Remote-access Guide

cisco asa ipsec remote access vpn configuration asdm

by Hillard Ruecker Published 3 years ago Updated 2 years ago
image

Enabling or Disabling CSD on the ASA

  1. Choose Configuration > Clientless SSL VPN > Secure Desktop > Setup . ASDM opens the Setup pane ( Figure 4-7 ).
  2. Check or uncheck Enable Secure Desktop and click Apply . ASDM enables or disables CSD.
  3. Click the X in the upper right corner of the ASDM window to exit. The configuration has been modified.
  4. Click Save . ASDM saves the configuration and closes. ...

Use the following procedure for step-by-step configuration of ASDM:
  1. Launch the VPN Wizard. ...
  2. Select the type of remote-access VPN tunnel. ...
  3. Set up the tunnel group name. ...
  4. Set the user authentication method. ...
  5. Create the user database. ...
  6. Assign IP addresses. ...
  7. Set up mode configuration attributes. ...
  8. Select the IKE policy.

Full Answer

How do I enable IPsec on ASA?

System Options The Configuration > Remote Access VPN > Network (Client) Access > Advanced > IPsec > System Options pane (also reached using Configuration > Site-to-Site VPN > Advanced > System Options) lets you configure features specific to IPsec and VPN sessions on the ASA.

Can Asa-assigned remote access IPSec VPN users manage the firewall using ASDM?

By default, Cisco ASA-assigned remote access IPSec VPN users will not be able to manage the firewall using Adaptive Security Device Manager (ASDM). Attempts to connect to the ASA firewall using ASDM will fail, and will return the error message "Remote host closed connection during handshake."

How to configure ASDM for remote access?

Use the following procedure for step-by-step configuration of ASDM: Step 1. Launch the VPN Wizard. To launch the VPN Wizard, click Wizards > VPN Wizard, as shown earlier in Figure 21-3. ASDM launches the VPN Wizard, which provides an option to select the VPN tunnel type. Click the Remote Access radio button, as shown in Figure 21-22. Figure 21-22.

Does the ASA support the AnyConnect client firewall?

The ASA supports the AnyConnect client firewall feature with ASA version 8.3 (1) or later, and ASDM version 6.3 (1) or later. This section describes how to configure the client firewall to allow access to local printers, and how to configure the client profile to use the firewall when the VPN connection fails.

image

How does ASA work?

The ASA creates a Virtual Private Network by creating a secure connection across a TCP/IP network (such as the Internet) that users see as a private connection. It can create single-user-to-LAN connections and LAN-to-LAN connections.

What is ASA download?

The ASA downloads the client that matches the operating system of the remote computer. After downloading, the client installs and configures itself, establishes a secure connection and either remains or uninstalls itself (depending on the ASA configuration) when the connection terminates.

What is IKEv2 remote access?

Use the IKEv2 Remote Access Wizard to configure secure remote access for VPN clients, such as mobile users, and to identify the interface that connects to the remote IPsec peer.

How to manage ASA?

To list the things you need to do to manage the ASA through the VPN connection you have to atleast do these things. Configure the VPN Client connection. Confirm that the interface IP address to which you want to connect to is included in the VPN so the users traffic to that IP gets forwarded to the VPN connection.

What is management access?

This command should not affect any existing management connection/configuration you have on the ASA already. The "management- access" command can be active only for a single interface at a time.

Can you create a VPN pool?

You can create the VPN Pool to be pretty much any subnet you want. Typically its some private IP address range. It should be something different from the LAN subnet atleast that you have behind the ASA. The ASA configured with a VPN Pool will give the VPN Client user the IP address from that pool.

Can I use SSH and ASDM to manage an ASA?

And I would like to point out that you can use both SSH and ASDM (HTTPS/SSL) to manage the ASA from the external network without using any form of VPN for this. You can connect to the external interface IP address of the ASA directly. In those cases you could simply add the "http" and "ssh" statements on the ASA to allow the management connections from specific hosts/subnets. Naturally if you dont manage the ASA externally from a specific IP address always then this might not be an option if you want to keep the ASA as secure as possible with regards to management connection options.

Can ASA use VPN?

Any ASA can be configured to use IPsec VPN Client as each unit has support for this. This however uses the older Cisco VPN Client which I guess is not really supported/updated by Cisco anymore. The current way of doing VPN Client connections would be to use the AnyConnect VPN Client.

Can you manage ASA through VPN?

But after you have configured the VPN there are still some configurations you would need to add to be able to manage the ASA through the VPN connections. These settings are not done through any Wizard on the ASDM. (Atleast to my understanding)

Can I use VPN on ASA 5545?

Yes it would be the first time i will be configuring VPN on my ASA 5545 9.1.

1. Check Cisco firewall ASA version

Make sure you have ASA 8.2.2 and up. You cannot connect your Windows clients if you have ASA 8.2.1 because of the Cisco software bug.

2. Start Cisco firewall IPsec VPN Wizard

Login to your Cisco firewall ASA5500 ASDM and go to Wizard > IPsec VPN Wizard ... and follow up the screens.

3. Add Transform Set

Go to Configuration > Remote Access VPN > Network (Client) Access > Advanced > IPSec > Crypto Maps. Edit the IPSec rules and add "TRANS_ESP_3DES_SHA" and click "Ok" button.

What is AnyConnect VPN?

Anyconnect is the replacement for the old Cisco VPN client and supports SSL and IKEv2 IPsec. When it comes to SSL, the ASA offers two SSL VPN modes: Clientless WebVPN. AnyConnect VPN. The clientless WebVPN method does not require a VPN client to be installed on the user’s computer. You just open your web browser, ...

When remote users connect to our WebVPN, do they have to use HTTPS?

The following option is not required but useful, whenever someone accesses the ASA through HTTP then they will be redirected to HTTPS:

What happens when a VPN user terminates a session?

Normally when the remote VPN user terminates the session, the anyconnect installer will be uninstalled. The anyconnect keep-installer installed command leaves it installed on the user’s computer.

What happens when you have an inbound access list?

When you have an inbound access-list on the outside interface then all your decrypted traffic from the SSL WebVPN has to match the inbound access-list. You can either create some permit statements for the decrypted traffic or you can just tell the ASA to let this traffic bypass the access-list:

Why does my client tries to download AnyConnect?

The client tries to download the Anyconnect automatically, this is because of the anyconnect ask none default anyconnect command that we used. Since we are using a self-signed certificate you will get the following error message:

What is the IP address of AnyConnect?

You can see that we received IP address 192.168.10.100 (the first IP address from the VPN pool). Anyconnect creates an additional interface, just like the legacy Cisco VPN client does.

What is an ayconnECT_policy?

The group policy is called “ANYCONNECT_POLICY” and it’s an internal group policy which means that we configure it locally on the ASA. An external group policy could be on a RADIUS server.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9