the enrollment
certificate. For definitions of the certificate fields, see AnyConnect Profile Editor, Certificate Enrollment
.

Note 
  • If you use %machineid%, then Hostscan/Posture must be loaded for
    the desktop client.

  • For mobile clients, at least one
    certificate field must be specified.


Configure the ASA to Support SCEP Proxy Enrollment

For SCEP Proxy, a single ASA connection profile supports
certificate enrollment and the certificate authorized VPN connection.

Procedure

Step 1

Create a group policy, for example, cert_group. Set the
following fields:

  • On General, enter the URL to the CA in
    SCEP Forwarding
    URL
    .

  • On the Advanced > AnyConnect Client pane,
    uncheck Inherit for
    Client Profiles to Download and specify the client profile
    configured for SCEP Proxy. For example, specify the
    ac_vpn_scep_proxy client profile.

Step 2

Create a connection profile for certificate enrollment
and certificate authorized connection, for example, cert_tunnel.

  • Authentication: Both (AAA and Certificate).

  • Default Group Policy: cert_group.

  • On Advanced > General, check Enable SCEP Enrollment for this Connction
    Profile
    .

  • On Advanced > GroupAlias/Group URL, create a
    Group URL containing the group (cert_group) for this connection
    profile.


Configure Legacy SCEP Certificate Enrollment

Configure a VPN Client Profile for Legacy SCEP Enrollment

Procedure

Step 1

Open the VPN
Profile Editor and choose
Certificate Enrollment from the navigation pane.

Step 2

Select Certificate
Enrollment.

Step 3

Specify an Automatic
SCEP Host
to direct the client to retrieve the certificate.

Enter the FQDN or IP address, and the alias of the
connection profile (tunnel group) that is configured for SCEP certificate
retrieval. For example, if asa.cisco.com
is the host name of the ASA and scep_eng is the alias of the connection profile, enter
asa.cisco.com/scep-eng.

When the user initiates the connection, the address
chosen or specified must match this value exactly for Legacy SCEP enrollment
to succeed. For example, if this field is set to an FQDN, but the user
specifies an IP address, SCEP enrollment will fail.

Step 4

Configure the Certificate Authority attributes:

Note 

Your CA server administrator can provide the CA URL
and thumbprint. Retrieve the thumbprint directly from the server, not
from a “fingerprint” or “thumbprint” attribute field in an issued
certificate.

  1. Specify a CA URL to identify the SCEP CA server.
    Enter an FQDN or IP address. For example: http://ca01.cisco.com/certsrv/mscep/mscep.dll.

  2. (Optional) Check Prompt For Challenge PW to prompt users for their
    username and one-time password.

  3. (Optional) Enter a thumbprint for the CA
    certificate. Use SHA1 or MD5 hashes. For example: 8475B661202E3414D4BB223A464E6AAB8CA123AB.

Step 5

Configure which Certificate Contents to request in the enrollment certificate.
For definitions of the certificate fields, see AnyConnect Profile Editor, Certificate Enrollment.

Note 

If you use %machineid%, load HostScan/Posture on
the client.

Step 6

(Optional) Check Display
Get Certificate Button
to permit users to manually request
provisioning or renewal of authentication certificates. The button is visible to
users if the certificate authentication fails.

Step 7

(Optional) Enable SCEP for a specific host in the server
list. Doing this overrides the SCEP settings in the Certificate Enrollment pane
described above.

  1. Choose
    Server List from the navigation pane.

  2. Add
    or Edit a server list
    entry.

  3. Specify the Automatic SCEP Host and Certificate
    Authority attributes as described in Steps 5 and 6 above.


Configure the ASA to Support Legacy SCEP Enrollment

For Legacy SCEP on the ASA, you must create a connection
profile and group policy for certificate enrollment and a second connection profile
and group policy for the certificate authorized VPN connection.

Procedure

Step 1

Create a group policy for enrollment, for example,
cert_enroll_group. Set the following fields:

On the Advanced > AnyConnect Client pane, uncheck
Inherit for Client Profiles
to Download and specify the client profile configured for Legacy SCEP. For
example, specify the ac_vpn_legacy_scep client profile.

Step 2

Create a second group policy for authorization, for
example, cert_auth_group.

Step 3

Create a connection profile for enrollment, for example,
cert_enroll_tunnel. Set the following fields:

  • On the Basic pane, set the Authentication
    Method to AAA.

  • On the Basic pane, set the Default Group Policy
    to cert_enroll_group.

  • On Advanced > GroupAlias/Group URL, create a
    Group URL containing the enrollment group (cert_enroll_group) for
    this connection profile.

  • Do not enable the connection profile on the
    ASA. It is not necessary to expose the group to users in order for
    them to have access to it.

Step 4

Create a connection profile for authorization, for
example, cert_auth_tunnel. Set the following fields.

  • On the Basic pane, set the Authentication
    Method to Certificate.

  • On the Basic pane, set the Default Group Policy
    to cert_auth_group.

  • Do not enable this connection profile on the
    ASA. It is not necessary to expose the group to users in order for
    them to access it.

Step 5

(Optional) On the General pane of each group policy, set
Connection Profile (Tunnel Group)
Lock
to the corresponding SCEP connection profile, which
restricts traffic to the SCEP-configured connection profile.


Set Up a Windows
2008 Server Certificate Authority for SCEP

If your Certificate Authority software is running on a Windows
2008 server, you may need to make one of the following configuration changes to
the server to support SCEP with AnyConnect.

Disable the SCEP Password on the Certificate Authority

The following steps describe how to disable the SCEP challenge
password, so that clients will not need to provide an out-of-band password before
SCEP enrollment.

Procedure

Step 1

On the Certificate Authority server, launch the Registry
Editor. You can do this by selecting , typing regedit ,
and clicking OK.

Step 2

Navigate to
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyMSCEPEnforcePassword.

If the EnforcePassword key does not exist, create it as
a new Key.

