<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Harden AnyConnect RA VPN Headend in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/harden-anyconnect-ra-vpn-headend/m-p/4179671#M1075547</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;there was a recent security scan on our anyconnect VPN headend and would like to "harden" the ASA FW.&lt;/P&gt;&lt;P&gt;for the SSL DH group, i would need to change it to 2048 bits but there are 2 options presented: group 14 (224-bit) and group 24 (256-bit). which i should i choose without impacting the CPU or VPN performance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa# show ssl&lt;BR /&gt;Accept connections using SSLv3 or greater and negotiate to TLSv1 or greater&lt;BR /&gt;Start connections using TLSv1 and negotiate to TLSv1 or greater&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;SSL DH Group: group2 (1024-bit modulus)&lt;/FONT&gt;&lt;BR /&gt;SSL ECDH Group: group19 (256-bit EC)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa(config)# ssl dh-group ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; group2&amp;nbsp;&amp;nbsp; Configure DH group 2 - 1024-bit modulus&lt;/P&gt;&lt;P&gt;&amp;nbsp; group5&amp;nbsp;&amp;nbsp; Configure DH group 5 - 1536-bit modulus&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp; group14&amp;nbsp; Configure DH group 14 - 2048-bit modulus, 224-bit prime order&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subgroup (FIPS)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp; group24&amp;nbsp; Configure DH group 24 - 2048-bit modulus, 256-bit prime order&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subgroup (FIPS)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would also need to move away from TLS 1/1.1 and force the anyconnect client to use TLS 1.2 instead.&lt;/P&gt;&lt;P&gt;do i just issue the 'ssl cipher tlsv1.2' global command? does it need to be the same for DTLS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa# show ssl ciphers&lt;/P&gt;&lt;P&gt;Current cipher configuration:&lt;/P&gt;&lt;P&gt;default (medium):&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;tlsv1 (medium):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;tlsv1.1 (medium):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;tlsv1.2 (medium):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;dtlsv1 (medium):&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;dtlsv1.2 (medium):&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa# show vpn-sessiondb detail anyconnect&lt;/P&gt;&lt;P&gt;&amp;lt;SNIP&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SSL-Tunnel:&lt;BR /&gt;Tunnel ID : 9912.2&lt;BR /&gt;Assigned IP : 172.20.x.x Public IP : 98.196.x.x&lt;BR /&gt;Encryption : AES-GCM-256 Hashing : SHA384&lt;BR /&gt;Ciphersuite : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Encapsulation: TLSv1.2&lt;/FONT&gt; TCP Src Port : 60180&lt;BR /&gt;TCP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 30 Minutes Idle TO Left : 0 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : SSL VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.03052&lt;BR /&gt;Bytes Tx : 8082 Bytes Rx : 3602&lt;BR /&gt;Pkts Tx : 6 Pkts Rx : 39&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;DTLS-Tunnel:&lt;BR /&gt;Tunnel ID : 9912.3&lt;BR /&gt;Assigned IP : 172.20.x.x Public IP : 98.196.x.x&lt;BR /&gt;Encryption : AES-GCM-256 Hashing : SHA384&lt;BR /&gt;Ciphersuite : ECDHE-ECDSA-AES256-GCM-SHA384&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Encapsulation: DTLSv1.2&lt;/FONT&gt; UDP Src Port : 60111&lt;BR /&gt;UDP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 30 Minutes Idle TO Left : 30 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : DTLS VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.03052&lt;BR /&gt;Bytes Tx : 7249188633 Bytes Rx : 2071825003&lt;BR /&gt;Pkts Tx : 9667600 Pkts Rx : 7676173&lt;BR /&gt;Pkts Tx Drop : 42132 Pkts Rx Drop : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;asa(config)# ssl cipher ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;default Specify the set of ciphers for outbound connections&lt;BR /&gt;dtlsv1 Specify the ciphers for DTLSv1 inbound connections&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;dtlsv1.2 Specify the ciphers for DTLSv1.2 inbound connections&lt;/FONT&gt;&lt;BR /&gt;tlsv1 Specify the ciphers for TLSv1 inbound connections&lt;BR /&gt;tlsv1.1 Specify the ciphers for TLSv1.1 inbound connections&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;tlsv1.2 Specify the ciphers for TLSv1.2 inbound connections&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Nov 2020 01:07:57 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2020-11-06T01:07:57Z</dc:date>
    <item>
