Cisco ASA Anyconnect Remote Access VPN

Hi Rene,

Racking my brain to find an answer…need your help.

Ethernet adapter Local Area Connection 3:

       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows x64
       Physical Address. . . . . . . . . : 00-05-9A-3C-7A-00

A. Where is this MAC address (00-05-9A-3C-7A-00) coming from? Who assigns this MAC address? Does the ASA assign it to the Virtual adapter of my laptop? If it does then how come it doesn’t show up in “sh arp” for L2 to L3 mapping? How/ where would I go to see L2 to L3 mapping in ASA for the IPSec connection established via AnyConnect from my laptop?
B. I tested five (5) laptops with AnyConnect, they all got the same MAC address! Shouldn’t it be unique?

Respectfully,
Syed

Hi Syed,

00:05:9A:3C:7A:00 is the MAC address for the SSL VPN client. 00:05:9A:3C:78:00 is used for the IPSec VPN client. You can’t change these and yes, it’s the same on all clients.

I think the VPN client itself assigns it. I haven’t checked but I think you always see this MAC address, even when you are not connected. It’s a virtual interface so not a real “Ethernet” interface which is why you don’t see it in the ARP table. I guess the client does something internally but I’m not exactly sure how the client works internally, it’s not open source.

Rene

Hello,
is it required any license for sslvpn on asa and How can I find anyconnect-win-3.1.03103-k9.pkg ?

ASA1# show flash: 
  112  31522773    Aug 09 2014 15:01:52  anyconnect-win-3.1.03103-k9.pkg
  113  9993060     Aug 09 2014 15:06:50  anyconnect-linux-3.1.03103-k9.pkg
  114  11293375    Aug 09 2014 15:08:34  anyconnect-macosx-i386-3.1.03103-k9.pkg

Hello Ali

Yes, SSL VPN requires a license to function with the Cisco ASA. This of course depends on if you purchase the license as part of a package or if you buy it as a standalone license for a device you already have. In each case, ordering information can be found at the following link:


Here you can see part numbers for various licenses that depend on the maximum number of VPN users for each.

As for the anyconnect package files, you can download the latest versions at this link.

The latest available version is 4.6. You may need a license or support contract to be able to download. If you want to find one of the previous versions, those aren’t available from Cisco anymore, however, you may be able to find them on some other uncertified download sites.

I hope this has been helpful!

Laz

Hi Rene,
I don’t want users download the anyconnect secure mobile client through the clientless webvpn, but client is already installed on the user’s client.
Is there a way to don’t use clientless webvpn ?

Thank you.
Roberto

Hello Roberto

It is possible to disable connectivity via the clientless webvpn. You can do one of two things:

Use the keepout command which will essentially replace the webvpn page with a message of your choice. An example is:

keepout “unauthorized access”

More info about this command can be found here under the keepout command:

The other option is to allow only the ssl-client protocol under the group policy configuration. More information can be found at this thread of the Cisco Support Community:

I hope this has been helpful!

Laz

Hello Rene,

I configured anyconnect vpn on my ASA5525 but it is not working. here are the configurations i added.

ASA1(config)# webvpn
ASA1(config-webvpn)# anyconnect image flash:/anyconnect-win-3.1.03103-k9.pkg
ASA1(config-webvpn)# enable outside
ASA1(config-webvpn)# anyconnect enable

ASA1(config)# sysopt connection permit-vpn
ASA1(config)# ip local pool AXNETVPN_POOL 10.20.10.220-10.20.10.254 mask 255.255.255.0
ASA1(config)# access-list SPLIT_TUNNEL standard permit 10.10.10.0 255.255.255.0

ASA1(config)#
group-policy AXNET_ANYCONNECT_POLICY internal
group-policy AXNET_ANYCONNECT_POLICY attributes

vpn-tunnel-protocol ssl-client ssl-clientless 
split-tunnel-policy tunnelspecified
split-tunnel-network-list value SPLIT_TUNNEL
dns-server value 8.8.8.8
webvpn
anyconnect keep-installer installed
anyconnect ask none default anyconnect
anyconnect dpd-interval client 30

tunnel-group AXNET_TUNNEL type remote-access 
tunnel-group AXNET_TUNNEL general-attributes 
default-group-policy AXNET_ANYCONNECT_POLICY
address-pool AXNETVPN_POOL

tunnel-group AXNET_TUNNEL webvpn-attributes 
group-alias AXNET_SSL_USERS enable

webvpn
tunnel-group-list enable

Anyconnect is connected but i can access LOCAL LAN network. Kindly assist me. thanks

Hello Jean Pierre

It seems that you have configured the ASA correctly, however, you have not created any user accounts (unless you just haven’t shown them here). Other than that, at first glance, I don’t see anything that is out of place. Take a look at the lesson once again and see if you’ve missed something in the client configuration as well.

I hope this has been helpful!

Laz

Where to find anyconnect?From where to download?What are the charges?I don’t know from where to get it?

Hello Sarang

Anyconnect can be downloaded from the official download site of Cisco here. Now you can download it only if you have the appropriate contract type with Cisco. If you do not, then you can’t download it from there.

However, it is made available by various other sources, and if you use your favourite search engine to search for the latest release (4.7 at the time of this writing) you will be able to find it available for download.

I hope this has been helpful!

Laz

Neither cisco partners nor cisco tried to help me in downloading asdm…i emailed them a lot…please tell me other sites or online labs to work on asdm

Hello Sarang

Your initial post mentioned Anyconnect. I just did a search online and found several sites that allow you to download the software. I am unable to put those links in this post, but I suggest you try it and see the results. For ASDM however, that’s a different story. You’ll have to see if you can find some organization that you may be partnering with to see if they can provide you with access to such software. Unfortunately, as far as I know, there are no “official” routes through which you can obtain it beyond buying an ASA. Even so, if you spend some time searching, you may be able to find something that will suit you.