Step 3

Edit EnforcePassword, and set it to ‘0’. If it does not
exist, create it as a REG-DWORD.

Step 4

Exit regedit, and reboot the certificate authority
server.


Setting the SCEP Template on the Certificate Authority

The following steps describe how to create a certificate
template, and assign it as the default SCEP template.

Procedure

Step 1

Launch the Server Manager. You can do this by selecting
Start > Admin Tools > Server Manager.

Step 2

Expand Roles > Certificate Services (or AD Certificate
Services).

Step 3

Navigate to CA Name > Certificate Templates.

Step 4

Right-click Certificate Templates >
Manage
.

Step 5

From the Cert Templates Console, right-click User
template and choose Duplicate

Step 6

Choose Windows Server
2008 version
for new template, and click OK.

Step 7

Change the template display name to something
descriptive, such as NDES-IPSec-SSL.

Step 8

Adjust the Validity Period for your site. Most sites
choose three or more years to avoid expired certificates.

Step 9

On the Cryptography tab, set the minimum key size for
your deployment.

Step 10

On the Subject Name tab, select Supply in Request.

Step 11

On the Extensions tab, set the Application Policies to
include at least:

  • Client Authentication

  • IP security end system

  • IP security IKE intermediate

  • IP security tunnel termination

  • IP security user

These values are valid for SSL or IPsec.

Step 12

Click Apply,
then OK to save new template.

Step 13

From Server manager > Certificate Services-CA Name,
right-click Certificate Templates. Select New > Certificate Template to
Issue, select the new template you created (in this example, NDES-IPSec-SSL),
and click OK.

Step 14

Edit the registry. You can do this by selecting Start
> Run, regedit, and clicking OK.

Step 15

Navigate to
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyMSCEP.

Step 16

Set the value of the following three keys to NDES-IPSec-SSL.

  • EncryptionTemplate

  • GeneralPurposeTemplate

  • SignatureTemplate

Step 17

Click Save,
and reboot the certificate authority server.


Configure a Certificate Expiration Notice

Configure AnyConnect to warn users that their authentication
certificate is about to expire. The Certificate
Expiration Threshold
setting specifies the number of days before the
certificate’s expiration date that AnyConnect warns users that their certificate is
expiring. AnyConnect warns the user upon each connect until the certificate has
actually expired or a new certificate has been acquired.


Note

The Certificate Expiration Threshold feature cannot be used
with RADIUS.


Procedure


Step 1

Open the VPN
Profile Editor and choose
Certificate Enrollment from the navigation pane.

Step 2

Select Certificate
Enrollment.

Step 3

Specify a Certificate
Expiration Threshold
.

This is the number of days before the certificate
expiration date, that AnyConnect warns users that their certificate is going
to expire.

The default is 0 (no warning displayed). The range is 0
to 180 days.

Step 4

Click OK.


Configure Certificate Selection

The following steps show all the places in the AnyConnect
profiles where you configure how certificates are searched for and how they are
selected on the client system. None of the steps are required, and if you do not
specify any criteria, AnyConnect uses default key matching.

AnyConnect reads the browser
certificate stores on Windows. For macOS and Unix, you must create a Privacy
Enhanced Mail (PEM) formatted file store.

Procedure


Step 1

Windows and macOS:Configure Which Certificate Stores to Use

Specify which certificate stores are used by AnyConnect in the VPN client
profile.

Step 2

Windows Only: Prompt Windows Users to Select Authentication Certificate

Configure AnyConnect to present a list of valid certificates to users and let
them choose the certificate to authenticate the session.

Step 3

For macOS and Linux environments: Create a PEM Certificate Store for macOS and Linux

Step 4

For macOS and Linux environments: Select which certificate stores to exclude in
the VPN Local Policy profile.

Step 5

Configure Certificate Matching

Configure keys that AnyConnect tries to match, when searching for a
certificate in the store. You can specify keys, extended keys, and add
custom extended keys. You can also specify a pattern for the value of an
operator in a distinguished name for AnyConnect to match.


Configure Which Certificate Stores to Use

Windows provides separate
certificate stores for the local machine and for the current user. Specify which
certificate stores are used by AnyConnect in the VPN client profile. By default, it
searches both, but you can configure AnyConnect to use only one.

Users with administrative
privileges on the computer have access to both certificate stores. Users without
administrative privileges only have access to the user certificate store. Usually,
Windows users do not have administrative privileges. Selecting
Certificate Store Override allows AnyConnect to access
the machine store, even when the user does not have administrative privileges.


Note

Access-control for the machine store can vary depending on the Windows version and
security settings. Because of this, the user may be unable to use certificates in
the machine store even though they have administrative privileges. In this case,
select Certificate Store Override to allow machine store
access.


The following table describes how
AnyConnect searches for certificates on a client based on what
Certificate Store is searched, and whether
Certificate Store Override is checked.

Certificate Store Setting

Certificate Store Override Setting

AnyConnect Search Strategy

All (for Windows)

cleared

AnyConnect searches all certificate stores.
AnyConnect is not allowed to access the machine store when the
user does not have administrative privileges.

This setting is the default. This setting
is appropriate for most cases. Do not change this setting unless
you have a specific reason or scenario requirement to do so.

All (for Windows)

checked

AnyConnect searches all certificate stores.
AnyConnect is allowed to access the machine store when the user
does not have administrative privileges.

Machine

(not a multi-cert option)

checked

AnyConnect searches the machine certificate
store. AnyConnect is allowed to search the machine store when
the user does not have administrative privileges.

Machine

(not a multi-cert option)

cleared

AnyConnect searches the machine certificate store. AnyConnect is
not allowed to search the machine store when the user does not
have administrative privileges.

Note 
This configuration can be used when only a limited
group of users is allowed to authenticate using a certificate.

User (for Windows)

does not apply

AnyConnect searches in the user certificate
store only. The certificate store override is not applicable
because users without administrative rights can have access to
this certificate store.

