Cisco ACS 5.4 + Anyconnect 3.1 NAM with 802.1x, problem with changing ACS Radius user password
Dear all,
Presently, we are testing 802.1x using Cisco ACS 5.4 and Cisco Anyconnect v3.1 as 802.1x supplicant. We have created predefined NAM profiles (with Cisco Profile Editor) and applied as default in on our test machine. We are using PEAP (MsCHAPv2) and ACS local user credentials for authenticating process. We have noticed that, when we try to authenticate the network with predefined profile (network profile has Administrator Network privileges) and Windows user on test machine has no Admin privileges we are not able to change ACS user password (checked "Change password on next login" in the ACS user profile). In the Monitoring and Report View we get Failure Reason "24203 User need to change password" but no popup window apears in Anyconnect. When we change Windows local user privileges to Admin or create Anyconnect network profile localy (privileges User Network) then, we are able to finish the process.
Have you ever been facing the problem described above. Is it Anyconnect bug? How can we fix it?
Best regards,
Piotr
If this happens with all machines then if a microsoft guy can look the app logs/privileges. It seems the app is requesting privilege that it is not authorized to and that's why the propmt window fails to appear. If we know what that privilege is we can probably fix it. If that privilege is not even required for smooth work Cisco need probably to fix this behavior.
I am sorry if I am not able to help but I am not using the anyconnect for production.
Regards,
Amjad
Rating useful replies is more useful than saying "Thank you"
Similar Messages
-
When a certain user saves a file in Excel 2010, she gets a message: "The file <name of file> may have been changed by another user since you last saved it." She can choose to save as another file or overwrite with her changes.
This just started happening a week or so ago. She was concerned that someone else was accessing her files, but we did several tests that opened, made a change and saved in a matter of seconds, and she still gets the message. It happens on
most files, but not all – both network and local.
We already tried the QFE_Saskatchewan registry fix. I also checked the file server for Services for Macintosh.You may be confused by the error in Excel saying “another user”. Actually Excel cannot tell who (the real human) is editing the file. Based on my research the No.1 possibility of the error is KB2626998.
2626998 Connection to a network document is lost in the 2007 Office system or in Office 2010 after the computer resumes from standby
http://support.microsoft.com/kb/2626998
For Excel 2010, follow these steps:
a. Click Start , click Run , type regedit in the Open box, and then click OK .
b. Locate and then select the following registry subkey: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Options
c. On the Edit menu, point to New , and then click Dword Value .
d. Type NetworkAvailableTimeInSeconds , and then press Enter.
e. Right-click NetworkAvailableTimeInSeconds , and then click Modify .
f. In the Value data box, click Decimal , type a number value, and then click OK .
Note This registry subkey sets the time, in seconds, that Excel waits for the network to resume. For example, if you type 15 for the number value, Excel waits 15 seconds for the network to resume. You might have to do some tests in your own environment to
determine an appropriate value. You may have to try multiple numbers.
g. Locate and then select the following registry subkey.
HKEY_CURRENT_USER\Software\Microsoft\office\14.0\common\Internet
h. Repeat step 2C through step 2F again. Reuse the same value that you used previously.
i. Exit Registry Editor.
Feel free to post back. Thanks.
Cheers,
Tony Chen
Forum Support
Come back and mark the replies as answers if they help and unmark them if they provide no help.
If you have any feedback on our support, please contact
[email protected] -
802.1x problem with non-Cisco IP Phone, VVID enabled.
I am testing with a 3750 PoE switch running 12.2(25)SEE1 and trying to configure 802.1x to work with Mitel IP phones.
I have voice and data vlans configured on each port. Turning on 802.1x causes the phone to hang and timeout in DHCP Discovery. The port status from the switch is "Unauthorized".
interface FastEthernet1/0/2
switchport access vlan 1
switchport mode access
switchport voice vlan 2
dot1x pae authenticator
dot1x port-control auto
no mdix auto
spanning-tree portfast
end
Should anything be configured besides the Voice VLAN to let phones onto the network? There is no computer behind the phone right now. The only information I can find says I need a VVID, and any clients behind it will cross the PVID.
Thanks.Yes it does.
Apparently the Mitel phones (testing a 5215 dual-mode) we have support EAP-MD5, but we have a primarily PEAP/EAP-TTLS environment. Apparently the phones need to use a username/password entered on each phone before they will send that to a Radius server doing EAP-MD5. Our PEAP clients authenticate to a Microsoft Radius server, and our EAP-TTLS to a Funk box. Hopefully the Microsoft can support both EAP-MD5 phones and PEAP on the laptops, I'll have to find out.
I was hoping this was a quick and easy Cisco configuration error... oh well. -
Cisco ASA 5505 VPN Anyconnect no address assignment
I have a problem with ip assigment via anyconnect. I always get the message no assigned address via anyconnect. I assigned to my profile for vpn a address pool, but it's still not working. Here is my config:
hostname firewall
domain-name ITTRIPP.local
enable password 8K8UeTZ9KV5Lvofo encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
names
ip local pool 192.168.178.0 192.168.178.151-192.168.178.171 mask 255.255.255.255
ip local pool net-10 10.0.0.1-10.0.0.10 mask 255.255.255.0
ip local pool SSL-POOL 172.16.1.1-172.16.1.254 mask 255.255.255.0
interface Ethernet0/0
switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
switchport access vlan 3
interface Ethernet0/6
interface Ethernet0/7
interface Vlan1
description Private Interface
nameif inside
security-level 100
ip address 192.168.178.10 255.255.255.0
ospf cost 10
interface Vlan2
description Public Interface
nameif outside
security-level 0
ip address 192.168.177.2 255.255.255.0
ospf cost 10
interface Vlan3
description DMZ-Interface
nameif dmz
security-level 0
ip address 10.10.10.2 255.255.255.0
boot system disk0:/asa914-k8.bin
ftp mode passive
dns domain-lookup inside
dns domain-lookup outside
dns domain-lookup dmz
dns server-group DefaultDNS
name-server 192.168.178.3
name-server 192.168.177.1
domain-name ITTRIPP.local
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network 192.168.178.x
subnet 192.168.178.0 255.255.255.0
object network NETWORK_OBJ_192.168.178.0_26
subnet 192.168.178.0 255.255.255.192
object service teamviewer
service tcp source eq 5938
object service smtp_tls
service tcp source eq 587
object service all_tcp
service tcp source range 1 65535
object service udp_all
service udp source range 1 65535
object network NETWORK_OBJ_192.168.178.128_26
subnet 192.168.178.128 255.255.255.192
object network NETWORK_OBJ_10.0.0.0_28
subnet 10.0.0.0 255.255.255.240
object-group service Internet-udp udp
description UDP Standard Internet Services
port-object eq domain
port-object eq ntp
port-object eq isakmp
port-object eq 4500
object-group service Internet-tcp tcp
description TCP Standard Internet Services
port-object eq www
port-object eq https
port-object eq smtp
port-object eq 465
port-object eq pop3
port-object eq 995
port-object eq ftp
port-object eq ftp-data
port-object eq domain
port-object eq ssh
port-object eq telnet
object-group user DM_INLINE_USER_1
user LOCAL\admin
user LOCAL\lukas
user LOCAL\sarah
object-group service DM_INLINE_TCP_1 tcp
port-object eq ftp
port-object eq ftp-data
port-object eq ssh
object-group service 192.168.178.network tcp
port-object eq 5000
port-object eq 5001
object-group service DM_INLINE_SERVICE_1
service-object object smtp_tls
service-object tcp destination eq imap4
service-object object teamviewer
object-group service DM_INLINE_SERVICE_2
service-object object all_tcp
service-object object udp_all
object-group service DM_INLINE_SERVICE_3
service-object object all_tcp
service-object object smtp_tls
service-object object teamviewer
service-object object udp_all
service-object tcp destination eq imap4
object-group service vpn udp
port-object eq 1701
port-object eq 4500
port-object eq isakmp
object-group service openvpn udp
port-object eq 1194
access-list NAT-ACLs extended permit ip 192.168.178.0 255.255.255.0 any
access-list inside-in remark -=[Access Lists For Outgoing Packets from Inside in terface]=-
access-list inside-in extended permit udp 192.168.178.0 255.255.255.0 any object -group Internet-udp
access-list inside-in extended permit tcp 192.168.178.0 255.255.255.0 any object -group Internet-tcp
access-list inside-in extended permit icmp 192.168.178.0 255.255.255.0 any
access-list inside-in extended permit udp 192.168.178.0 255.255.255.0 any eq sip
access-list inside-in extended permit object-group DM_INLINE_SERVICE_1 192.168.1 78.0 255.255.255.0 any
access-list inside-in extended permit object-group DM_INLINE_SERVICE_2 192.168.1 78.0 255.255.255.0 any
access-list outside-in remark -=[Access Lists For Incoming Packets on OUTSIDE in terface]=-
access-list outside-in extended permit icmp any 192.168.178.0 255.255.255.0 echo -reply
access-list outside-in extended permit tcp object-group-user DM_INLINE_USER_1 an y host 192.168.178.95 object-group DM_INLINE_TCP_1
access-list outside-in extended permit tcp any host 192.168.178.95 object-group 192.168.178.network
access-list outside-in extended permit tcp any 192.168.178.0 255.255.255.0 eq si p
access-list AnyConnect_Client_Local_Print extended deny ip any4 any4
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd
access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631
access-list AnyConnect_Client_Local_Print remark Windows' printing port
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100
access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol
access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0. 251 eq 5353
access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Nam e Resolution protocol
access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0. 252 eq 5355
access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137
access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbi os-ns
access-list dmz_access_in remark -=[Access Lists For Outgoing Packets from DMZ i nterface]=-
access-list dmz_access_in extended permit object-group DM_INLINE_SERVICE_3 10.10 .10.0 255.255.255.0 any
access-list dmz_access_in extended permit icmp 10.10.10.0 255.255.255.0 any
access-list dmz_access_in extended permit tcp 10.10.10.0 255.255.255.0 any objec t-group Internet-tcp
access-list dmz_access_in extended permit udp 10.10.10.0 255.255.255.0 any objec t-group Internet-udp