I hope this has been helpful!

Laz

Multiple VPN on a single cisco ASA 5506x

Interface outside_1 is for main internet.---- vpn.abc.com
Interface outside_2 is for backup internet ----vpn2.abc.com

we are using different ssl certificate for both out vpn connection.
I am configuring backup vpn for one of our ASA 5506x for backup internet line and I entered our fqdn in Backup server in the attached image.

I can access backup vpn through display name but the problem is it gives me certificate error it’s not secure.
When I try to access through FQDN it connects without error but I cannot access either internal company app or Simple help technician. Both are in DMZ.

Everything works fine through Primary vpn.

Any clue.

Thanks
Ankit

I have a 5505 in my lab. I was following the lesson above when I came to the section to configure the tunnel group looks like the type command is not supported. Do I need to use a 5510 for this configuration. Thanks

ASA1(config)# tunnel-group MY_TUNNEL type remote-access 
ASA1(config)# tunnel-group MY_TUNNEL general-attributes 
ASA1(config-tunnel-general)# default-group-policy ANYCONNECT_POLICY
ASA1(config-tunnel-general)# address-pool VPN_POOL
ASA1(config-tunnel-general)# exit

Hello Donald

I have an ASA 5506-X running version 9.8(2) and I find that I have the “type” keyword available. Actually, the tunnel-group command is considered incomplete if you don’t include the “type” keyword. My output looks like this if I try not to use the “type” keyword.

myASA(config)# tunnel-group laz
ERROR: % Incomplete command
myASA(config)# tunnel-group laz ?

configure mode commands/options:
  type  Enter the type of this group-policy

What does your output look like?

Laz

I found the issues this morning. In the lesson it shows the type command being run from global config mode when it should have been run as part of webvpn configuration. Just a typo in the lesson which I should have caught yesterday. See lesson test below. Thank you for your response.

ASA1(config)# group-policy ANYCONNECT_POLICY internal
ASA1(config)# group-policy ANYCONNECT_POLICY attributes
ASA1(config-group-policy)# vpn-tunnel-protocol ssl-client ssl-clientless 
ASA1(config-group-policy)# split-tunnel-policy tunnelspecified
ASA1(config-group-policy)# split-tunnel-network-list value SPLIT_TUNNEL
ASA1(config-group-policy)# dns-server value 8.8.8.8
ASA1(config-group-policy)# webvpn
ASA1(config-group-webvpn)# anyconnect keep-installer installed
ASA1(config-group-webvpn)# anyconnect ask none default anyconnect
ASA1(config-group-webvpn)# anyconnect dpd-interval client 30

ASA1(config)# tunnel-group MY_TUNNEL type remote-access 
ASA1(config)# tunnel-group MY_TUNNEL general-attributes
 
ASA1(config-tunnel-general)# default-group-policy ANYCONNECT_POLICY
ASA1(config-tunnel-general)# address-pool VPN_POOL
ASA1(config-tunnel-general)# exit

Hello Donald

I’m not sure I follow. The tunnel-group MY_TUNNEL type remote-access and the tunnel-group MY_TUNNEL general-attributes should indeed be run under the global configuration mode. The commands you show above are correct, and I have attempted to input them in my ASA as well, with success.

Maybe the only thing that should be added here is that after the webvpn configuration, you should exit out to global config mode where the tunnel-group commands must be implemented. Is that what you mean?

I will let @ReneMolenaar know to take a look and see if he can add those exit commands to return to the global configuration mode.

I hope this has been helpful!

Laz

You are correct. Looks like the “type” command is not available if the tunnel group name has already been created. I guess their was some confusion on my part. I did the configuration again this morning and it works as outlined in the lesson. Why is the type command also available under webvpn?

1 Like

I have one issue where I am not able ping from outside host 10.10.10.2 to inside 192.168.1.1 once the tunnel is created. I have a default route on R1. I can reach both ip addresses from the asa.
Thanks

Hello Donald

Looking on my ASA in more detail, I see what is happening. Looking under the webvpn configuration mode, I cannot find the tunnel-group command nor the type keyword, as shown below:

myASA(config)# webvpn
myASA(config-webvpn)# ?

WebVPN commands:
  anyconnect               AnyConnect configuration parameters
  anyconnect-custom-attr   Define custom user policy attributes for AnyConnect

 !<--output omitted -->

  smart-tunnel             Configure a list of programs to use smart tunnel
  ssl-server-check         Verify remote https server's certificate
  tunnel-group-list        Configure WebVPN group list dropdown in login page
  tunnel-group-preference  Tunnel Group Preferences
myASA(config-webvpn)#

However, take a look at this:

myASA(config-webvpn)# tunnel-group?

webvpn mode commands/options:
  tunnel-group-list    tunnel-group-preference

configure mode commands/options:
  tunnel-group    tunnel-group-map
myASA(config-webvpn)# tunnel-group

By using the context sensitive help and issuing the tunnel-group? command, it gives you the commands that you can use in this mode starting with “tunnel-group”. It shows you the two commands shown in the list above, but it also shows you the configure mode commands and options that are available from this prompt. Here it shows you that you are able to issue both webvpn mode and configure mode commands. This means that you can indeed issue the tunnel-group command from the webvpn mode, but it will execute it as if you were in the configuration mode. Whether you do it in the webvpn or configuration mode, the results of the command are the same.

I hope this has been helpful!

Laz