All (for Linux)

does not apply

AnyConnect uses client certificates from both system and user PEM
file stores, as well as the user Firefox NSS store.

Machine (for Linux)

does not apply

AnyConnect uses client certificate stores only from the system
PEM file store.

User (for Linux)

does not apply

AnyConnect uses client certificates only from the user PEM file
store, as well as the user Firefox NSS store.

With Basic Certificate Authentication
Procedure

Step 1

Set Certificate Store.

  • All—(Default) Directs the AnyConnect client to use all certificate
    stores for locating certificates.

  • Machine—Directs the AnyConnect client to
    restrict certificate lookup to the Windows local machine certificate
    store.

  • User—Directs the AnyConnect client to restrict
    certificate lookup to the local user certificate stores.

Step 2

Choose Certificate
Store Override
if you want to
allow AnyConnect to search the machine certificate store when users do not have
administrative privileges.


Prompt Windows Users to Select Authentication Certificate

You can configure the AnyConnect to present a list of valid
certificates to users and let them choose the certificate to authenticate the
session. An expired certificate is not necessarily considered invalid. For example,
if you are using SCEP, the server might issue a new certificate to the client.
Eliminating expired certificates might keep a client from connecting at all; thus
requiring manual intervention and out-of-band certificate distribution. AnyConnect
only restricts the client certificate based on security-related properties, such as
key usage, key type and strength, and so on, based on configured certificate
matching rules. This configuration is available only for Windows. By default, user
certificate selection is disabled.

Procedure

Step 1

Open the VPN
Profile Editor and choose
Preferences (Part 2) from the navigation pane.

Step 2

To enable certificate selection, uncheck Disable Certificate Selection.

Step 3

Uncheck User
Controllable
, unless you want users to be able to turn automatic
certificate selection on and off in the pane.


Create a PEM Certificate Store for macOS and Linux

AnyConnect supports certificate retrieval from a Privacy
Enhanced Mail (PEM) formatted file store. AnyConnect reads PEM-formatted
certificate files from the file system on the remote computer, verifies, and
signs them.

Before you begin

In order for the client to acquire the appropriate certificates
under all circumstances, ensure that your files meet the following
requirements:

  • All certificate files must end with the extension .pem.

  • All private key files must end with the extension .key.

  • A client certificate and its corresponding private key must have
    the same filename. 
For example: client.pem and client.key.


    Tip

    Instead of keeping copies of the PEM files, you can use soft links to PEM files.


To create the PEM file certificate store, create the paths and
folders listed below. Place the appropriate certificates in these folders:

PEM File Certificate Store Folders

Type of Certificates Stored

~/.cisco/certificates/ca

Note 
.cisco/ is located in the home directory.

Trusted CA and root certificates

~/.cisco/certificates/client

Client certificates

~/.cisco/certificates/client/private

Private keys

Machine certificates are the same as
PEM file certificates, except for the root directory. For machine certificates,
substitute /opt/.cisco for ~/.cisco. Otherwise, the paths, folders, and types of
certificates listed apply.

Configure
Certificate Matching

AnyConnect can limit its search of certificates to those
certificates that match a specific set of keys. Certificate matchings are
global criteria that are set in an AnyConnect VPN client profile, in the
Certificate Matching
pane. The criteria are:

  • Key Usage

  • Extended Key Usage

  • Distinguished Name

Configure Key
Usage

Selecting the
Key Usage keys limits the certificates that
AnyConnect can use to those certificates that have at least one of the selected
keys. The supported set is listed in the
Key Usage list on the VPN client profile, and it
includes:

  • DECIPHER_ONLY

  • ENCIPHER_ONLY

  • CRL_SIGN

  • KEY_CERT_SIGN

  • KEY_AGREEMENT

  • DATA_ENCIPHERMENT

  • KEY_ENCIPHERMENT

  • NON_REPUDIATION

  • DIGITAL_SIGNATURE

If one or more criteria are specified, a certificate must match
at least one to be considered a matching certificate.

Configure Extended
Key Usage

Selecting the
Extended Key Usage keys limits the certificates that
AnyConnect can use to the certificates that have these keys. The following
table lists the well-known set of constraints with their corresponding object
identifiers (OIDs).

Constraint

OID

ServerAuth

1.3.6.1.5.5.7.3.1

ClientAuth

1.3.6.1.5.5.7.3.2

CodeSign

1.3.6.1.5.5.7.3.3

EmailProtect

1.3.6.1.5.5.7.3.4

IPSecEndSystem

1.3.6.1.5.5.7.3.5

IPSecTunnel

1.3.6.1.5.5.7.3.6

IPSecUser

1.3.6.1.5.5.7.3.7

TimeStamp

1.3.6.1.5.5.7.3.8

OCSPSign

1.3.6.1.5.5.7.3.9

DVCS

1.3.6.1.5.5.7.3.10

IKE Intermediate

1.3.6.1.5.5.8.2.2

Configure Custom
Extended Match Key

All other OIDs (such as 1.3.6.1.5.5.7.3.11, used in some
examples in this document) are considered “custom.” As an administrator, you
can add your own OIDs if the OID that you want is not in the well-known set.

Configure
Certificate Distinguished Name

The
Distinguished Name table contains certificate
identifiers that limit the certificates that the client can use to the
certificates that match the specified criteria and criteria match conditions.
Click the
Add button to add criteria to the list and to set a
value or wildcard to match the contents of the added criteria.