pager lines 24
logging enable
logging buffer-size 30000
logging buffered debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.16 8.178.0_26 NETWORK_OBJ_192.168.178.0_26 no-proxy-arp route-lookup
nat (dmz,outside) source static any any destination static NETWORK_OBJ_192.168.1 78.0_26 NETWORK_OBJ_192.168.178.0_26 no-proxy-arp route-lookup
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.16 8.178.128_26 NETWORK_OBJ_192.168.178.128_26 no-proxy-arp route-lookup
nat (inside,outside) source static any any destination static NETWORK_OBJ_10.0.0 .0_28 NETWORK_OBJ_10.0.0.0_28 no-proxy-arp route-lookup
object network 192.168.178.x
nat (inside,outside) dynamic interface
nat (dmz,outside) after-auto source dynamic 192.168.178.x interface
access-group inside-in in interface inside
access-group outside-in in interface outside
access-group dmz_access_in in interface dmz
route outside 0.0.0.0 0.0.0.0 192.168.177.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server ITTRIPP protocol ldap
aaa-server ITTRIPP (inside) host 192.168.178.3
ldap-base-dn CN=Users,DC=ITTRIPP,DC=local
ldap-scope subtree
ldap-naming-attribute sAMAccountName
ldap-login-password *****
ldap-login-dn CN=Administrator,DC=ITTRIPP,DC=local
server-type microsoft
user-identity default-domain LOCAL
eou allow none
aaa authentication telnet console LOCAL
aaa authentication http console LOCAL
aaa authentication ssh console LOCAL
aaa local authentication attempts max-fail 5
http server enable
http 192.168.178.0 255.255.255.0 inside
http redirect outside 80
http redirect inside 80
http redirect dmz 80
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-A ES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-A ES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES2 56 AES192 AES 3DES DES
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto map dmz_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map dmz_map interface dmz
crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map inside_map interface inside
crypto ca trustpoint ASDM_TrustPoint0
enrollment self
subject-name CN=firewall
crl configure
crypto ca trustpoint ASDM_TrustPoint1
enrollment self
fqdn l1u.dyndns.org
email [email protected]
subject-name CN=l1u.dyndns.org,OU=VPN Services,O=ITTRIPP,C=DE,St=NRW,L=PLBG,EA= [email protected]
serial-number
crl configure
crypto ca trustpool policy
crypto ca certificate chain ASDM_TrustPoint0
certificate 6a871953
308201cf 30820138 a0030201 0202046a 87195330 0d06092a 864886f7 0d010105
0500302c 3111300f 06035504 03130866 69726577 616c6c31 17301506 092a8648
86f70d01 09021608 66697265 77616c6c 301e170d 31343033 30373039 31303034
5a170d32 34303330 34303931 3030345a 302c3111 300f0603 55040313 08666972
6577616c 6c311730 1506092a 864886f7 0d010902 16086669 72657761 6c6c3081
9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100c0 8f17fa6c
2f227dd9 9d2856e1 b1f8193b 13c61cfe 2d6cbf94 62373535 71db9ac7 5f4ad79f
7594cfef 1360d88d ad3c69c1 6e617071 c6629bfa 3c77c2d2 a59b1ce1 39ae7a44
3f8c852d f51d03c1 d9924f7c 24747bbb bf79af9a 68365ed8 7f56e58c a37c7036
4db983e0 414d1b5e a8a2226f 7c76f50d d14ca714 252f7fbb d4a23d02 03010001
300d0609 2a864886 f70d0101 05050003 81810019 0d0bbce4 31d9342c 3965eb56
4dde42e0 5ea57cbb a79b3542 4897521a 8a6859c6 daf5e356 9526346d f13fb344
260f3fc8 fca6143e 25b08f3d d6780448 3e0fdf6a c1fe5379 1b9227b1 cee01a20
aa252698 6b29954e ea8bb250 4310ff96 f6c6f0dc 6c7c6021 3c72c756 f7b2e6a1
1416d222 0e11ca4a 0f0b840a 49489303 b76632
quit
crypto ca certificate chain ASDM_TrustPoint1
certificate 580c1e53
308202ff 30820268 a0030201 02020458 0c1e5330 0d06092a 864886f7 0d010105
05003081 c3312230 2006092a 864886f7 0d010901 16136d61 696c406c 31752e64
796e646e 732e6f72 67310d30 0b060355 04071304 504c4247 310c300a 06035504
0813034e 5257310b 30090603 55040613 02444531 10300e06 0355040a 13074954
54524950 50311530 13060355 040b130c 56504e20 53657276 69636573 31173015
06035504 03130e6c 31752e64 796e646e 732e6f72 67313130 12060355 0405130b
4a4d5831 3533345a 30575430 1b06092a 864886f7 0d010902 160e6c31 752e6479
6e646e73 2e6f7267 301e170d 31343033 31353036 35303535 5a170d32 34303331
32303635 3035355a 3081c331 22302006 092a8648 86f70d01 09011613 6d61696c
406c3175 2e64796e 646e732e 6f726731 0d300b06 03550407 1304504c 4247310c
300a0603 55040813 034e5257 310b3009 06035504 06130244 45311030 0e060355
040a1307 49545452 49505031 15301306 0355040b 130c5650 4e205365 72766963
65733117 30150603 55040313 0e6c3175 2e64796e 646e732e 6f726731 31301206
03550405 130b4a4d 58313533 345a3057 54301b06 092a8648 86f70d01 0902160e
6c31752e 64796e64 6e732e6f 72673081 9f300d06 092a8648 86f70d01 01010500
03818d00 30818902 818100c0 8f17fa6c 2f227dd9 9d2856e1 b1f8193b 13c61cfe
2d6cbf94 62373535 71db9ac7 5f4ad79f 7594cfef 1360d88d ad3c69c1 6e617071
c6629bfa 3c77c2d2 a59b1ce1 39ae7a44 3f8c852d f51d03c1 d9924f7c 24747bbb
bf79af9a 68365ed8 7f56e58c a37c7036 4db983e0 414d1b5e a8a2226f 7c76f50d
d14ca714 252f7fbb d4a23d02 03010001 300d0609 2a864886 f70d0101 05050003
81810087 8aca9c2b 40c9a326 4951c666 44c311b6 5f3914d5 69fcbe0a 13985b51
336e3c1b ae29c922 c6c1c29d 161fd855 984b6148 c6cbd50f ff3dde66 a71473c4
ea949f87 b4aca243 8151acd8 a4a426d1 7a434fbd 1a14bd90 0abe5736 4cd0f21b
d194b3d6 9ae45fab 2436ccbf d59d6ba9 509580a0 ad8f4131 39e6ccf1 1b7a125d
d50e4e
quit
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption 3des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable inside client-services port 443
crypto ikev2 enable outside client-services port 443
crypto ikev2 enable dmz client-services port 443
crypto ikev2 remote-access trustpoint ASDM_TrustPoint1
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication crack
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 40
authentication crack
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 70
authentication crack
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 100
authentication crack
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 130
authentication crack
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 65535
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet 192.168.178.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.178.0 255.255.255.0 inside
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
no vpn-addr-assign aaa
no vpn-addr-assign local
no ipv6-vpn-addr-assign aaa
dhcp-client update dns server both
dhcpd update dns both
dhcpd address 192.168.178.100-192.168.178.150 inside
dhcpd dns 192.168.178.3 192.168.177.1 interface inside
dhcpd wins 192.168.178.3 interface inside
dhcpd domain ITTRIPP.local interface inside
dhcpd update dns both interface inside
dhcpd option 3 ip 192.168.178.10 interface inside
dhcpd option 4 ip 192.168.178.3 interface inside
dhcpd option 6 ip 192.168.178.3 192.168.177.1 interface inside
dhcpd option 66 ip 192.168.178.95 interface inside
dhcpd enable inside
dhcpd address 192.168.177.100-192.168.177.150 outside
dhcpd dns 192.168.178.3 192.168.177.1 interface outside
dhcpd wins 192.168.178.3 interface outside
dhcpd domain ITTRIPP.local interface outside
dhcpd update dns both interface outside
dhcpd option 3 ip 192.168.177.2 interface outside
dhcpd option 4 ip 192.168.178.3 interface outside
dhcpd option 6 ip 192.168.178.3 interface outside
dhcpd enable outside
dhcpd address 10.10.10.100-10.10.10.150 dmz
dhcpd dns 192.168.178.3 192.168.177.1 interface dmz
dhcpd wins 192.168.178.3 interface dmz
dhcpd domain ITTRIPP.local interface dmz
dhcpd update dns both interface dmz
dhcpd option 3 ip 10.10.10.2 interface dmz
dhcpd option 4 ip 192.168.178.3 interface dmz
dhcpd option 6 ip 192.168.178.3 interface dmz
dhcpd enable dmz
threat-detection basic-threat
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 averag e-rate 200
tftp-server inside 192.168.178.105 /volume1/data/tftp
ssl encryption 3des-sha1
ssl trust-point ASDM_TrustPoint0
ssl trust-point ASDM_TrustPoint1 outside
ssl trust-point ASDM_TrustPoint1 dmz
ssl trust-point ASDM_TrustPoint0 dmz vpnlb-ip
ssl trust-point ASDM_TrustPoint1 inside
ssl trust-point ASDM_TrustPoint0 inside vpnlb-ip
ssl trust-point ASDM_TrustPoint0 outside vpnlb-ip
webvpn
enable inside
enable outside
enable dmz
file-encoding 192.168.178.105 big5
csd image disk0:/csd_3.5.2008-k9.pkg
anyconnect image disk0:/anyconnect-linux-3.1.03103-k9.pkg 1
anyconnect image disk0:/anyconnect-macosx-i386-3.1.03103-k9.pkg 2
anyconnect image disk0:/anyconnect-win-3.1.03103-k9.pkg 3
anyconnect profiles SSL-Profile_client_profile disk0:/SSL-Profile_client_profil e.xml
anyconnect enable
tunnel-group-list enable
mus password *****
group-policy DfltGrpPolicy attributes
wins-server value 192.168.178.3
dns-server value 192.168.178.3 192.168.177.1
dhcp-network-scope 192.168.178.0
vpn-tunnel-protocol ikev2 ssl-client ssl-clientless
default-domain value ITTRIPP.local
split-dns value ITTRIPP.local
webvpn
anyconnect firewall-rule client-interface public value outside-in
anyconnect firewall-rule client-interface private value inside-in
group-policy GroupPolicy_SSL-Profile internal
group-policy GroupPolicy_SSL-Profile attributes
wins-server value 192.168.178.3
dns-server value 192.168.178.3 192.168.177.1
vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless
default-domain value ITTRIPP.local
webvpn
anyconnect profiles value SSL-Profile_client_profile type user
username sarah password PRgJuqNTubRwqXtd encrypted
username admin password QkbxX5Qv0P59Hhrx encrypted privilege 15
username lukas password KGLLoTxH9mCvWzVI encrypted
tunnel-group DefaultWEBVPNGroup general-attributes
address-pool SSL-POOL
secondary-authentication-server-group LOCAL
authorization-server-group LOCAL
tunnel-group DefaultWEBVPNGroup ipsec-attributes
ikev1 trust-point ASDM_TrustPoint0
ikev1 radius-sdi-xauth
tunnel-group SSL-Profile type remote-access
tunnel-group SSL-Profile general-attributes
address-pool SSL-POOL
default-group-policy GroupPolicy_SSL-Profile
tunnel-group SSL-Profile webvpn-attributes
group-alias SSL-Profile enable
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
class class-default
user-statistics accounting
service-policy global_policy global
mount FTP type ftp
server 192.168.178.105
path /volume1/data/install/microsoft/Cisco
username lukas
password ********
mode passive
status enable
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DD CEService
destination address email [email protected]
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:998674b777e5fd1d3a131d93704ea0e1
Any idea why it's not working?You've got a lot going on there but I'd focus on the line "no vpn-addr-assign local". Per the command reference that tells the ASA NOT to use the local pool.
By the way, DHCP on the outside interface looks very counter-intutive, as does enabling VPN on all interfaces over every protocol. -
Problems with Cisco AnyConnect Secure Mobility Client 3.1
Since I upgraded to Cisco AnyConnect Secure Mobility Client 3.1, I am unable to start my VPN.
The service does not start correctly anymore. I tried reinstabut no help.
Could anyone help me please?
Here my logs.
Thank you very much.
