<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA VPN HTTP 401 When automatic certificate selection is enabled in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4068852#M1069314</link>
    <description>&lt;P&gt;We're in the process of laying the groundwork for using AAA+Cert auth for VPN connectivity but we've hit a bit of a SNAFU. In the AnyConnect config on the ASA we've specified Certificate Store Override and Automatic Certificate Selection in preparation but now machines are suddenly having issues connecting despite the fact that we haven't enabled cert auth yet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The message that is received by the end user is: "The secure gateway has rejected the connection attempt. A new connection attempt to the same or another secure gateway is needed, which requires re-authentication. The following message was received from the secure gateway: Other error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I look closer in the logs it looks like the error is being generated by this: "The HTTP response code from the secure gateway is 401, Other error HTTP/1.1 401 Unauthorized&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To add to my own confusion here are some other things that I can't explain.&lt;/P&gt;&lt;P&gt;If I manually uncheck "Automatic Certificate Selection", I can connect again. I'm not prompted to select a cert as I would expect because certificate auth is not required anywhere.&lt;/P&gt;&lt;P&gt;If I connect directly to a VPN appliance instead of using the load balanced name, this works. Maybe this is a load balancer issue but from the logs it seems like the client is reaching out to an appliance at the point that the failure occurs so I'm not sure what else to try... I'll probably open a TAC case but I figured I'd see if anyone else has some suggestions.&lt;/P&gt;</description>
    <pubDate>Sat, 18 Apr 2020 20:37:01 GMT</pubDate>
    <dc:creator>powelca</dc:creator>
    <dc:date>2020-04-18T20:37:01Z</dc:date>
    <item>
      <title>ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4068852#M1069314</link>
      <description>&lt;P&gt;We're in the process of laying the groundwork for using AAA+Cert auth for VPN connectivity but we've hit a bit of a SNAFU. In the AnyConnect config on the ASA we've specified Certificate Store Override and Automatic Certificate Selection in preparation but now machines are suddenly having issues connecting despite the fact that we haven't enabled cert auth yet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The message that is received by the end user is: "The secure gateway has rejected the connection attempt. A new connection attempt to the same or another secure gateway is needed, which requires re-authentication. The following message was received from the secure gateway: Other error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I look closer in the logs it looks like the error is being generated by this: "The HTTP response code from the secure gateway is 401, Other error HTTP/1.1 401 Unauthorized&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To add to my own confusion here are some other things that I can't explain.&lt;/P&gt;&lt;P&gt;If I manually uncheck "Automatic Certificate Selection", I can connect again. I'm not prompted to select a cert as I would expect because certificate auth is not required anywhere.&lt;/P&gt;&lt;P&gt;If I connect directly to a VPN appliance instead of using the load balanced name, this works. Maybe this is a load balancer issue but from the logs it seems like the client is reaching out to an appliance at the point that the failure occurs so I'm not sure what else to try... I'll probably open a TAC case but I figured I'd see if anyone else has some suggestions.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2020 20:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4068852#M1069314</guid>
      <dc:creator>powelca</dc:creator>
      <dc:date>2020-04-18T20:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4079919#M1069874</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the same issue. Did you finally find the answer to your problem ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot in advance&lt;/P&gt;&lt;P&gt;Sylvie&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 17:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4079919#M1069874</guid>
      <dc:creator>sbrunell</dc:creator>
      <dc:date>2020-05-05T17:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4079947#M1069876</link>
      <description>Appears to be this:&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt81585" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt81585&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;For the time being we had to disable load balancing and are operating with a single appliance with the secondary configured as a failover.</description>
      <pubDate>Tue, 05 May 2020 18:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4079947#M1069876</guid>
      <dc:creator>powelca</dc:creator>
      <dc:date>2020-05-05T18:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4093868#M1070533</link>
      <description>&lt;P&gt;Did you ever get any kind of resolution from TAC on this other than to disable LB?&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 19:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4093868#M1070533</guid>
      <dc:creator>CMD0968</dc:creator>
      <dc:date>2020-05-28T19:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4093877#M1070535</link>
      <description>We were provided with a hotfixed version of AnyConnect that seems to resolve the issue but since we've already worked around the problem we opted to wait for the next GA release. Rumor has it this will be sometime in June.</description>
      <pubDate>Thu, 28 May 2020 20:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4093877#M1070535</guid>
      <dc:creator>powelca</dc:creator>
      <dc:date>2020-05-28T20:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4128806#M1072498</link>
      <description>&lt;P&gt;In case anyone stumbles upon this in the future, this bug is marked as fixed in AnyConnect 4.9.00086. In my testing I have not been able to reproduce the issue. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 18:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4128806#M1072498</guid>
      <dc:creator>powelca</dc:creator>
      <dc:date>2020-07-31T18:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4128809#M1072499</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1015905"&gt;@powelca&lt;/a&gt;&amp;nbsp;for the followup.&amp;nbsp; When you migrated to 4.9, did you have any issues with the update to the algorithms?&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class="p"&gt;&lt;EM&gt;For SSL VPN, AnyConnect no longer supports the following cipher suites from both TLS and DTLS: DHE-RSA-AES256-SHA and DES-CBC3-SHA&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p"&gt;&lt;EM&gt;For IKEv2/IPsec, AnyConnect no longer supports the following algorithms:&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class="p"&gt;&lt;EM&gt;Encryption algorithms: DES and 3DES&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p"&gt;&lt;EM&gt;Pseudo Random Function (PRF) algorithm: MD5&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p"&gt;&lt;EM&gt;Integrity algorithm: MD5&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p"&gt;&lt;EM&gt;Diffie-Hellman (DH) groups: 2, 5, 14, 24&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 18:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4128809#M1072499</guid>
      <dc:creator>CMD0968</dc:creator>
      <dc:date>2020-07-31T18:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA VPN HTTP 401 When automatic certificate selection is enabled</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4128942#M1072504</link>
      <description>&lt;P&gt;Those are old algorithms deprecated in AC 4.9. As long as you are running a relatively modern ASA (i..e. running software released in the last 5 years) you should have no problem supporting the newer algorithms, especially for SSL VPN.&lt;/P&gt;
&lt;P&gt;If you are using IKEv2 for your remote access VPN (uncommon) and have hard-coded the only the older DH groups or hash algorithm then you could potentially have issues (easily resolved but still issues).&lt;/P&gt;
&lt;P&gt;You can always test by upgrading one client using the offline installer and then connecting to your VPN.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Aug 2020 04:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-http-401-when-automatic-certificate-selection-is-enabled/m-p/4128942#M1072504</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-08-01T04:11:59Z</dc:date>
    </item>
  </channel>
</rss>