Identifier

Description

CN

SubjectCommonName

SN

SubjectSurName

GN

SubjectGivenName

N

SubjectUnstructName

I

SubjectInitials

GENQ

SubjectGenQualifier

DNQ

SubjectDnQualifier

C

SubjectCountry

L

SubjectCity

SP

SubjectState

ST

SubjectState

O

SubjectCompany

OU

SubjectDept

T

SubjectTitle

EA

SubjectEmailAddr

DC

DomainComponent

ISSUER-CN

IssuerCommonName

ISSUER-SN

IssuerSurName

ISSUER-GN

IssuerGivenName

ISSUER-N

IssuerUnstructName

ISSUER-I

IssuerInitials

ISSUER-GENQ

IssuerGenQualifier

ISSUER-DNQ

IssuerDnQualifier

ISSUER-C

IssuerCountry

ISSUER-L

IssuerCity

ISSUER-SP

IssuerState

ISSUER-ST

IssuerState

ISSUER-O

IssuerCompany

ISSUER-OU

IssuerDept

ISSUER-T

IssuerTitle

ISSUER-EA

IssuerEmailAddr

ISSUER-DC

IssuerDomainComponent

Distinguished
Name
can contain zero or more matching criteria. A certificate must
match all specified criteria to be considered a matching certificate.
Distinguished Name matching specifies that a
certificate must or must not have the specified string, and whether wild
carding for the string is allowed.

VPN Authentication
Using SDI Token (SoftID) Integration

AnyConnect integrates support for RSA SecurID client software
versions 1.1 and later running on Windows 7 x86 (32-bit) and x64 (64-bit).

RSA SecurID software authenticators reduce the number of items a
user has to manage for safe and secure access to corporate assets. RSA SecurID
Software Tokens residing on a remote device generate a random one-time-use
passcode that changes every 60 seconds. The term SDI stands for Security
Dynamics, Inc. technology, which refers to this one-time password generation
technology that uses hardware and software tokens.

Typically, users make an AnyConnect connection by clicking the
AnyConnect icon in the tools tray, selecting the connection profile with which
they wish to connect, and then entering the appropriate credentials in the
authentication dialog box. The login (challenge) dialog box matches the type of
authentication configured for the tunnel group to which the user belongs. The
input fields of the login dialog box clearly indicate what kind of input is
required for authentication.

For SDI authentication, the remote user enters a PIN (Personal
Identification Number) into the AnyConnect software interface and receives an
RSA SecurID passcode. After the user enters the passcode into the secured
application, the RSA Authentication Manager validates the passcode and allows
the user to gain access.

Users who use RSA SecurID hardware or software tokens see input
fields indicating whether the user should enter a passcode or a PIN, a PIN, or
a passcode and the status line at the bottom of the dialog box provides further
information about the requirements. The user enters a software token PIN or
passcode directly into the AnyConnect user interface.

The appearance of the initial login dialog box depends on the
secure gateway settings: the user can access the secure gateway either through
the main login page, the main index URL, a tunnel-group login page, or a tunnel
group URL (URL/tunnel-group). To access the secure gateway via the main login
page, the “Allow user to select connection” check box must be set in the
Network (Client) Access AnyConnect Connection Profiles page. In either case,
the secure gateway sends the client a login page. The main login page contains
a drop-down list in which the user selects a tunnel group; the tunnel-group
login page does not, since the tunnel-group is specified in the URL.

In the case of a main login page (with a drop-down list of
connection profiles or tunnel groups), the authentication type of the default
tunnel group determines the initial setting for the password input field label.
For example, if the default tunnel group uses SDI authentication, the field
label is “Passcode;” but if the default tunnel group uses NTLM authentication,
the field label is “Password.” In Release 2.1 and later, the field label is not
dynamically updated with the user selection of a different tunnel group. For a
tunnel-group login page, the field label matches the tunnel-group requirements.

The client supports input of RSA SecurID Software Token PINs in
the password input field. If the RSA SecurID Software Token software is
installed and the tunnel-group authentication type is SDI, the field label is
“Passcode” and the status bar states “Enter a username and passcode or software
token PIN.” If a PIN is used, subsequent consecutive logins for the same tunnel
group and username have the field label “PIN.” The client retrieves the
passcode from the RSA SecurID Software Token DLL using the entered PIN. With
each successful authentication, the client saves the tunnel group, the
username, and authentication type, and the saved tunnel group becomes the new
default tunnel group.

AnyConnect accepts passcodes for any SDI authentication. Even
when the password input label is “PIN,” the user may still enter a passcode as
instructed by the status bar. The client sends the passcode to the secure
gateway as is. If a passcode is used, subsequent consecutive logins for the
same tunnel group and username have the field label “Passcode.”

The RSASecureIDIntegration profile setting has three possible
values:

  • Automatic—The client first attempts one method, and if it fails,
    the other method is tried. The default is to treat the user input as a token
    passcode (HardwareToken), and if that fails, treat it as a software token pin
    (SoftwareToken). When authentication is successful, the successful method is
    set as the new SDI Token Type and cached in the user preferences file. For the
    next authentication attempt, the SDI Token Type defines which method is
    attempted first. Generally, the token used for the current authentication
    attempt is the same token used in the last successful authentication attempt.
    However, when the username or group selection is changed, it reverts to
    attempting the default method first, as shown in the input field label.


    Note

    The SDI Token Type only has meaning for the automatic setting.
    You can ignore logs of the SKI Token Type when the authentication mode is not
    automatic. HardwareToken as the default avoids triggering next token mode.


  • SoftwareToken—The client always interprets the user input as a
    software token PIN, and the input field label is “PIN:”.

  • HardwareToken—The client always interprets the user input as a
    token passcode, and the input field label is “Passcode:”.


Note

AnyConnect does not support token selection from multiple tokens
imported into the RSA Software Token client software. Instead, the client uses
the default selected via the RSA SecurID Software Token GUI.


Categories of SDI
Authentication Exchanges

All SDI authentication exchanges fall into one of the following
categories:

  • Normal SDI Authentication Login

  • New User mode

  • New PIN mode

  • Clear PIN mode

  • Next Token Code mode

Normal SDI
Authentication Login

A normal login challenge is always the first challenge. The SDI
authentication user must provide a user name and token passcode (or PIN, in the
case of a software token) in the username and passcode or PIN fields,
respectively. The client returns the information to the secure gateway
(central-site device), and the secure gateway verifies the authentication with
the authentication server (SDI or SDI via RADIUS proxy).