Date : 07/23/2013
Time : 08:49:37
Type : Error
Source : acvpninstall
Description : Function: FileMoveFiles
File: ..\Common\Utility\NativeSysFileCopy.cpp
Line: 388
Invoked Function: ::FindFirstFile
Return Code: 3 (0x00000003)
Description: The system cannot find the path specified.
Date : 07/23/2013
Time : 08:49:37
Type : Error
Source : acvpninstall
Description : Function: wWinMain
File: .\InstallHelper.cpp
Line: 354
Invoked Function: FileMoveFiles
Return Code: -33554423 (0xFE000009)
Description: GLOBAL_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:37
Type : Error
Source : acvpninstall
Description : Function: FileMoveFiles
File: ..\Common\Utility\NativeSysFileCopy.cpp
Line: 388
Invoked Function: ::FindFirstFile
Return Code: 3 (0x00000003)
Description: The system cannot find the path specified.
Date : 07/23/2013
Time : 08:49:37
Type : Error
Source : acvpninstall
Description : Function: wWinMain
File: .\InstallHelper.cpp
Line: 354
Invoked Function: FileMoveFiles
Return Code: -33554423 (0xFE000009)
Description: GLOBAL_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:37
Type : Error
Source : acvpninstall
Description : Function: FileMoveFiles
File: ..\Common\Utility\NativeSysFileCopy.cpp
Line: 388
Invoked Function: ::FindFirstFile
Return Code: 3 (0x00000003)
Description: The system cannot find the path specified.
Date : 07/23/2013
Time : 08:49:37
Type : Error
Source : acvpninstall
Description : Function: wWinMain
File: .\InstallHelper.cpp
Line: 354
Invoked Function: FileMoveFiles
Return Code: -33554423 (0xFE000009)
Description: GLOBAL_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:40
Type : Information
Source : acvpnva
Description : Function: CInstaller::PerformAction
File: .\VACon.cpp
Line: 522
Successfully installed service acsock
Date : 07/23/2013
Time : 08:49:40
Type : Warning
Source : acvpninstall
Description : Function: XmlLocalACPolMgr::GenerateLocalPolicy
File: .\Xml\XmlLocalACPolMgr.cpp
Line: 415
Local Security Policy file already exists and therefore will not be generated
Date : 07/23/2013
Time : 08:49:40
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent starting, version 3.1.04059
Date : 07/23/2013
Time : 08:49:40
Type : Error
Source : acvpnagent
Description : Function: CBencodeStream::LoadStream
File: ..\..\PhoneHome\Bencode.cpp
Line: 126
Unable to open file for reading
Date : 07/23/2013
Time : 08:49:40
Type : Error
Source : acvpnagent
Description : Function: CBencodeDictionary::CBencodeDictionary
File: ..\..\PhoneHome\Bencode.cpp
Line: 1422
Bencode dictionary internalize failed
Date : 07/23/2013
Time : 08:49:40
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CPhoneHomeVpn
File: .\PhoneHomeVpn.cpp
Line: 187
Failed to create Bencode dictionary
Date : 07/23/2013
Time : 08:49:40
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CreateSingletonInstance
File: .\PhoneHomeVpn.cpp
Line: 82
Invoked Function: CPhoneHomeVpn
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:40
Type : Warning
Source : acvpnagent
Description : Function: CMainThread::CMainThread
File: .\MainThread.cpp
Line: 1017
Invoked Function: CPhoneHomeVpn::CreateSingletonInstance
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:40
Type : Warning
Source : acvpnagent
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.leaf
Date : 07/23/2013
Time : 08:49:41
Type : Information
Source : acvpnagent
Description : Function: MsgCatalog::initMsgCatalog
File: .\i18n\MsgCatalog.cpp
Line: 246
Current locale: fr-LU
Date : 07/23/2013
Time : 08:49:41
Type : Information
Source : acvpnagent
Description : Function: ProfileMgr::loadProfiles
File: .\ProfileMgr.cpp
Line: 100
No profile is available.
Date : 07/23/2013
Time : 08:49:41
Type : Information
Source : acvpnagent
Description : Current Preference Settings:
ServiceDisable: false
CertificateStoreOverride: false
CertificateStore: All
ShowPreConnectMessage: false
AutoConnectOnStart: false
MinimizeOnConnect: true
LocalLanAccess: false
AutoReconnect: true
AutoReconnectBehavior: DisconnectOnSuspend
UseStartBeforeLogon: false
AutoUpdate: true
RSASecurIDIntegration: Automatic
WindowsLogonEnforcement: SingleLocalLogon
WindowsVPNEstablishment: LocalUsersOnly
ProxySettings: Native
AllowLocalProxyConnections: true
PPPExclusion: Disable
PPPExclusionServerIP:
AutomaticVPNPolicy: false
TrustedNetworkPolicy: Disconnect
UntrustedNetworkPolicy: Connect
TrustedDNSDomains:
TrustedDNSServers:
AlwaysOn: false
ConnectFailurePolicy: Closed
AllowCaptivePortalRemediation: false
CaptivePortalRemediationTimeout: 5
ApplyLastVPNLocalResourceRules: false
AllowVPNDisconnect: true
EnableScripting: false
TerminateScriptOnNextEvent: false
EnablePostSBLOnConnectScript: true
AutomaticCertSelection: true
RetainVpnOnLogoff: false
UserEnforcement: SameUserOnly
EnableAutomaticServerSelection: false
AutoServerSelectionImprovement: 20
AutoServerSelectionSuspendTime: 4
AuthenticationTimeout: 12
SafeWordSofTokenIntegration: false
AllowIPsecOverSSL: false
ClearSmartcardPin: true
IPProtocolSupport: IPv4,IPv6
AllowManualHostInput: true
BlockUntrustedServers: true
PublicProxyServerAddress:
Date : 07/23/2013
Time : 08:49:41
Type : Error
Source : acvpnagent
Description : Function: CSocketSupport::ipv6EnabledOnVA
File: .\IPC\SocketSupport_win.cpp
Line: 284
Invoked Function: CSocketSupport::ipv6EnabledOnVA
Return Code: 2 (0x00000002)
Description: cannot open VPNVA Enum registry key (VA driver not installed?)
Date : 07/23/2013
Time : 08:49:41
Type : Error
Source : acvpnagent
Description : Function: CSocketSupport::ipv6EnabledOnVA
File: .\IPC\SocketSupport_win.cpp
Line: 284
Invoked Function: CSocketSupport::ipv6EnabledOnVA
Return Code: 2 (0x00000002)
Description: cannot open VPNVA Enum registry key (VA driver not installed?)
Date : 07/23/2013
Time : 08:49:41
Type : Information
Source : acvpnagent
Description : Function: CCvcConfig::readConfigParamFromFile
File: .\vpnconfig.cpp
Line: 5824
The specified configuration file for MUS service does not exist
Date : 07/23/2013
Time : 08:49:41
Type : Information
Source : acvpnagent
Description : Function: CThread::createThread
File: .\Utility\Thread.cpp
Line: 238
The thread (0x00001F84) has been successfully created.
Date : 07/23/2013
Time : 08:49:41
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent started, version 3.1.04059
Date : 07/23/2013
Time : 08:49:41
Type : Information
Source : acvpnagent
Description : Function: CInterfaceRouteMonitorCommon::logInterfaces
File: .\Routing\InterfaceRouteMonitorCommon.cpp
Line: 477
IP Address Interface List:
FE80:0:0:0:DDA0:24CA:FE35:4D19
148.110.133.126
FE80:0:0:0:19A3:961F:C11C:3724
192.168.164.1
FE80:0:0:0:80B3:F3CD:CA44:952E
169.254.149.46
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent starting, version 3.1.04059
Date : 07/23/2013
Time : 08:49:45
Type : Error
Source : acvpnagent
Description : Function: CBencodeStream::LoadStream
File: ..\..\PhoneHome\Bencode.cpp
Line: 126
Unable to open file for reading
Date : 07/23/2013
Time : 08:49:45
Type : Error
Source : acvpnagent
Description : Function: CBencodeDictionary::CBencodeDictionary
File: ..\..\PhoneHome\Bencode.cpp
Line: 1422
Bencode dictionary internalize failed
Date : 07/23/2013
Time : 08:49:45
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CPhoneHomeVpn
File: .\PhoneHomeVpn.cpp
Line: 187
Failed to create Bencode dictionary
Date : 07/23/2013
Time : 08:49:45
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CreateSingletonInstance
File: .\PhoneHomeVpn.cpp
Line: 82
Invoked Function: CPhoneHomeVpn
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:45
Type : Warning
Source : acvpnagent
Description : Function: CMainThread::CMainThread
File: .\MainThread.cpp
Line: 1017
Invoked Function: CPhoneHomeVpn::CreateSingletonInstance
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:45
Type : Warning
Source : acvpnagent
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.leaf
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Function: MsgCatalog::initMsgCatalog
File: .\i18n\MsgCatalog.cpp
Line: 246
Current locale: fr-LU
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Function: ProfileMgr::loadProfiles
File: .\ProfileMgr.cpp
Line: 100
No profile is available.
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Current Preference Settings:
ServiceDisable: false
CertificateStoreOverride: false
CertificateStore: All
ShowPreConnectMessage: false
AutoConnectOnStart: false
MinimizeOnConnect: true
LocalLanAccess: false
AutoReconnect: true
AutoReconnectBehavior: DisconnectOnSuspend
UseStartBeforeLogon: false
AutoUpdate: true
RSASecurIDIntegration: Automatic
WindowsLogonEnforcement: SingleLocalLogon
WindowsVPNEstablishment: LocalUsersOnly
ProxySettings: Native
AllowLocalProxyConnections: true
PPPExclusion: Disable
PPPExclusionServerIP:
AutomaticVPNPolicy: false
TrustedNetworkPolicy: Disconnect
UntrustedNetworkPolicy: Connect
TrustedDNSDomains:
TrustedDNSServers:
AlwaysOn: false
ConnectFailurePolicy: Closed
AllowCaptivePortalRemediation: false
CaptivePortalRemediationTimeout: 5
ApplyLastVPNLocalResourceRules: false
AllowVPNDisconnect: true
EnableScripting: false
TerminateScriptOnNextEvent: false
EnablePostSBLOnConnectScript: true
AutomaticCertSelection: true
RetainVpnOnLogoff: false
UserEnforcement: SameUserOnly
EnableAutomaticServerSelection: false
AutoServerSelectionImprovement: 20
AutoServerSelectionSuspendTime: 4
AuthenticationTimeout: 12
SafeWordSofTokenIntegration: false
AllowIPsecOverSSL: false
ClearSmartcardPin: true
IPProtocolSupport: IPv4,IPv6
AllowManualHostInput: true
BlockUntrustedServers: true
PublicProxyServerAddress:
Date : 07/23/2013
Time : 08:49:45
Type : Error
Source : acvpnagent
Description : Function: CSocketSupport::ipv6EnabledOnVA
File: .\IPC\SocketSupport_win.cpp
Line: 284
Invoked Function: CSocketSupport::ipv6EnabledOnVA
Return Code: 2 (0x00000002)
Description: cannot open VPNVA Enum registry key (VA driver not installed?)
Date : 07/23/2013
Time : 08:49:45
Type : Error
Source : acvpnagent
Description : Function: CSocketSupport::ipv6EnabledOnVA
File: .\IPC\SocketSupport_win.cpp
Line: 284
Invoked Function: CSocketSupport::ipv6EnabledOnVA
Return Code: 2 (0x00000002)
Description: cannot open VPNVA Enum registry key (VA driver not installed?)
