<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect username USERNAME in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841181#M581932</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/496669"&gt;@anthony.mchie&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not entirely sure how to protect your VPN from outside actors. I have seen some customers put their VPN on non-standard TCP ports. You don't have to run your SSL VPN on TCP/443. Choose a tricky port number like 50443 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; That will keep them guessing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Of course you will need to tell your real clients to use that in the URL - but it might solve your dilemma.&lt;/P&gt;
&lt;P&gt;USERNAME is just a standard string that ISE displays when it doesn't want to reveal the real username. By default, failed authentications have their username obfuscated with the string 'USERNAME' to protect the innocent (e.g. a user accidentally entering their password into the username field ... it happens &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;
&lt;P&gt;You can reveal the username by navigating to Administration &amp;gt; System &amp;gt; Settings &amp;gt; Security Settings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="invalid usernames.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/185389i5FB408591E5BB38B/image-size/large?v=v2&amp;amp;px=999" role="button" title="invalid usernames.png" alt="invalid usernames.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 May 2023 20:17:03 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2023-05-23T20:17:03Z</dc:date>
    <item>
      <title>Anyconnect username USERNAME</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841133#M581929</link>
      <description>&lt;P&gt;ASA version 9.14(4)7 | Anyconnect 4.10 | ISE 2.6&lt;/P&gt;
&lt;P&gt;ISE is authenticating our Annyconnect Clients that connect via a Cisco ASA. We'll get hit with hundreds of connection attempts from questionable countries with the username USERNAME (or at least that's what ISE reports). Typically we'll lose the ability to service any new anyconnect sessions for about 15 minutes after. I created a local user USERNAME specifically to reject the attempts and when I try to authenticate it does just that. Then later, I see that rejection isn't working against this attack. Anyone else see this? Any working solutions?&lt;/P&gt;
&lt;P&gt;Attached are events that represent when I tried to auth vs the attack.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 19:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841133#M581929</guid>
      <dc:creator>anthony.mchie</dc:creator>
      <dc:date>2023-05-23T19:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect username USERNAME</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841142#M581930</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/496669"&gt;@anthony.mchie&lt;/a&gt; best option would be to filter the traffic from those questionable countries before they even attempt to authenticate. You can do this with geolocation filtering on NGFW firewall placed in front of the ASA. You do have the option to use a control-plane ACL on the ASA itself, to restrict IP addresses initating traffic to the ASA.&lt;/P&gt;
&lt;P&gt;What is causing the loss of service for 15 minutes, the ASA itself?&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 19:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841142#M581930</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-23T19:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect username USERNAME</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841173#M581931</link>
      <description>&lt;P&gt;Use control-plane'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Allow only vpn pool subnet access to ISE.&lt;/P&gt;
&lt;P&gt;Note:- allow management IP if you use it with ISE.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 20:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841173#M581931</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-23T20:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect username USERNAME</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841181#M581932</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/496669"&gt;@anthony.mchie&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not entirely sure how to protect your VPN from outside actors. I have seen some customers put their VPN on non-standard TCP ports. You don't have to run your SSL VPN on TCP/443. Choose a tricky port number like 50443 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; That will keep them guessing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Of course you will need to tell your real clients to use that in the URL - but it might solve your dilemma.&lt;/P&gt;
&lt;P&gt;USERNAME is just a standard string that ISE displays when it doesn't want to reveal the real username. By default, failed authentications have their username obfuscated with the string 'USERNAME' to protect the innocent (e.g. a user accidentally entering their password into the username field ... it happens &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;
&lt;P&gt;You can reveal the username by navigating to Administration &amp;gt; System &amp;gt; Settings &amp;gt; Security Settings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="invalid usernames.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/185389i5FB408591E5BB38B/image-size/large?v=v2&amp;amp;px=999" role="button" title="invalid usernames.png" alt="invalid usernames.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 20:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841181#M581932</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-05-23T20:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect username USERNAME</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841183#M581933</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/496669"&gt;@anthony.mchie&lt;/a&gt; best option would be to filter the traffic from those questionable countries before they even attempt to authenticate. You can do this with geolocation filtering on NGFW firewall placed in front of the ASA. You do have the option to use a control-plane ACL on the ASA itself, to restrict IP addresses initating traffic to the ASA.&lt;/P&gt;
&lt;P&gt;What is causing the loss of service for 15 minutes, the ASA itself?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;My answer would only be a guess since I don't see any logging events that clue me into the cause.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Don't have an NGFW in front (unfortunately) so I'll have to find another way.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 20:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841183#M581933</guid>
      <dc:creator>anthony.mchie</dc:creator>
      <dc:date>2023-05-23T20:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect username USERNAME</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841185#M581934</link>
      <description>&lt;P&gt;Not issue with username only'&lt;/P&gt;
&lt;P&gt;The user is fialed to auth to Asa via ISE.&lt;/P&gt;
&lt;P&gt;So I think he under some ddos.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 20:19:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841185#M581934</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-23T20:19:47Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect username USERNAME</title>
      <link>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841195#M581935</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/82347"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;That's going to help quite a bit. Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 20:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/anyconnect-username-username/m-p/4841195#M581935</guid>
      <dc:creator>anthony.mchie</dc:creator>
      <dc:date>2023-05-23T20:21:19Z</dc:date>
    </item>
  </channel>
</rss>