If the authentication server accepts the authentication request,
the secure gateway sends a success page back to the client, and the
authentication exchange is complete.

If the passcode is not accepted, the authentication fails, and
the secure gateway sends a new login challenge page, along with an error
message. If the passcode failure threshold on the SDI server has been reached,
then the SDI server places the token into next token code mode.

New User, Clear
PIN, and New PIN Modes

The PIN can be cleared only on the SDI server and only by the
network administrator.

In the New User, Clear PIN, and New PIN modes, AnyConnect caches
the user-created PIN or system-assigned PIN for later use in the “next
passcode” login challenge.

Clear PIN mode and New User mode are identical from the point of
view of the remote user and are both treated the same by the secure gateway. In
both cases, the remote user either must enter a new PIN or be assigned a new
PIN by the SDI server. The only difference is in the user response to the
initial challenge.

For New PIN mode, the existing PIN is used to generate the
passcode, as it would be in any normal challenge. For Clear PIN mode, no PIN is
used at all for hardware tokens, with the user entering just a token code. A
PIN of eight consecutive zeros (00000000) is used to generate a passcode for
RSA software tokens. In either case, the SDI server administrator must inform
the user of what, if any, PIN value to use.

Adding a new user to an SDI server has the same result as
clearing the PIN of an existing user. In both cases, the user must either
provide a new PIN or be assigned a new PIN by the SDI server. In these modes,
for hardware tokens, the user enters just a token code from the RSA device. In
either case, the SDI server administrator must inform the user of what, if any,
PIN value to use.

Creating a New
PIN

If there is no current PIN, the SDI server requires that one of
the following conditions be met, depending on how the system is configured:

  • The system must assign a new PIN to the user (Default)

  • The user must create a new PIN

  • The user can choose whether to create a PIN or have the system
    assign it

If the SDI server is configured to allow the remote user to
choose whether to create a PIN or have the system assign a PIN, the login
screen presents a drop-down list showing the options. The status line provides
a prompt message.

For a system-assigned PIN, if the SDI server accepts the
passcode that the user enters on the login page, then the secure gateway sends
the client the system-assigned PIN. The client sends a response back to the
secure gateway, indicating that the user has seen the new PIN, and the system
continues with a “next passcode’ challenge.

If the user chooses to create a new PIN, AnyConnect presents a
dialog box on which to enter that PIN. The PIN must be a number from 4 to 8
digits long. Because the PIN is a type of password, anything the user enters
into these input fields is displayed as asterisks.

With RADIUS proxy, the PIN confirmation is a separate challenge,
subsequent to the original dialog box. The client sends the new PIN to the
secure gateway, and the secure gateway continues with a “next passcode”
challenge.

“Next Passcode”
and “Next Token Code” Challenges

For a “next passcode” challenge, the client uses the PIN value
cached during the creation or assignment of a new PIN to retrieve the next
passcode from the RSA SecurID Software Token DLL and return it to the secure
gateway without prompting the user. Similarly, in the case of a “next Token
Code” challenge for a software token, the client retrieves the next Token Code
from the RSA SecurID Software Token DLL.

Compare Native SDI with RADIUS SDI

The network administrator can configure the secure
gateway to allow SDI authentication in either of the following modes:

  • Native SDI refers to the native ability in the
    secure gateway to communicate directly with the SDI server for handling SDI
    authentication.

  • RADIUS SDI refers to the process of the secure
    gateway performing SDI authentication using a RADIUS SDI proxy, which
    communicates with the SDI server.

Native SDI and RADIUS SDI appear identical to the
remote user. Because the SDI messages are configurable on the SDI server, the
message text on the ASA must match the message text on the SDI server.
Otherwise, the prompts displayed to the remote client user might not be
appropriate for the action required during authentication. AnyConnect might
fail to respond and authentication might fail.

RADIUS SDI challenges, with minor exceptions,
essentially mirror native SDI exchanges. Since both ultimately communicate with
the SDI server, the information needed from the client and the order in which
that information is requested is the same.

During authentication, the RADIUS server presents
access challenge messages to the ASA. Within these challenge messages are reply
messages containing text from the SDI server. The message text is different
when the ASA is communicating directly with an SDI server from when
communicating through the RADIUS proxy. Therefore, in order to appear as a
native SDI server to AnyConnect, the ASA must interpret the messages from the
RADIUS server.

Also, because the SDI messages are configurable on
the SDI server, the message text on the ASA must match (in whole or in part)
the message text on the SDI server. Otherwise, the prompts displayed to the
remote client user may not be appropriate for the action required during
authentication. AnyConnect might fail to respond and authentication might fail.

Configure the ASA to Support RADIUS/SDI Messages

To configure the ASA to interpret SDI-specific RADIUS reply
messages and prompt the AnyConnect user for the appropriate action, you must
configure a connection profile (tunnel group) to forward RADIUS reply messages in a
manner that simulates direct communication with an SDI server. Users authenticating
to the SDI server must connect over this connection profile.

Procedure

Step 1

Go to .

Step 2

Select the connection profile you want to configure to
interpret SDI-specific RADIUS reply messages and click Edit.

Step 3

In the Edit AnyConnect
Connection Profile
window, expand the Advanced node in the
navigation pane on the left and select Group
Alias / Group URL.

Step 4

Check Enable the display
of SecurID messages on the login screen
.

Step 5

Click OK.

Step 6

Choose.

Step 7

Click Add to
Add a AAA Server group.

Step 8

Configure the AAA server group in the Edit AAA Server
Group dialog and click OK.

Step 9

In the AAA Server
Groups
area, select the AAA server group you just created and
then click Add in the Servers in the Selected Group area.

Step 10

In the SDI Messages area, expand the Message Table area. Double-click a message
text field to edit the message. Configure the RADIUS reply message text on the
ASA to match (in whole or in part) the message text sent by the RADIUS server.