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Function: CCvcConfig::readConfigParamFromFile
File: .\vpnconfig.cpp
Line: 5824
The specified configuration file for MUS service does not exist
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Function: CThread::createThread
File: .\Utility\Thread.cpp
Line: 238
The thread (0x00001F20) has been successfully created.
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent started, version 3.1.04059
Date : 07/23/2013
Time : 08:49:45
Type : Information
Source : acvpnagent
Description : Function: CInterfaceRouteMonitorCommon::logInterfaces
File: .\Routing\InterfaceRouteMonitorCommon.cpp
Line: 477
IP Address Interface List:
FE80:0:0:0:DDA0:24CA:FE35:4D19
148.110.133.126
FE80:0:0:0:19A3:961F:C11C:3724
192.168.164.1
FE80:0:0:0:80B3:F3CD:CA44:952E
169.254.149.46
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 31
Attributes for C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\ are 0x2010
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 56
Obtaining ACLs for directory C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 31
Attributes for C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\CustomerExperienceFeedback are 0x2010
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 56
Obtaining ACLs for directory C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\CustomerExperienceFeedback\
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 31
Attributes for C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Help are 0x2010
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 56
Obtaining ACLs for directory C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Help\
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 31
Attributes for C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\l10n are 0x2010
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 56
Obtaining ACLs for directory C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\l10n\
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 31
Attributes for C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Profile are 0x2010
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 56
Obtaining ACLs for directory C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Profile\
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 31
Attributes for C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Script are 0x2010
Date : 07/23/2013
Time : 08:49:48
Type : Information
Source : acvpninstall
Description : Function: SetInheritACLsFromParent
File: .\ACLManager.cpp
Line: 56
Obtaining ACLs for directory C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Script\
Date : 07/23/2013
Time : 08:49:49
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent starting, version 3.1.04059
Date : 07/23/2013
Time : 08:49:50
Type : Error
Source : acvpnagent
Description : Function: CBencodeStream::LoadStream
File: ..\..\PhoneHome\Bencode.cpp
Line: 126
Unable to open file for reading
Date : 07/23/2013
Time : 08:49:50
Type : Error
Source : acvpnagent
Description : Function: CBencodeDictionary::CBencodeDictionary
File: ..\..\PhoneHome\Bencode.cpp
Line: 1422
Bencode dictionary internalize failed
Date : 07/23/2013
Time : 08:49:50
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CPhoneHomeVpn
File: .\PhoneHomeVpn.cpp
Line: 187
Failed to create Bencode dictionary
Date : 07/23/2013
Time : 08:49:50
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CreateSingletonInstance
File: .\PhoneHomeVpn.cpp
Line: 82
Invoked Function: CPhoneHomeVpn
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:50
Type : Warning
Source : acvpnagent
Description : Function: CMainThread::CMainThread
File: .\MainThread.cpp
Line: 1017
Invoked Function: CPhoneHomeVpn::CreateSingletonInstance
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:49:50
Type : Warning
Source : acvpnagent
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.leaf
Date : 07/23/2013
Time : 08:49:50
Type : Information
Source : acvpnagent
Description : Function: MsgCatalog::initMsgCatalog
File: .\i18n\MsgCatalog.cpp
Line: 246
Current locale: fr-LU
Date : 07/23/2013
Time : 08:49:50
Type : Information
Source : acvpnagent
Description : Function: ProfileMgr::loadProfiles
File: .\ProfileMgr.cpp
Line: 100
No profile is available.
Date : 07/23/2013
Time : 08:49:50
Type : Information
Source : acvpnagent
Description : Current Preference Settings:
ServiceDisable: false
CertificateStoreOverride: false
CertificateStore: All
ShowPreConnectMessage: false
AutoConnectOnStart: false
MinimizeOnConnect: true
LocalLanAccess: false
AutoReconnect: true
AutoReconnectBehavior: DisconnectOnSuspend
UseStartBeforeLogon: false
AutoUpdate: true
RSASecurIDIntegration: Automatic
WindowsLogonEnforcement: SingleLocalLogon
WindowsVPNEstablishment: LocalUsersOnly
ProxySettings: Native
AllowLocalProxyConnections: true
PPPExclusion: Disable
PPPExclusionServerIP:
AutomaticVPNPolicy: false
TrustedNetworkPolicy: Disconnect
UntrustedNetworkPolicy: Connect
TrustedDNSDomains:
TrustedDNSServers:
AlwaysOn: false
ConnectFailurePolicy: Closed
AllowCaptivePortalRemediation: false
CaptivePortalRemediationTimeout: 5
ApplyLastVPNLocalResourceRules: false
AllowVPNDisconnect: true
EnableScripting: false
TerminateScriptOnNextEvent: false
EnablePostSBLOnConnectScript: true
AutomaticCertSelection: true
RetainVpnOnLogoff: false
UserEnforcement: SameUserOnly
EnableAutomaticServerSelection: false
AutoServerSelectionImprovement: 20
AutoServerSelectionSuspendTime: 4
AuthenticationTimeout: 12
SafeWordSofTokenIntegration: false
AllowIPsecOverSSL: false
ClearSmartcardPin: true
IPProtocolSupport: IPv4,IPv6
AllowManualHostInput: true
BlockUntrustedServers: true
PublicProxyServerAddress:
Date : 07/23/2013
Time : 08:49:50
Type : Information
Source : acvpnagent
Description : Function: CCvcConfig::readConfigParamFromFile
File: .\vpnconfig.cpp
Line: 5824
The specified configuration file for MUS service does not exist
Date : 07/23/2013
Time : 08:49:50
Type : Information
Source : acvpnagent
Description : Function: CThread::createThread
File: .\Utility\Thread.cpp
Line: 238
The thread (0x000016C0) has been successfully created.
Date : 07/23/2013
Time : 08:49:50
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent started, version 3.1.04059
Date : 07/23/2013
Time : 08:49:50
Type : Information
Source : acvpnagent
Description : Function: CInterfaceRouteMonitorCommon::logInterfaces
File: .\Routing\InterfaceRouteMonitorCommon.cpp
Line: 477
IP Address Interface List:
FE80:0:0:0:DDA0:24CA:FE35:4D19
148.110.133.126
FE80:0:0:0:19A3:961F:C11C:3724
192.168.164.1
FE80:0:0:0:80B3:F3CD:CA44:952E
169.254.149.46
Date : 07/23/2013
Time : 08:50:10
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent starting, version 3.1.04059
Date : 07/23/2013
Time : 08:50:11
Type : Error
Source : acvpnagent
Description : Function: CBencodeStream::LoadStream
File: ..\..\PhoneHome\Bencode.cpp
Line: 126
Unable to open file for reading
Date : 07/23/2013
Time : 08:50:11
Type : Error
Source : acvpnagent
Description : Function: CBencodeDictionary::CBencodeDictionary
File: ..\..\PhoneHome\Bencode.cpp
Line: 1422
Bencode dictionary internalize failed
Date : 07/23/2013
Time : 08:50:11
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CPhoneHomeVpn
File: .\PhoneHomeVpn.cpp
Line: 187
Failed to create Bencode dictionary
Date : 07/23/2013
Time : 08:50:11
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CreateSingletonInstance
File: .\PhoneHomeVpn.cpp
Line: 82
Invoked Function: CPhoneHomeVpn
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:50:11
Type : Warning
Source : acvpnagent
Description : Function: CMainThread::CMainThread
File: .\MainThread.cpp
Line: 1017
Invoked Function: CPhoneHomeVpn::CreateSingletonInstance
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:50:11
Type : Warning
Source : acvpnagent
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.leaf
Date : 07/23/2013
Time : 08:50:11
Type : Information
Source : acvpnagent
Description : Function: MsgCatalog::initMsgCatalog
File: .\i18n\MsgCatalog.cpp
Line: 246
Current locale: fr-LU
Date : 07/23/2013
Time : 08:50:11
Type : Information
Source : acvpnagent
Description : Function: ProfileMgr::loadProfiles
File: .\ProfileMgr.cpp
Line: 100
No profile is available.
Date : 07/23/2013
Time : 08:50:11
Type : Information
Source : acvpnagent
Description : Current Preference Settings:
ServiceDisable: false
CertificateStoreOverride: false
CertificateStore: All
ShowPreConnectMessage: false
AutoConnectOnStart: false
MinimizeOnConnect: true
LocalLanAccess: false
AutoReconnect: true
AutoReconnectBehavior: DisconnectOnSuspend
UseStartBeforeLogon: false
AutoUpdate: true
RSASecurIDIntegration: Automatic
WindowsLogonEnforcement: SingleLocalLogon
WindowsVPNEstablishment: LocalUsersOnly
ProxySettings: Native
AllowLocalProxyConnections: true
PPPExclusion: Disable
PPPExclusionServerIP:
AutomaticVPNPolicy: false
TrustedNetworkPolicy: Disconnect
UntrustedNetworkPolicy: Connect
TrustedDNSDomains:
TrustedDNSServers:
AlwaysOn: false
ConnectFailurePolicy: Closed
AllowCaptivePortalRemediation: false
CaptivePortalRemediationTimeout: 5
ApplyLastVPNLocalResourceRules: false
AllowVPNDisconnect: true
EnableScripting: false
TerminateScriptOnNextEvent: false
EnablePostSBLOnConnectScript: true
AutomaticCertSelection: true
RetainVpnOnLogoff: false
UserEnforcement: SameUserOnly
EnableAutomaticServerSelection: false
AutoServerSelectionImprovement: 20
AutoServerSelectionSuspendTime: 4
AuthenticationTimeout: 12
SafeWordSofTokenIntegration: false
AllowIPsecOverSSL: false
ClearSmartcardPin: true
IPProtocolSupport: IPv4,IPv6
AllowManualHostInput: true
BlockUntrustedServers: true
PublicProxyServerAddress:
Date : 07/23/2013
Time : 08:50:11
Type : Information
Source : acvpnagent
Description : Function: CCvcConfig::readConfigParamFromFile
File: .\vpnconfig.cpp
Line: 5824
The specified configuration file for MUS service does not exist
Date : 07/23/2013
Time : 08:50:11
Type : Information
Source : acvpnagent
Description : Function: CThread::createThread
File: .\Utility\Thread.cpp
Line: 238
The thread (0x00001F34) has been successfully created.
Date : 07/23/2013
Time : 08:50:11
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent started, version 3.1.04059
Date : 07/23/2013
Time : 08:50:11
Type : Information
Source : acvpnagent
Description : Function: CInterfaceRouteMonitorCommon::logInterfaces
File: .\Routing\InterfaceRouteMonitorCommon.cpp
Line: 477
IP Address Interface List:
FE80:0:0:0:DDA0:24CA:FE35:4D19
148.110.133.126
FE80:0:0:0:19A3:961F:C11C:3724
192.168.164.1
FE80:0:0:0:80B3:F3CD:CA44:952E
169.254.149.46
Date : 07/23/2013
Time : 08:50:19
Type : Information
Source : acvpnui
Description : Cisco AnyConnect Secure Mobility Client GUI started, version 3.1.04059
Date : 07/23/2013
Time : 08:50:20
Type : Information
Source : acvpnui
Description : Initializing vpnapi version 3.1.04059 ().
