Hello Johan
In a Cisco ASA, a group alias is a way to assign a specific connection profile or tunnel group to an AnyConnect VPN client. The group alias gets presented to the VPN client, and the user can choose which alias (and therefore, which tunnel group) to use when establishing a VPN connection.
Here is a high-level description of how to deploy a group alias to an AnyConnect client when configuring a remote access VPN on a Cisco ASA:
-
Define a Tunnel Group:
You need to create a tunnel group which will be used to authenticate and connect the AnyConnect clients. Here is an example configuration for a tunnel group called “Employee_VPN”:
tunnel-group Employee_VPN type remote-access
tunnel-group Employee_VPN general-attributes
address-pool Employee_pool
default-group-policy Employee_policy
tunnel-group Employee_VPN ipsec-attributes
ikev1 pre-shared-key cisco
-
Create a Group Alias:
You can create a group alias for the connection profile that you defined. This alias is the name that will be presented to the AnyConnect client user. For example, you might want to name the alias “EmployeeVPN”.
tunnel-group Employee_VPN webvpn-attributes
group-alias EmployeeVPN enable
-
Enable the Group List on the Login Page:
You will also need to enable the group drop-down list on the login page so that the user can select which group alias they want to use.
webvpn
enable outside
anyconnect-essentials
group-url https://your_ASA_outside_interface_address/EmployeeVPN enable
group-policy Employee_policy internal
group-policy Employee_policy attributes
vpn-tunnel-protocol ikev1 ikev2 ssl-clientless
Note: Replace “your_ASA_outside_interface_address” with the actual IP address or hostname of the outside interface of your ASA.
-
Deploy the AnyConnect Client:
Finally, the AnyConnect client needs to be installed and configured on the user’s device. During the installation, you will have to specify the IP address (or hostname) of your ASA, and the group alias that you created earlier. The client software will then connect to the ASA and authenticate using the connection profile associated with the specified group alias.
This is a basic setup and you may need to adjust it to your specific requirements. For example, you might want to setup additional security features, such as two-factor authentication, or configure specific settings for the connection, such as split-tunneling, DNS servers, and so on.
Now having said that, you’ll notice that the webvpn feature is being used for the group dropdown list. You can find out more about how to use this in the following Cisco documentation. However because webvpn has been depricated in recent ASA and Firepower models and versions, it is worth noting the new method to deploy remote access VPNs is to use AnyCOnnect VPN in SSL or IPsec/IKEv2 mode. In this case, the process to enable group alias is a bit different.
You’re right, Cisco has deprecated the use of the webvpn
configuration with recent ASA and Firepower Threat Defense (FTD) models and versions. The new method to deploy remote access VPNs is to use the AnyConnect VPN in SSL or IPsec/IKEv2 mode, but the process to enable group alias is a bit different. It’s actually configured within the tunnel-group
configuration. But the command to enable the alias is slightly different.
Here’s how you would define a tunnel-group with a group alias:
tunnel-group Employee_VPN type remote-access
tunnel-group Employee_VPN general-attributes
address-pool Employee_pool
default-group-policy Employee_policy
tunnel-group Employee_VPN webvpn-attributes
group-alias EmployeeVPN enable
In the latest ASA software, you’d use AnyConnect VPN client profiles to determine which group-alias is available to the user. The client profile is an XML file that gets loaded onto the AnyConnect client upon connection. This XML file can specify which VPN headends are available, which group-aliases are available, and many other settings.
Client profiles are assigned to a group-policy and are downloaded when the VPN user connects. Here’s how you would assign a client profile to a group-policy:
group-policy GroupPolicy_EmployeeVPN internal
group-policy GroupPolicy_EmployeeVPN attributes
vpn-tunnel-protocol ssl-client
webvpn
anyconnect profiles value EmployeeVPN_client_profile type user
In this example, EmployeeVPN_client_profile
is the name of the client profile. This profile would be created with the AnyConnect Profile Editor, available with the AnyConnect VPN client download package from Cisco.com.
Once the client profile is created, you would upload it to the ASA, and then reference it in the group-policy as shown above. The client profile will be automatically downloaded and updated on the AnyConnect client whenever the user connects to the VPN.
This is a more secure and flexible way to manage group-alias availability, as it doesn’t rely on the deprecated webvpn
configuration, and it can also provide many other client settings and features.
Further information can be found at this Cisco documentation:
Now just a note, if you would like Rene to create a lesson that includes a lab and topology for group aliases, feel free to use the following Member Ideas page, where you can make your suggestions. You may find that others have made similar suggestions and you can add your voice to theirs:
I hope this has been helpful!
Laz