The following table shows the message code, the default
RADIUS reply message text, and the function of each message:

Note 

The default message text used by the ASA is the
default message text used by Cisco Secure Access Control Server (ACS).
If you are using Cisco Secure ACS, and it is using the default message
text, you do not need to configure the message text on the ASA.

Because the security appliance searches for strings in
the order in which they appear in the table, you must ensure that the
string you use for the message text is not a subset of another string.
For example, “new PIN” is a subset of the default message text for both
new-pin-sup and next-ccode-and-reauth. If you configure new-pin-sup as
“new PIN,” when the security appliance receives “new PIN with the next
card code” from the RADIUS server, it will match the text to the
new-pin-sup code instead of the next-ccode-and-reauth code.

Message Code

Default RADIUS Reply Message Text

Function

next-code

Enter Next PASSCODE

Indicates the user must enter the
NEXT tokencode without the PIN.

new-pin-sup

Please remember your new PIN

Indicates the new system PIN has
been supplied and displays that PIN for the user.

new-pin-meth

Do you want to enter your own pin

Requests from the user which new
PIN method to use to create a new PIN.

new-pin-req

Enter your new Alpha-Numerical PIN

Indicates a user-generated PIN and
requests that the user enter the PIN.

new-pin-reenter

Reenter PIN:

Used internally by the ASA for
user-supplied PIN confirmation. The client confirms the
PIN without prompting the user.

new-pin-sys-ok

New PIN Accepted

Indicates the user-supplied PIN was
accepted.

next-ccode-and-reauth

new PIN with the next card code

Follows a PIN operation and
indicates the user must wait for the next tokencode and
to enter both the new PIN and next tokencode to
authenticate.

ready-for-sys-
pin

ACCEPT A SYSTEM GENERATED PIN

Used internally by the ASA to
indicate the user is ready for the system-generated PIN.

Step 11

Click OK,
then Apply, then Save.


На чтение 4 мин. Просмотров 389 Опубликовано 15.05.2021

Мы здесь, чтобы предоставить вам простые пошаговые инструкции по установке Cisco Anyconnect VPN Client в Windows 10. Хотя последняя версия хорошо совместима с Windows 10, браузер Microsoft Edge не имеет необходимого подключаемого модуля для его автоматическая установка через Интернет. Следовательно, это руководство поможет вам установить его правильно.

Cisco Anyconnect VPN Client – это популярный простой и безопасный доступ к конечным точкам в нескольких местах по всему миру. Организация обеспечивает постоянное взаимодействие с пользователем на всех устройствах, как локальных, так и внешних, и упрощает управление с помощью одного агента.

Содержание

  1. Процедура установки Cisco Anyconnect VPN Client на Windows 10
  2. Следуйте приведенным ниже инструкциям, чтобы использовать Cisco Anyconnect VPN Client в Windows 10:
  3. Внимание

Процедура установки Cisco Anyconnect VPN Client на Windows 10

Вот способ установки VPN-клиента Cisco Anyconnect в Windows 10 –

Шаг 1. Щелкните меню «Пуск» и выберите «Microsoft Edge». ”Браузер из плиток меню, чтобы запустить его.

Шаг 2: Когда браузер откроется, скопируйте перейдите по следующей ссылке и вставьте ее в адресную строку:
https://anyc.vpn.gatech.edu. Нажмите Enter .

Примечание. – Вы также можете щелкнуть ссылку, чтобы открыть ее в другом браузере.

Шаг 3: Один раз страница входа закрывает вид, щелкните раскрывающееся меню рядом с Group и выберите из списка gatech-2fa-Duo .

Шаг 4: Далее введите свое имя пользователя и пароль в соответствующие поля.

Еще раз введите свой пароль.

Шаг 5. После успешной аутентификации учетных данных вы увидит баннер входа в систему. Нажмите «Продолжить», чтобы двигаться дальше.

Примечание. Для автоматической установки установщик быстро выполнит установку. попытаться обнаружить ActiveX и более поздние версии на Java. Поскольку в Microsoft Edge нет этого подключаемого модуля, вы увидите всплывающее окно с уведомлением о сбое. Поэтому щелкните ссылку, предоставленную опцией «Рабочий стол Windows» во всплывающем окне, чтобы загрузить приложения.

Шаг 6. После завершения загрузки нажмите Run на панели Downloads и следуйте инструкциям установщика на экране, чтобы продолжить установки.

Шаг 7: Выберите «Да», когда диалоговое окно с предупреждением UAC запрашивает ваше разрешение.

Шаг 8: Когда в мастере установки появится следующая страница, выберите вариант Далее для завершения установки.

Когда установка завершит свою работу, выберите Готово .

Следовательно, клиент Cisco Anyconnect VPN установлен в вашей Windows, и он будет доступен в меню” Пуск “..

Следуйте приведенным ниже инструкциям, чтобы использовать Cisco Anyconnect VPN Client в Windows 10:

Откройте меню «Пуск» и выберите Cisco AnyConnect Secure Mobility Client из списка для запуска.

Когда появится следующее всплывающее окно, выберите vpn.gatech.edu в разделе VPN и нажмите кнопку Connect , чтобы продолжить.

После появления всплывающего окна Credential щелкните раскрывающееся окно рядом с Group: и выберите gatech-2fa-Duo из меню.

После выбора «gatech-2fa-Duo» во всплывающем окне вы увидите несколько блоков, таких как имя пользователя, пароль и двухфакторный (второй пароль).

Введите имя пользователя GT и пароль GT в соответствующие поля.

В поле второго пароля введите любой из следующих кодов и нажмите кнопку «ОК», чтобы продолжить.

push, phone, phone2, phone3, phoneN

Мобильное приложение Duo сгенерирует код, поэтому вам нужно только нажать на опцию Key в правом верхнем углу.

Нажмите phone, phone2, phone3 ……. В серии phoneN отсутствует phone1, поскольку и phone, и phone1 являются справочными, и приложение сохраняет их в системе в соответствии с порядком. В случае phone1 система позвонит на ваш телефон (может быть мобильный телефон), а для Phone2 вы получите в своем офисе номер.