Date : 07/23/2013
Time : 08:50:21
Type : Information
Source : acvpnui
Description : Function: MsgCatalog::initMsgCatalog
File: .\i18n\MsgCatalog.cpp
Line: 246
Current locale: fr-LU
Date : 07/23/2013
Time : 08:50:21
Type : Information
Source : acvpnui
Description : Function: ProfileMgr::loadProfiles
File: .\ProfileMgr.cpp
Line: 100
No profile is available.
Date : 07/23/2013
Time : 08:50:21
Type : Warning
Source : acvpnui
Description : Function: ClientIfcBase::getCurrentState
File: .\ClientIfcBase.cpp
Line: 2058
API service not ready
Date : 07/23/2013
Time : 08:50:21
Type : Information
Source : acvpnui
Description : Current Preference Settings:
ServiceDisable: false
CertificateStoreOverride: false
CertificateStore: All
ShowPreConnectMessage: false
AutoConnectOnStart: false
MinimizeOnConnect: true
LocalLanAccess: false
AutoReconnect: true
AutoReconnectBehavior: DisconnectOnSuspend
UseStartBeforeLogon: false
AutoUpdate: true
RSASecurIDIntegration: Automatic
WindowsLogonEnforcement: SingleLocalLogon
WindowsVPNEstablishment: LocalUsersOnly
ProxySettings: Native
AllowLocalProxyConnections: true
PPPExclusion: Disable
PPPExclusionServerIP:
AutomaticVPNPolicy: false
TrustedNetworkPolicy: Disconnect
UntrustedNetworkPolicy: Connect
TrustedDNSDomains:
TrustedDNSServers:
AlwaysOn: false
ConnectFailurePolicy: Closed
AllowCaptivePortalRemediation: false
CaptivePortalRemediationTimeout: 5
ApplyLastVPNLocalResourceRules: false
AllowVPNDisconnect: true
EnableScripting: false
TerminateScriptOnNextEvent: false
EnablePostSBLOnConnectScript: true
AutomaticCertSelection: true
RetainVpnOnLogoff: false
UserEnforcement: SameUserOnly
EnableAutomaticServerSelection: false
AutoServerSelectionImprovement: 20
AutoServerSelectionSuspendTime: 4
AuthenticationTimeout: 12
SafeWordSofTokenIntegration: false
AllowIPsecOverSSL: false
ClearSmartcardPin: true
IPProtocolSupport: IPv4,IPv6
AllowManualHostInput: true
BlockUntrustedServers: true
PublicProxyServerAddress:
Date : 07/23/2013
Time : 08:50:21
Type : Warning
Source : acvpnui
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.nam.api
Date : 07/23/2013
Time : 08:50:21
Type : Information
Source : acvpnui
Description : Function: L2Api::attach
File: .\L2Api.cpp
Line: 87
The NAM/L2 Api could not be found or failed to load, skipping.
Date : 07/23/2013
Time : 08:50:21
Type : Warning
Source : acvpnui
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.websecurity.api
Date : 07/23/2013
Time : 08:50:21
Type : Information
Source : acvpnui
Description : Function: SSApi::attach
File: ..\common\SSApi.cpp
Line: 51
The Web Security API could not be found or failed to load, skipping.
Date : 07/23/2013
Time : 08:50:21
Type : Error
Source : acvpnui
Description : Function: MFDartBox::getDARTInstallDir
File: .\MFDartBox.cpp
Line: 332
Invoked Function: MsiEnumProductsExW
Return Code: 259 (0x00000103)
Description: No more data is available.
Date : 07/23/2013
Time : 08:50:21
Type : Warning
Source : acvpnui
Description : Function: ClientIfcBase::getStats
File: .\ClientIfcBase.cpp
Line: 1723
Called when API service not ready.
Date : 07/23/2013
Time : 08:50:22
Type : Error
Source : acvpnui
Description : Function: CSocketTransport::connectTransport
File: .\IPC\SocketTransport.cpp
Line: 981
Invoked Function: ::WSAConnect
Return Code: 10061 (0x0000274D)
Description: No connection could be made because the target machine actively refused it.
Date : 07/23/2013
Time : 08:50:22
Type : Error
Source : acvpnui
Description : Function: CIpcTransport::connectIpc
File: .\IPC\IPCTransport.cpp
Line: 252
Invoked Function: CSocketTransport::connectTransport
Return Code: -31588340 (0xFE1E000C)
Description: SOCKETTRANSPORT_ERROR_CONNECT
Date : 07/23/2013
Time : 08:50:22
Type : Error
Source : acvpnui
Description : Function: CIpcTransport::terminateIpcConnection
File: .\IPC\IPCTransport.cpp
Line: 404
Invoked Function: CSocketTransport::writeSocketBlocking
Return Code: -31588319 (0xFE1E0021)
Description: SOCKETTRANSPORT_ERROR_NO_SOCKET_HANDLE:The socket transport does not possess a valid socket handle.
Date : 07/23/2013
Time : 08:50:22
Type : Error
Source : acvpnui
Description : Function: ApiIpc::initIpc
File: .\ApiIpc.cpp
Line: 423
Invoked Function: CIpcTransport::connectIpc
Return Code: -31588340 (0xFE1E000C)
Description: SOCKETTRANSPORT_ERROR_CONNECT
Date : 07/23/2013
Time : 08:50:22
Type : Error
Source : acvpnui
Description : Function: ApiIpc::initiateAgentConnection
File: .\ApiIpc.cpp
Line: 336
Invoked Function: ApiIpc::initIpc
Return Code: -31588340 (0xFE1E000C)
Description: SOCKETTRANSPORT_ERROR_CONNECT
Date : 07/23/2013
Time : 08:50:22
Type : Error
Source : acvpnui
Description : Function: ApiIpc::run
File: .\ApiIpc.cpp
Line: 570
Invoked Function: ApiIpc::initiateAgentConnection
Return Code: -31588340 (0xFE1E000C)
Description: SOCKETTRANSPORT_ERROR_CONNECT
Date : 07/23/2013
Time : 08:50:22
Type : Error
Source : acvpnui
Description : Function: ClientIfcBase::attach
File: .\ClientIfcBase.cpp
Line: 606
Client failed to attach.
Date : 07/23/2013
Time : 08:50:25
Type : Error
Source : acvpnui
Description : Function: CMainFrame::OnCreate
File: .\mainfrm.cpp
Line: 342
Invoked Function: The VPN service is not responding or available.
Return Code: -33554423 (0xFE000009)
Description: GLOBAL_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:50:25
Type : Information
Source : acvpnui
Description : Function: ClientIfcBase::detach
File: .\ClientIfcBase.cpp
Line: 438
Shutting down vpnapi
Date : 07/23/2013
Time : 08:50:25
Type : Error
Source : acvpnui
Description : Function: ConnectMgr::activateConnectEvent
File: .\ConnectMgr.cpp
Line: 1352
NULL object. Cannot establish a connection at this time.
Date : 07/23/2013
Time : 08:50:25
Type : Information
Source : acvpnui
Description : Cisco AnyConnect Secure Mobility Client GUI exiting, version 3.1.04059 , return code 0 [0x00000000]
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent starting, version 3.1.04059
Date : 07/23/2013
Time : 08:51:12
Type : Error
Source : acvpnagent
Description : Function: CBencodeStream::LoadStream
File: ..\..\PhoneHome\Bencode.cpp
Line: 126
Unable to open file for reading
Date : 07/23/2013
Time : 08:51:12
Type : Error
Source : acvpnagent
Description : Function: CBencodeDictionary::CBencodeDictionary
File: ..\..\PhoneHome\Bencode.cpp
Line: 1422
Bencode dictionary internalize failed
Date : 07/23/2013
Time : 08:51:12
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CPhoneHomeVpn
File: .\PhoneHomeVpn.cpp
Line: 187
Failed to create Bencode dictionary
Date : 07/23/2013
Time : 08:51:12
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CreateSingletonInstance
File: .\PhoneHomeVpn.cpp
Line: 82
Invoked Function: CPhoneHomeVpn
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:51:12
Type : Warning
Source : acvpnagent
Description : Function: CMainThread::CMainThread
File: .\MainThread.cpp
Line: 1017
Invoked Function: CPhoneHomeVpn::CreateSingletonInstance
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:51:12
Type : Warning
Source : acvpnagent
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.leaf
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Function: MsgCatalog::initMsgCatalog
File: .\i18n\MsgCatalog.cpp
Line: 246
Current locale: fr-LU
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Function: ProfileMgr::loadProfiles
File: .\ProfileMgr.cpp
Line: 100
No profile is available.
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Current Preference Settings:
ServiceDisable: false
CertificateStoreOverride: false
CertificateStore: All
ShowPreConnectMessage: false
AutoConnectOnStart: false
MinimizeOnConnect: true
LocalLanAccess: false
AutoReconnect: true
AutoReconnectBehavior: DisconnectOnSuspend
UseStartBeforeLogon: false
AutoUpdate: true
RSASecurIDIntegration: Automatic
WindowsLogonEnforcement: SingleLocalLogon
WindowsVPNEstablishment: LocalUsersOnly
ProxySettings: Native
AllowLocalProxyConnections: true
PPPExclusion: Disable
PPPExclusionServerIP:
AutomaticVPNPolicy: false
TrustedNetworkPolicy: Disconnect
UntrustedNetworkPolicy: Connect
TrustedDNSDomains:
TrustedDNSServers:
AlwaysOn: false
ConnectFailurePolicy: Closed
AllowCaptivePortalRemediation: false
CaptivePortalRemediationTimeout: 5
ApplyLastVPNLocalResourceRules: false
AllowVPNDisconnect: true
EnableScripting: false
TerminateScriptOnNextEvent: false
EnablePostSBLOnConnectScript: true
AutomaticCertSelection: true
RetainVpnOnLogoff: false
UserEnforcement: SameUserOnly
EnableAutomaticServerSelection: false
AutoServerSelectionImprovement: 20
AutoServerSelectionSuspendTime: 4
AuthenticationTimeout: 12
SafeWordSofTokenIntegration: false
AllowIPsecOverSSL: false
ClearSmartcardPin: true
IPProtocolSupport: IPv4,IPv6
AllowManualHostInput: true
BlockUntrustedServers: true
PublicProxyServerAddress:
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Function: CCvcConfig::readConfigParamFromFile
File: .\vpnconfig.cpp
Line: 5824
The specified configuration file for MUS service does not exist
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Function: CThread::createThread
File: .\Utility\Thread.cpp
Line: 238
The thread (0x0000162C) has been successfully created.