После проверки всех учетных данных вы увидите приветственный баннер. Нажмите кнопку «Принять», чтобы продолжить.

Таким образом, AnyConnect значок будет свернут в системном трее. Как только вы сделаете щелчок, он будет развернут. Щелкните значок «Шестеренка» в нижнем левом углу, чтобы просмотреть подробную информацию.

Если хотите чтобы разорвать соединение, просто нажмите кнопку «Отключить».

Это все о способе установки Cisco Клиент Anyconnect VPN в Windows 10.

Внимание

Полная инструкция посвящена установке клиента Cisco Anyconnect VPN Client в ПО Windows 10. Это действительно не влияет на компонент Start Before Logon . Фактически, это необходимо не для общей платформы, а для конкретных подразделений кампуса. Если вам нужен компонент, посетите эту ссылку, чтобы получить уникальные установочные пакеты. Кроме того, поскольку вы уже установили VPN-клиент, пакет «Начать перед входом в систему» ​​также будет добавлен в следующее онлайн-обновление.

Отказ от ответственности: некоторые страницы этого сайта могут содержать партнерскую ссылку. На нашу редакцию это никак не влияет.

Хотите знать, как настроить Cisco VPN? Cisco — одно из самых узнаваемых имен в области сетевых технологий. Это имя стоит за большинством корпоративных маршрутизаторов, значительной частью магистральных интернет-маршрутизаторов, брандмауэров, коммутаторов и сетевого оборудования. Он также предоставляет приложения для конечных пользователей, такие как Cisco AnyConnect, которые используются во многих колледжах и университетах, а также на предприятиях по всему миру. Это руководство поможет вам настроить Cisco AnyConnect VPN.

VPN — важный инструмент для защиты сетевого трафика от слежки. Независимо от того, спонсируется ли это государством, интернет-провайдером или взломом, шифрование вашего трафика защищает его от посторонних глаз. Даже если вам нечего скрывать, защита вашего интернет-трафика является фундаментальной частью компьютерной безопасности. Некоторые образовательные учреждения настаивают на этом, как и большинство компаний, которые разрешают удаленный доступ к данным или приложениям.

Cisco AnyConnect включает в себя клиент, который вы устанавливаете на свои устройства, а также веб-приложение или Adaptive Security Appliance (ASA). Cisco ASA — это единое устройство, которое включает в себя брандмауэр, антивирус, спам-фильтр, VPN-сервер, устройство с сертификатом SSL и другие дополнительные функции. Там, где раньше мы использовали отдельный аппаратный брандмауэр, VPN-сервер и антивирусное решение, все это можно инкапсулировать в одном устройстве. Это отличный способ обезопасить свой бизнес. Это одно устройство защищает все решения — одна из причин популярности ASA.

Ограниченное предложение: 3 месяца БЕСПЛАТНО!

Настройка Cisco AnyConnect VPN

Настройка Cisco AnyConnect VPN аналогична настройке любого VPN-клиента. Подход зависит от устройства, на которое вы его устанавливаете, но после установки установка очень проста. Вы можете скачать Cisco AnyConnect VPN напрямую с сайта Cisco, но если вы используете его для подключения к своему колледжу или работодателю, они должны предоставить ссылку. Вы должны использовать эту ссылку, так как она может содержать файл конфигурации, необходимый для быстрого подключения.

Чтобы вы могли подключиться к VPN с помощью Cisco AnyConnect, вам потребуется логин. Если вы подключаетесь к сети колледжа или компании, ваш отдел кадров или служба ИТ-поддержки должны были в какой-то момент прислать вам их. Без них вы не сможете подключиться.

Ограниченное предложение: 3 месяца БЕСПЛАТНО!

В противном случае:

  • Загрузите VPN-клиент Cisco AnyConnect.
  • Установите клиент на свое устройство с помощью файла InstallAnyConnect.exe.
  • Следуйте указаниям мастера настройки и выберите OK после завершения.
  • Разрешите установке пройти аутентификацию, если она запросит это, и выберите Готово после завершения.
  • Программа установки может не включать какие-либо конкретные шаги установки в зависимости от того, откуда вы получили доступ к файлу загрузчика. В приведенном выше примере используется исполняемый файл Windows. Android, Mac OS и другие операционные системы будут использовать что-то другое.

    Настройка Cisco AnyConnect VPN на устройстве Chromebook или Android

    Другим примером может быть установка Cisco AnyConnect VPN на Chromebook. Я упоминаю об этом специально, так как он не использует стандартную установку приложения. Хотя у Cisco есть совместимое приложение для Android, оно работает не так, как должно, поэтому компания рекомендует вместо этого использовать расширение Chrome. Просто имейте в виду, что в этом случае будет зашифрован только трафик Chrome. Весь остальной трафик не будет использовать VPN.

    Ограниченное предложение: 3 месяца БЕСПЛАТНО!

  • Загрузите расширение Cisco AnyConnect Chrome отсюда.
  • Выберите «Добавить в Chrome» и разрешите доступ ко всему, что он запрашивает.
  • Выберите Запустить приложение, чтобы настроить его.
  • Выберите «Добавить новое подключение» и введите данные для входа в VPN.
  • После аутентификации расширения вы можете установить новое соединение, сохранить его и использовать, когда вам нужно подключиться.

    Подключение Cisco AnyConnect VPN

    После установки вы можете подключиться к Cisco AnyConnect VPN в любое время, если у вас есть данные для входа, предоставленные вашим колледжем или работодателем. Откройте приложение, войдите в сеть, к которой вы хотите подключиться, введите свои данные для входа, нажмите «Подключиться», и через несколько секунд вы увидите окно с подключением.

    В некоторых сетях требуется двухфакторная аутентификация. Если у вас один из них, получите код и введите его в новом окне 2FA. Нажмите «Продолжить», и VPN подключится. На вашем устройстве должен появиться статус, говорящий о том, что вы подключились к службе Cisco AnyConnect.