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent started, version 3.1.04059
Date : 07/23/2013
Time : 08:51:12
Type : Information
Source : acvpnagent
Description : Function: CInterfaceRouteMonitorCommon::logInterfaces
File: .\Routing\InterfaceRouteMonitorCommon.cpp
Line: 477
IP Address Interface List:
FE80:0:0:0:DDA0:24CA:FE35:4D19
148.110.133.126
FE80:0:0:0:19A3:961F:C11C:3724
192.168.164.1
FE80:0:0:0:80B3:F3CD:CA44:952E
169.254.149.46
Date : 07/23/2013
Time : 08:52:13
Type : Information
Source : acvpnagent
Description : Cisco AnyConnect Secure Mobility Client Agent starting, version 3.1.04059
Date : 07/23/2013
Time : 08:52:13
Type : Error
Source : acvpnagent
Description : Function: CBencodeStream::LoadStream
File: ..\..\PhoneHome\Bencode.cpp
Line: 126
Unable to open file for reading
Date : 07/23/2013
Time : 08:52:13
Type : Error
Source : acvpnagent
Description : Function: CBencodeDictionary::CBencodeDictionary
File: ..\..\PhoneHome\Bencode.cpp
Line: 1422
Bencode dictionary internalize failed
Date : 07/23/2013
Time : 08:52:13
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CPhoneHomeVpn
File: .\PhoneHomeVpn.cpp
Line: 187
Failed to create Bencode dictionary
Date : 07/23/2013
Time : 08:52:13
Type : Error
Source : acvpnagent
Description : Function: CPhoneHomeVpn::CreateSingletonInstance
File: .\PhoneHomeVpn.cpp
Line: 82
Invoked Function: CPhoneHomeVpn
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:52:13
Type : Warning
Source : acvpnagent
Description : Function: CMainThread::CMainThread
File: .\MainThread.cpp
Line: 1017
Invoked Function: CPhoneHomeVpn::CreateSingletonInstance
Return Code: -23396343 (0xFE9B0009)
Description: PHONEHOMEVPN_ERROR_UNEXPECTED
Date : 07/23/2013
Time : 08:52:13
Type : Warning
Source : acvpnagent
Description : Function: PluginLoader::QuickCreatePlugin
File: c:\temp\build\thehoff\ElGreco_MR40.391570230547\ElGreco_MR4\vpn\Common\Utility/PluginLoader.h
Line: 195
Invoked Function: PluginLoader::CreateInstance
Return Code: -29360116 (0xFE40000C)
Description: PLUGINLOADER_ERROR_COULD_NOT_CREATE
com.cisco.anyconnect.leaf
Date : 07/23/2013
Time : 08:52:13
Type : Information
Source : acvpnagent
Description : Function: MsgCatalog::initMsgCatalog
File: .\i18n\MsgCatalog.cpp
Line: 246
Current locale: fr-LU
Date : 07/23/2013
Time : 08:52:13
Type : Information
Source : acvpnagent
Description : Function: ProfileMgr::loadProfiles
File: .\ProfileMgr.cpp
Line: 100
No profile is available.
Date : 07/23/2013
Time : 08:52:13
Type : Information
Source : acvpnagent
Description : Current Preference Settings:
ServiceDisable: false
CertificateStoreOverride: false
CertificateStore: All
ShowPreConnectMessage: false
AutoConnectOnStart: false
MinimizeOnConnect: true
LocalLanAccess: false
AutoReconnect: true
AutoReconnectBehavior: DisconnectOnSuspend
UseStartBeforeLogon: false
AutoUpdate: true
RSASecurIDIntegration: Automatic
WindowsLogonEnforcement: SingleLocalLogon
WindowsVPNEstablishment: LocalUsersOnly
ProxySettings: Native
AllowLocalProxyConnections: true
PPPExclusion: Disable
PPPExclusionServerIP:
AutomaticVPNPolicy: false
TrustedNetworkPolicy: Disconnect
UntrustedNetworkPThere seem to be much more problems with 3.1.04049
Especially with certificate authentication.
I opened some TAC cases.
Try 3.1.04063 that came out at 07-24-13.
TAC said that there are some fixes in it... -
ACS 5.1 Anyconnect Atributes
Hi,
Can some one explain me the steps to configure AnyConnect tunneling protocol of svc and so forth in the ACS 5.1 please.
Also I will be highly appreciated if there's a reference document available.
Thanks in advance.Hi pemasirid,
The following are all the attributes that the ASA accepts for VPN connections, including AnyConnect:
http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/ref_extserver.html#wp1605508
In terms of where to configure them in ACS, you would add them into the appropriate Authorization Profile that you are returning to your VPN clients. Go to Policy Elements > Authorization and Permissions > Network Access > Authorization Profiles, and create one (or edit one you already have). Go to the tab called Radius Attributes and pick the dictionary type "Radius-Cisco VPN 3000/ASA/PIX 7.x", and those attributes from the link above should be there to choose and you can enter your values.
Then assign that Authorization Profile to your Access Policy rule that is being matched for your connections.
Thanks,
Nate -
Problems with auto upgrade Anyconnect 3.1
Hello,
I'm having problem with auto upgrade of Anyconnect 2.5 to 3.1.
Here is the situation :
I have ASA5510 running ASA 8.4.5 and clients are running Anyconnect 2.5.3055 and 3.1.00495 with 2 different profiles.
Clients with 2.5 can upgrade to 3.1 but then receive an "Invalid host entry" when they try to connect with new client. It works if they use FQDN instead of profiles. It's the same situation with Windows 7, Mac OS X and linux.
If I configure client software back to 2.5 on ASA, it works again for every client.
Do you have an idea ?
Thanks for your reply.
YannI have seen the same behavior on Mac OS X. A couple of points for me:
If I delete the profiles from /opt/cisco/anyconnect/profile then I can connect once (using the FQDN) but it then downloads the client profile and on next attempted connection it receives "invalid host entry." My profiles use the FQDN of my ASA and both forward and reverse DNS resolution are configured properly.
My workaround is to remove the AnyConnect Client Profile entirely, but I can get away with that because I have a very simple setup, with all users in one default group. If I had to pass different profile information to different users that would not be a solution.
Second, better workaround: I just exported the client profile, imported it under a different name, edited the new client profile to remove the server address, and assigned the new profile to the group policy. At their next login, users get all the profile settings and since the client remembers the FQDN they used to connect it doesn't adversely affect the user experience. -
802.1X for wired environments using Radius/ACS for Dynamic Vlan Assignment
Currently Being Moderated
802.1X for wired environments using Radius/ACS for Dynamic Vlan Assignment
Could someone please provide me with a simplest set of configuration steps to fire up Radius in ACS and 802.1X for dynamic vlan assignment. The objective is to roll out NAC L2 OOB using the 802.1X method for dymamic vlan assignments.
If possible show:
1. ACS/Radius Configurations.
2. End User Switch Configurations
Variables:
Switch A
MAC Address aaaa.bbbb.cccc Vlan 10
bbbb.cccc.dddd Vlan 20
Also, if someone posts the Pros and Cons of using Radius/ACS/802.1X for Dynamic Vlan Assignments.
Other technology sets that can be used for Dynamic Vlan assignment EXCEPT from deprecated/obsolete VMPS.
Thanks in advance. .Hi Guys,
Hmmm, well if your just looking for Mac based authentication the good news is that is very easy. Just set create your Radius server, ACS, FreeRadius, Steelbelted radius etc. Then create user with the name of the Mac address, in other words if the mac address is 0012.0021.1122 the the name would be 001200211122 and the password would be the mac address. Then you set the vlan and tunnel stuff, like so tunnel-Type would be vlan, Tunnel-medium would be 802 and Tunnel-Private-Group-ID is the name of the vlan(not the vlan number)
So for the Cisco ACS 4.x you would create a user as specified above, fill in all the password boxes with MAC address, I believe the mac has to be all lower case in the name and the password. Then check the Separate(Chap/MS-Chap/ARAP) box. Then you pick the group the machine belongs to, the group is the part that defines what vlan it is on.
Before you create the user, create the group with info I wrote above and in addition specify the Service-Type as Authenticate Only.
Freeradius is a bit harder to configure the specifics and I am just now testing a freeradius server so I do not know the process for Machine authentication.
If, however, you are trying to authenticate a user that gets a bit trickier and is not so straight forward. -
Two Cisco ASA 5505, IPSec Multiple Subnets, Problem with Phase2, DSL
Hi all.
we have following IPSec configuration:
ASA Site 1:
Cisco Adaptive Security Appliance Software Version 9.1(1)
crypto ipsec ikev1 transform-set TSAES esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set TSMD5 esp-3des esp-md5-hmac
crypto ipsec ikev2 ipsec-proposal PropAES256
access-list SITE_2 extended permit ip 172.27.0.0 255.255.0.0 172.27.97.0 255.255.255.0
access-list SITE_2 extended permit ip 172.28.60.0 255.255.254.0 172.27.97.0 255.255.255.0
access-list SITE_2 extended permit ip 172.22.0.0 255.255.0.0 172.27.97.0 255.255.255.0
access-list SITE_2 extended permit ip 172.27.0.0 255.255.0.0 172.27.99.0 255.255.255.0
access-list SITE_2 extended permit ip 172.22.0.0 255.255.0.0 172.27.99.0 255.255.255.0
crypto map CMVPN 5 match address SITE_2
crypto map CMVPN 5 set peer IP_SITE2
crypto map CMVPN 5 set ikev2 ipsec-proposal PropAES256
crypto map CMVPN interface OUTSIDE
route OUTSIDE 172.27.97.0 255.255.255.0 citic-internet-gw 255
route OUTSIDE 172.27.99.0 255.255.255.0 citic-internet-gw 255
tunnel-group IP_SITE2 type ipsec-l2l
tunnel-group IP_SITE2 general-attributes
default-group-policy VPN_S2S_WAN
tunnel-group IP_SITE2 ipsec-attributes
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
ASA Site 2:
Cisco Adaptive Security Appliance Software Version 9.1(4)
access-list SITE_1 extended permit ip 172.27.97.0 255.255.255.0 172.28.60.0 255.255.254.0
access-list SITE_1 extended permit ip 172.27.97.0 255.255.255.0 172.27.0.0 255.255.0.0
access-list SITE_1 extended permit ip 172.27.97.0 255.255.255.0 172.22.0.0 255.255.0.0
access-list SITE_1 extended permit ip 172.27.99.0 255.255.255.0 172.27.0.0 255.255.0.0
access-list SITE_1 extended permit ip 172.27.99.0 255.255.255.0 172.22.0.0 255.255.0.0
crypto map CMVPN 10 match address SITE_1
crypto map CMVPN 10 match address SITE_1
crypto map CMVPN 10 set peer IP_SITE1
crypto map CMVPN 10 set ikev2 ipsec-proposal IKEV2AES
crypto map CMVPN 10 set reverse-route
crypto map CMVPN interface OUTSIDE
tunnel-group IP_SITE1 type ipsec-l2l
tunnel-group IP_SITE1 general-attributes
default-group-policy VPN_S2S_WAN
tunnel-group IP_SITE1 ipsec-attributes
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
We are not able to reach from 172.22.20.x ips 172.27.99.x.
It seems so that the phase2 for this subnet is missing…...... as long as we try to reach from 172.27.99.x any ip in 172.22.20.x.
We are using similar configuration on many sites and it works correctly expect sites with DSL line.
We can exclude problem with NAT,ACL or routing. The connection is working fine as long as “we open all phase 2 manually” . After re-open (idle timeout) the tunnel the problem comes back.
Thanks in advance for your help.
Regards.