    Чтобы отключиться, либо выберите уведомление Windows, либо откройте приложение Cisco AnyConnect на своем устройстве и выберите Отключить. Дайте ему несколько секунд, чтобы отключиться от защищенной сети, и еще несколько секунд, чтобы ваши устройства применили сетевые настройки по умолчанию. Теперь вы сможете нормально пользоваться Интернетом за пределами VPN.

    VPN-клиент Cisco AnyConnect быстро справляется с защитой интернет-трафика между организацией и удаленными клиентами. Это быстро, безопасно и отлично справляется с задачей упрощения для пользователей. Неудивительно, что он так популярен!

    • Настройка двухфакторной аутентификации
    • Установка приложения Cisco Anyconnect VPN Client
    • Подключение
    • Аутентификация

    Прежде, чем подключаться к сети Университета, Вам необходимо настроить Ваш телефон на проверку второго фактора. Настройку проверки второго фактора необходимо сделать только один раз, поэтому если Вы уже выполняли это ранее, можете пропустить этот шаг, и перейти к шагу с установкой приложения Cisco Anyconnect VPN Client.


    Внимание! С 15.09.2021 изменился способ двухфакторной аутентификации по умолчанию. Теперь вместо звонка второй фактор подтверждается через мобильное приложение Microsoft Authenticator. Приложение доступно для систем Android (Google Play) и iOS (App Store).

    Для пользователей, использовавших аутентификацию по вызову (звонку), действует прежний способ проверки. Если Вы хотите изменить Ваш контактный номер телефона, воспользуйтесь инструкцией.

    Чтобы сменить метод аутентификации, воспользуйтесь руководством по ссылке.


    Также не забывайте, что при необходимости использования квалифицированной электронной подписи при удаленном подключении к рабочему месту носитель с электронной подписью необходимо забрать с собой, чтобы подключить его к домашнему компьютеру/ноутбуку.

    Настройка двухфакторной аутентификации

    Проверка второго фактора выполняется через мобильное приложение Microsoft Authenticator, которое доступно для систем Android (Google Play) и iOS (App Store). Установите данное приложение (рис. 1).

    Рис. 1

    При первом входе нажмите «Принимаю» для принятия соглашения о конфиденциальности. Затем нажмите «Сканировать QR-код и выдайте необходимые системные разрешения для доступа к камере. Откроется интерфейс сканирования (рис. 2). Не закрывайте приложение! 

    Рис. 2

    Далее Вам необходимо с компьютера или другого устройства войти на портал двухфакторной проверки аутентификации, доступного по адресу: https://mfa.utmn.ru . Введите данные Вашей корпоративной учетной записи в поля и нажмите кнопку «Вход» (рис. 3).

    Рис. 3

    После успешного входа Вы перейдете в настройку пользователя и Вам предложат выбрать метод аутентификации. Выберете «Мобильное приложение» и нажмите «Создать код активации» (рис. 4).

    Рис. 4

    Вам предоставят URL-адрес и QR-код (рис. 5). Данный код будет действовать 10 минут с момента создания. Вернитесь к приложению Mircrosoft Authenticator.

    Рис. 5

    Если отсканировать не удалось, введите код вручную (рис. 6).

    Рис. 6

    После успешной регистрации Ваша учетная запись появиться в главном меню (рис. 7). 

    Рис. 7

    Вернитесь в окно портала и нажмите «Завершить активацию» (рис. 8). Портал вернет Вас на предыдущую страничку с сообщением «Активация выполнена» (рис. 9).

    Рис. 8

    Рис. 9

    Настройка двухфакторной аутентификации через приложение завершена. Теперь Вы можете подключаться к своему рабочему компьютеру.

    Установка приложения Cisco Anyconnect VPN Client

    Для установления защищенного подключения к корпоративной сети Университета Вам необходимо использовать приложение для обеспечения удаленного доступа Cisco AnyConnect Secure Mobility Client. Его можно скачать по ссылке для ОС Windows и по ссылке для ОС macOS. Данное приложение доступно для систем Android и iOS. Выполните установку, если приложение уже установлено, пропустите данный пункт.

    Подключение

    Откройте установленное приложение Cisco AnyConnect Secure Mobility Client. В качестве сервера подключения укажите имя «vpn.utmn.ru» в поле, указанном на рис. 10, и нажмите кнопку «Connect». 

    Изображение

    Рис. 10

    Аутентификация

    Для прохождения аутентификации Вам необходимо выбрать группу подключения «UTMN_MFA» и ввести данные Вашей корпоративной учетной записи в поля, представленные на рис. 11.

       Изображение

    Рис. 11

    Приложение Microsoft Authenticator пришлет уведомление с просьбой подтвердить или отклонить вход (рис. 12).

    Рис. 12

    После чего автоматически будет установлено защищенное подключение (рис. 13) и Вы сможете использовать корпоративные ресурсы Университета.

    Изображение

    Рис. 13

    Если у Вас остались вопросы по удаленному подключению к сети Университета, обратитесь в диспетчерскую службы технической поддержки ЦИТ:

    • напишите запрос через Портал поддержки ЦИТ;
    • с помощью электронной почты 597777@utmn.ru;
    • по телефону: +7 (3452) 59-77-77.

    Понравилась статья? Поделить с друзьями:

    А вот и еще интересные новости по теме:

  • Как пить пустырник в таблетках для успокоения взрослым инструкция
  • Инструкция что делать с вашим мнением
  • Электросчетчик каскад 11с1 инструкция по эксплуатации
  • Мануалы для кавасаки на русском языке
  • Льготы для руководства

  • 0 0 голоса
    Рейтинг статьи
    Подписаться
    Уведомить о
    guest

    0 комментариев
    Старые
    Новые Популярные
    Межтекстовые Отзывы
    Посмотреть все комментарии