Jan
ASA Site 1# sh vpn-sessiondb detail l2l filter ipaddress ASA Site 2
Session Type: LAN-to-LAN Detailed
Connection : IP ASA Site 2
Index : 3058 IP Addr : IP ASA Site 2
Protocol : IKEv2 IPsec
Encryption : IKEv2: (1)AES256 IPsec: (3)AES256
Hashing : IKEv2: (1)SHA512 IPsec: (3)SHA1
Bytes Tx : 423634 Bytes Rx : 450526
Login Time : 19:59:35 HKT Tue Apr 29 2014
Duration : 1h:50m:45s
IKEv2 Tunnels: 1
IPsec Tunnels: 3
IKEv2:
Tunnel ID : 3058.1
UDP Src Port : 500 UDP Dst Port : 500
Rem Auth Mode: preSharedKeys
Loc Auth Mode: preSharedKeys
Encryption : AES256 Hashing : SHA512
Rekey Int (T): 86400 Seconds Rekey Left(T): 79756 Seconds
PRF : SHA512 D/H Group : 5
Filter Name :
IPv6 Filter :
IPsec:
Tunnel ID : 3058.2
Local Addr : 172.22.0.0/255.255.0.0/0/0
Remote Addr : 172.27.97.0/255.255.255.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 22156 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4607648 K-Bytes
Idle Time Out: 25 Minutes Idle TO Left : 24 Minutes
Bytes Tx : 312546 Bytes Rx : 361444
Pkts Tx : 3745 Pkts Rx : 3785
IPsec:
Tunnel ID : 3058.3
Local Addr : 172.27.0.0/255.255.0.0/0/0
Remote Addr : 172.27.97.0/255.255.255.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 22165 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4607952 K-Bytes
Idle Time Out: 25 Minutes Idle TO Left : 24 Minutes
Bytes Tx : 50014 Bytes Rx : 44621
Pkts Tx : 496 Pkts Rx : 503
IPsec:
Tunnel ID : 3058.4
Local Addr : 172.27.0.0/255.255.0.0/0/0
Remote Addr : 172.27.99.0/255.255.255.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 22324 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4607941 K-Bytes
Idle Time Out: 25 Minutes Idle TO Left : 24 Minutes
Bytes Tx : 61074 Bytes Rx : 44461
Pkts Tx : 402 Pkts Rx : 437
NAC:
Reval Int (T): 0 Seconds Reval Left(T): 0 Seconds
SQ Int (T) : 0 Seconds EoU Age(T) : 6648 Seconds
Hold Left (T): 0 Seconds Posture Token:
Redirect URL :
.... after ping from 172.27.99.x any ip in 172.22.20.x.
ASA Site 1# sh vpn-sessiondb detail l2l filter ipaddress ASA Site 2
Session Type: LAN-to-LAN Detailed
Connection : IP ASA Site 2
Index : 3058 IP Addr : IP ASA Site 2
Protocol : IKEv2 IPsec
Encryption : IKEv2: (1)AES256 IPsec: (4)AES256
Hashing : IKEv2: (1)SHA512 IPsec: (4)SHA1
Bytes Tx : 784455 Bytes Rx : 1808965
Login Time : 19:59:35 HKT Tue Apr 29 2014
Duration : 2h:10m:48s
IKEv2 Tunnels: 1
IPsec Tunnels: 4
IKEv2:
Tunnel ID : 3058.1
UDP Src Port : 500 UDP Dst Port : 500
Rem Auth Mode: preSharedKeys
Loc Auth Mode: preSharedKeys
Encryption : AES256 Hashing : SHA512
Rekey Int (T): 86400 Seconds Rekey Left(T): 78553 Seconds
PRF : SHA512 D/H Group : 5
Filter Name :
IPv6 Filter :
IPsec:
Tunnel ID : 3058.2
Local Addr : 172.22.0.0/255.255.0.0/0/0
Remote Addr : 172.27.97.0/255.255.255.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 20953 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4606335 K-Bytes
Idle Time Out: 25 Minutes Idle TO Left : 24 Minutes
Bytes Tx : 652492 Bytes Rx : 1705136
Pkts Tx : 7419 Pkts Rx : 7611
IPsec:
Tunnel ID : 3058.3
Local Addr : 172.27.0.0/255.255.0.0/0/0
Remote Addr : 172.27.97.0/255.255.255.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 20962 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4607942 K-Bytes
Idle Time Out: 25 Minutes Idle TO Left : 24 Minutes
Bytes Tx : 60128 Bytes Rx : 52359
Pkts Tx : 587 Pkts Rx : 594
IPsec:
Tunnel ID : 3058.4
Local Addr : 172.27.0.0/255.255.0.0/0/0
Remote Addr : 172.27.99.0/255.255.255.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 21121 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4607931 K-Bytes
Idle Time Out: 25 Minutes Idle TO Left : 24 Minutes
Bytes Tx : 70949 Bytes Rx : 50684
Pkts Tx : 475 Pkts Rx : 514
IPsec:
Tunnel ID : 3058.5
Local Addr : 172.22.0.0/255.255.0.0/0/0
Remote Addr : 172.27.99.0/255.255.255.0/0/0
Encryption : AES256 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 28767 Seconds
Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4608000 K-Bytes
Idle Time Out: 25 Minutes Idle TO Left : 24 Minutes
Bytes Tx : 961 Bytes Rx : 871
Pkts Tx : 17 Pkts Rx : 14
NAC:
Reval Int (T): 0 Seconds Reval Left(T): 0 Seconds
SQ Int (T) : 0 Seconds EoU Age(T) : 7852 Seconds
Hold Left (T): 0 Seconds Posture Token:
Redirect URL :Hi,
on 212 is see
tunnel-group 195.xxx.xxx.xxx type ipsec-l2l
tunnel-group 195.xxx.xxx.xxx ipsec-attributes
pre-shared-key
When you define the peer with static tunnel-group entry ASA is looking for peer configuration in static crypto map. If the peer is behind static NAT configure a proper static crypto map with matching acl and proposals.
If the peer is behind dynamic nat refer this example :http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/81883-ipsec-iosrtr-dyn-pix-nat.html
Regards,
Abaji. -
Problem with Cisco 861W router and outgoing VPN
We have a Cisco 861W router that is blocking an outgoing PPTP on the internal access point only. The outgoing VPN works when the traffic is through a wired connection or the connection is on another access point. We fail to make a connection only when connection to the 861W's internal Access Point.
Here is the Access Point Configuration:
Current configuration : 2100 bytes
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname obap
enable secret 5 $1$.1RF$go1D7WITXUn3s8TUaw3tC.
no aaa new-model
dot11 syslog
dot11 ssid OLIVER
authentication open
authentication key-management wpa
guest-mode
wpa-psk ascii 0 XXXXXXXXXXX
username XXXXXX privilege 15 secret 5 $1$Wc0K$OzcQDDQfjHP6La31eXMoG/
bridge irb
interface Dot11Radio0
no ip address
no ip route-cache
encryption mode ciphers aes-ccm tkip
ssid OLIVER
antenna gain 0
station-role root
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
interface GigabitEthernet0
description the embedded AP GigabitEthernet 0 is an internal interface connecti
ng AP with the host router
no ip address
no ip route-cache
bridge-group 1
no bridge-group 1 source-learning
bridge-group 1 spanning-disabled
interface BVI1
ip address 192.168.0.2 255.255.255.0
no ip route-cache
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
bridge 1 route ip
banner login ^CC
% Password change notice.
Default username/password setup on AP is cisco/cisco with priv¾ilege level 15.
It is strongly suggested that you create a new username with privilege level
15 using the following command for console security.
username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want to
use. After you change your username/password you can turn off this message
by configuring "no banner login" and "no banner exec" in privileged mode.
^C
line con 0
privilege level 15
login local
no activation-character
line vty 0 4
login local
cns dhcp
end
obap#
Here is the Router's Configuration:
Current configuration : 5908 bytes
! No configuration change since last restart
version 15.0
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
hostname obrouter
boot-start-marker
boot-end-marker
logging buffered 51200
logging console critical
enable secret 5 $1$i9XE$DjxFVAEC9nC4/r6EQKCd6/
no aaa new-model
memory-size iomem 10
clock timezone PCTime -5
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
crypto pki trustpoint TP-self-signed-1856757619
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1856757619
revocation-check none
rsakeypair TP-self-signed-1856757619
crypto pki certificate chain TP-self-signed-1856757619
certificate self-signed 01
3082024D 308201B6 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31383536 37353736 3139301E 170D3036 30313032 31323030
34345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 38353637
35373631 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B1A4 FB786547 3D582260 03DB768D 116BDE9A 309FBA04 B53F77B0 BFE32344
7C3439B3 97192B36 760A9411 1D5C7549 8D86F532 ABA44F53 0D08B7F4 A9A747D5
071330C3 65BF25A8 927F3596 29BB5A80 90C8D169 22268476 3B8DDE1E FDB7170D
B4820D03 5580A849 A92C7E76 9AC10867 505A2FEE 64360741 7F9DBDBF 3D79982C
F81D0203 010001A3 75307330 0F060355 1D130101 FF040530 030101FF 30200603
551D1104 19301782 156F6272 6F757465 722E6272 75736868 6F672E63 6F6D301F
0603551D 23041830 168014D8 5BC2FFB2 967A4C7B 11B44122 5C8D31F7 749B9230
1D060355 1D0E0416 0414D85B C2FFB296 7A4C7B11 B441225C 8D31F774 9B92300D
06092A86 4886F70D 01010405 00038181 005901F1 C239074B B8213567 CF7B65BF
DAFE4557 69B2A3B1 5F2593C7 A54B9598 23FD5E7A 563AA6E0 AFB25801 FA0061E8
F9545372 DB600B3A BE68AE65 1EDA593E 6A0C96B8 5A4136AF 393F9AAC 651E1C36
B8B7C6C0 47936C24 D2ECE9A5 9446EE32 FC7461FA AD8CF1CE A7FBF341 07E9C3C6
505AB88D 0E7FCAFC 5792298A E5E4D1FE CC
quit
no ip source-route
ip dhcp excluded-address 192.168.0.1 192.168.0.99
ip dhcp pool ccp-pool1
import all
network 192.168.0.0 255.255.255.0
dns-server 216.49.160.10 216.49.160.66
default-router 192.168.0.1
ip cef
no ip bootp server
ip domain name brushhog.com
ip name-server 216.49.160.10
ip name-server 216.49.160.66
license udi pid CISCO861W-GN-A-K9 sn FTX155281FY
username tech38 privilege 15 secret 5 $1$d/4Z$n/23EsXbzfHF5XfJ8Nv.y0
ip tcp synwait-time 10
ip ssh time-out 60
ip ssh authentication-retries 2
interface FastEthernet0
interface FastEthernet1
interface FastEthernet2
interface FastEthernet3
interface FastEthernet4
description $ES_WAN$$FW_OUTSIDE$
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
duplex auto
speed auto
pppoe-client dial-pool-number 1
interface wlan-ap0
description Service module interface to manage the embedded AP
ip unnumbered Vlan1
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
arp timeout 0
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$
ip address 192.168.0.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
ip nat inside
ip virtual-reassembly
ip tcp adjust-mss 1412
interface Dialer0
ip address negotiated
no ip redirects
no ip unreachables
no ip proxy-arp
ip mtu 1452
ip flow ingress
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname XXXXXXXXXXXXX
ppp chap password 7 XXXXXXXXXXXXXXXX
ppp pap sent-username XXXXXXXXXXXXXX password 7 XXXXXXXXXXX
no cdp enable
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source static tcp 192.168.0.25 80 interface Dialer0 80
ip nat inside source list 1 interface Dialer0 overload
ip route 0.0.0.0 0.0.0.0 Dialer0
logging trap debugging
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.0.0 0.0.0.255
dialer-list 1 protocol ip permit
no cdp run
control-plane
banner exec ^C
% Password expiration warning.
Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you
want to use.
^C
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
line con 0
login local
no modem enable
transport output telnet
line aux 0
login local
transport output telnet
line 2
no activation-character
no exec
transport preferred none
transport input all
line vty 0 4
privilege level 15
login local
transport input telnet ssh
scheduler max-task-time 5000
scheduler allocate 4000 1000
scheduler interval 500
end
Any help would be appreciatedHello,
i have the same problem with router CISCO861W-GN-E-K9. Version 12.4(22r)YB5, RELEASE SOFTWARE (fc1)
Can someone help?
Thank you.
Here is my config for internal AP and router. -
ACS 5.x with either AD or RSA Authentication depending on user
I am trying to implement RSA two-factor authentication for our company for access to secure resources.
Our current setup before we had RSA, due to PCI restrictions, was based on AD group membership but was still extremely restrictive on even our admin users to ensure that no secure resources could be accessed without two-factor authentication.
I do not want to have to enable RSA tokens for our entire company - but I would like to be able to allow admins the ability to connect from the outside with two-factor authentication and have access to secure resources in an emergency.
We have less than ten people that require elevated access privileges so my hope is to enable RSA only for those ten users, and leave the rest of the accounts authenticating normally against AD.
I cannot figure out how to configure this. With ACS 4.x such a policy would be simple - just create the user on ACS and point to the Identity Store that I want to authenticate against. Not as easy with 5.x
I tried creating an rules based selection for Identity policy, making RSA the first one, configuring it to drop if no users is found, and configuring the RSA to treat user rejects as user not found. This broke VPN completely.
From what I can tell it seems like ACS really wants me to choose an Identity store based on the NDG - but in this case it will always be our same ASA VPN device.
Anyone know how to accomplish this?
I am running 5.4 with the latest patches.Hope you're well!
I am facing some access issue after completed the ACS (5.1) and AD (Windows 2003) integration, details underneath.
Enable password for (Router, Switches) is working fine if identify source is "Internal Users", unfortunately after completed the integration between ACS to MS AD, and change the Identity source to "AD1" I got the following result
1. able to access network device (cisco switch) using MS AD username and password via SSH/Telnet.
2. Enable password is not working (using the same user password configured in MS AD.
3. When I revert back and change the ACS identity source from "AD1" to "Internal Users" enable password is working fine.
Switch Tacacs Configuration
aaa new-model
aaa authentication login default none
aaa authentication login ACS group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec ACS group tacacs+ local
aaa authorization commands 15 ACS group tacacs+ local
aaa accounting exec ACS start-stop group tacacs+
aaa accounting commands 15 ACS start-stop group tacacs+
aaa authorization console
aaa session-id common
tacacs-server host 10.X.Y.11
tacacs-server timeout 20
tacacs-server directed-request
tacacs-server key gacakey
line vty 0 4
session-timeout 5
access-class 5 in
exec-timeout 5 0
login authentication ACS
authorization commands 15 ACS
authorization exec ACS
accounting commands 15 ACS
accounting exec ACS
logging synchronous
This is my first ACS - AD integration experience, hoping to fix this issue with your support, thanks in advance.
Regards, -
Cisco ISE FlexAuth with 802.1X PCs and IP Phones as MAB multi-domain Q?
Cisco ISE FlexAuth with 802.1X PCs and IP Phones as MAB multi-domain Q?
Im trying to follow the trustsec 2.1 guide on IP Phones into LowImpact mode.
I can get a PC on its own to authenticate via dot1x/tls
I can get a Cisco IP Phone on its own to authenticate via MAB.
When the two are on the same switchport, the phone will authenticate but not the PC. ISE logs EAP timeouts.
The switchport has the LowImpact port ACL of
ip access-group ACL-DEFAULT in
The IP Phone gets a dACL that allows it ok.
I assume MAB phone and dot1x PC is supported? Any ideas?
Thanks in advance.The ISE log detailed steps are as follows:
Steps
11001 Received RADIUS Access-Request
11017 RADIUS created a new session
Evaluating Service Selection Policy
15048 Queried PIP
15048 Queried PIP
15004 Matched rule
11507 Extracted EAP-Response/Identity
12300 Prepared EAP-Request proposing PEAP with challenge
12625 Valid EAP-Key-Name attribute received
11006 Returned RADIUS Access-Challenge
11001 Received RADIUS Access-Request
11018 RADIUS is re-using an existing session
12501 Extracted EAP-Response/NAK requesting to use EAP-TLS instead
12500 Prepared EAP-Request proposing EAP-TLS with challenge
12625 Valid EAP-Key-Name attribute received
11006 Returned RADIUS Access-Challenge
11001 Received RADIUS Access-Request
11018 RADIUS is re-using an existing session
12502 Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated
12800 Extracted first TLS record; TLS handshake started
12805 Extracted TLS ClientHello message
12806 Prepared TLS ServerHello message
12807 Prepared TLS Certificate message
12809 Prepared TLS CertificateRequest message
12505 Prepared EAP-Request with another EAP-TLS challenge
11006 Returned RADIUS Access-Challenge
11001 Received RADIUS Access-Request
11018 RADIUS is re-using an existing session
12504 Extracted EAP-Response containing EAP-TLS challenge-response
12505 Prepared EAP-Request with another EAP-TLS challenge
11006 Returned RADIUS Access-Challenge
11001 Received RADIUS Access-Request
11018 RADIUS is re-using an existing session
12504 Extracted EAP-Response containing EAP-TLS challenge-response
12505 Prepared EAP-Request with another EAP-TLS challenge
11006 Returned RADIUS Access-Challenge
5411 No response received during 120 seconds on last EAP message sent to the client -
ACS 3.3 for windows - Win AD and eap-tls problem
Hi,
I have a problem with an ACS to authenticate users with certificate on MS AD.
Working things:
PEAP authentication with the MS AD;
EAP-TLS authentication with the local DB.
Not working things:
EAP-TLS authentication with MS AD.
Because I'm able to auth users with PEAP on MS AD, I guess my config on MS AD is correct.
Because I'm able to auth users with certif in EAP-TLS, I guess my certif config is correct.
So, why it's not working with the combination EAP-TLS and MS AD.
I receive the error 'External DB Account Restriction'
Thanks for your help.Hi,
This is what is interesting,
AuthenProcessResponse: process response for 'phd' against Windows Database
Unknown User 'phd' was not authenticated
Done RQ1027, client 50, status -2125
The field that is being picked from certificate has the value 'phd', check you check which field is it.
And was the logging at full?, I think something is missing in the logs.
Lets do a sanity check, and go through following link again,
http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a008068d45a.shtml
Regards,
Prem -
Problem with work group bridge authentication with ACS 5.x
EAP-TLS authentication for workgoup brdige fails.
Folloing is the log on ACS
Authentication failed 12514 EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain
12811 Extracted TLS Certificate message containing client certificate.
12814 Prepared TLS Alert message.12817 TLS handshake failed.
12514 EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain
12507 EAP-TLS authentication failed12505 Prepared EAP-Request with another EAP-TLS challenge
11006 Returned RADIUS Access-Challenge
11001 Received RADIUS Access-Request
11018 RADIUS is re-using an existing session
12504 Extracted EAP-Response containing EAP-TLS challenge-response
11504 Prepared EAP-Failure11003 Returned RADIUS Access-RejectI have seen this issue before, the AP is present an old PAC and doesnt update until after you reboot. You can open a wireless TAC case and they will get you the right image as to when this was fixed. As a workaround you can extend the lifetime of the PAC in your authentication settings for EAP-FAST.
Thanks,
Sent from Cisco Technical Support iPad App -
64-bit anyconnect on linux - problems with libraries
Hi,
we in the process of setting up Cisco Anyconenct for Linux 64-bit machines and are noticing some problems which seams to be related to the client not finding all libraries it expects. For example we got the issue that when connecting for the first time(no profile, ie no <ServerCertificateThumbprint>) the client find the Server Certificate no valid(which it is). We found out that the reson for that beeing Anyconnect was not properly using the nss-certstore for all operations. That was because the client cold not locate libnssckbi.so which was solved by:
ln -s /usr/lib64/libnssckbi.so /home/user/.mozilla/firefox/smhi.default/libnssckbi.so
Is there any other common librarie problems we should be aware of?
We are running Redhat 6 desktop.
Best regards
/MattiasHi,
I will reply on my own posting.
Other lib we have found it nessecary to link is:
ln -s /opt/cisco/anyconnect/lib/libcurl.so.3 /opt/cisco/anyconnect/lib/libcurl.so
Also, if running a 32-bit Anyconnect client on a 64-bit OS (which currently would be nessecary if you would like to run host-scan/securedesktop/posture) is:
Create /usr/local/firefox with links
[a001375@c14446 firefox]$ ls -la
total 8
drwxr-xr-x 2 root root 4096 Oct 31 18:37 .
drwxr-xr-x. 14 root root 4096 Oct 31 18:35 ..
lrwxrwxrwx 1 root root 18 Oct 31 17:06 libfreebl3.so -> /lib/libfreebl3.so
lrwxrwxrwx 1 root root 16 Oct 31 17:00 libnspr4.so -> /lib/libnspr4.so
lrwxrwxrwx 1 root root 19 Oct 31 16:58 libnss3.so -> /usr/lib/libnss3.so
lrwxrwxrwx 1 root root 22 Oct 31 16:59 libnssdbm3.so -> /usr/lib/libnssdbm3.so
lrwxrwxrwx 1 root root 15 Oct 31 17:00 libplc4.so -> /lib/libplc4.so
lrwxrwxrwx 1 root root 21 Oct 31 17:00 libsmime3.so -> /usr/lib/libsmime3.so
lrwxrwxrwx 1 root root 23 Oct 31 17:00 libsoftokn3.so -> /usr/lib/libsoftokn3.so
I can also share that I recieved an e-mail the other day from a nice fellow that would let us know they had produced a .SPEC-file for buliding AnyConnect RPMs.
Very usefull, thanks a lot Philip.
You will find information on that here:
https://github.com/pdurbin/anyconnect
Maybe you are looking for
-
Hi Experts, I want to display the below said in top-of-page (alv) as TITLE can include only 72 characters. *FORM TITLE. WRITE BUDAT-LOW DD/MM/YYYY TO DATE1. WRITE BUDAT-HIGH DD/MM/YYYY TO DATE2. CONCATENATE IT_FINAL-NAME1 'Reconcilliation Statement F
-
I am running as an Administrator with SE_BACKUP_NAME, SE_RESTORE_NAME, SE_TAKE_OWNERSHIP_NAME, and SE_SECURITY_NAME enabled on my application. My group information is listed below. The item's path and ACL are C:\tests\test_acl_null\src\1d: O:BGG:SYD:
-
Hi All, am new to colloborative suites, the company i work for is seriously looking into getting IBM Domino but someone mentioned to me that java communication suite would be better. my questions are; 1. how to you get to launch the applications once
-
How do i select everything under my pen tool path.
I have made a path with my pen tool around an image that i desperately want. But if i delete the pentool path everything underneith stays alive. They are both in the same layer so i do not know how to do it. Any help? Yours sincerely, Joep
-
Photoshop elements 13 not working
Hello From today I have the most of the times the below message. Is possible to have help from any one? Thank you http://prntscr.com/5of1ys