      <title>Harden AnyConnect RA VPN Headend</title>
      <link>https://community.cisco.com/t5/network-security/harden-anyconnect-ra-vpn-headend/m-p/4179671#M1075547</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;there was a recent security scan on our anyconnect VPN headend and would like to "harden" the ASA FW.&lt;/P&gt;&lt;P&gt;for the SSL DH group, i would need to change it to 2048 bits but there are 2 options presented: group 14 (224-bit) and group 24 (256-bit). which i should i choose without impacting the CPU or VPN performance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa# show ssl&lt;BR /&gt;Accept connections using SSLv3 or greater and negotiate to TLSv1 or greater&lt;BR /&gt;Start connections using TLSv1 and negotiate to TLSv1 or greater&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;SSL DH Group: group2 (1024-bit modulus)&lt;/FONT&gt;&lt;BR /&gt;SSL ECDH Group: group19 (256-bit EC)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa(config)# ssl dh-group ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; group2&amp;nbsp;&amp;nbsp; Configure DH group 2 - 1024-bit modulus&lt;/P&gt;&lt;P&gt;&amp;nbsp; group5&amp;nbsp;&amp;nbsp; Configure DH group 5 - 1536-bit modulus&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp; group14&amp;nbsp; Configure DH group 14 - 2048-bit modulus, 224-bit prime order&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subgroup (FIPS)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp; group24&amp;nbsp; Configure DH group 24 - 2048-bit modulus, 256-bit prime order&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subgroup (FIPS)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would also need to move away from TLS 1/1.1 and force the anyconnect client to use TLS 1.2 instead.&lt;/P&gt;&lt;P&gt;do i just issue the 'ssl cipher tlsv1.2' global command? does it need to be the same for DTLS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa# show ssl ciphers&lt;/P&gt;&lt;P&gt;Current cipher configuration:&lt;/P&gt;&lt;P&gt;default (medium):&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;tlsv1 (medium):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;tlsv1.1 (medium):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;tlsv1.2 (medium):&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;dtlsv1 (medium):&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;dtlsv1.2 (medium):&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES256-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-ECDSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; ECDHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES256-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; DHE-RSA-AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp; AES128-SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa# show vpn-sessiondb detail anyconnect&lt;/P&gt;&lt;P&gt;&amp;lt;SNIP&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SSL-Tunnel:&lt;BR /&gt;Tunnel ID : 9912.2&lt;BR /&gt;Assigned IP : 172.20.x.x Public IP : 98.196.x.x&lt;BR /&gt;Encryption : AES-GCM-256 Hashing : SHA384&lt;BR /&gt;Ciphersuite : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Encapsulation: TLSv1.2&lt;/FONT&gt; TCP Src Port : 60180&lt;BR /&gt;TCP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 30 Minutes Idle TO Left : 0 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : SSL VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.03052&lt;BR /&gt;Bytes Tx : 8082 Bytes Rx : 3602&lt;BR /&gt;Pkts Tx : 6 Pkts Rx : 39&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;DTLS-Tunnel:&lt;BR /&gt;Tunnel ID : 9912.3&lt;BR /&gt;Assigned IP : 172.20.x.x Public IP : 98.196.x.x&lt;BR /&gt;Encryption : AES-GCM-256 Hashing : SHA384&lt;BR /&gt;Ciphersuite : ECDHE-ECDSA-AES256-GCM-SHA384&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Encapsulation: DTLSv1.2&lt;/FONT&gt; UDP Src Port : 60111&lt;BR /&gt;UDP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 30 Minutes Idle TO Left : 30 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : DTLS VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.03052&lt;BR /&gt;Bytes Tx : 7249188633 Bytes Rx : 2071825003&lt;BR /&gt;Pkts Tx : 9667600 Pkts Rx : 7676173&lt;BR /&gt;Pkts Tx Drop : 42132 Pkts Rx Drop : 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;asa(config)# ssl cipher ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;default Specify the set of ciphers for outbound connections&lt;BR /&gt;dtlsv1 Specify the ciphers for DTLSv1 inbound connections&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;dtlsv1.2 Specify the ciphers for DTLSv1.2 inbound connections&lt;/FONT&gt;&lt;BR /&gt;tlsv1 Specify the ciphers for TLSv1 inbound connections&lt;BR /&gt;tlsv1.1 Specify the ciphers for TLSv1.1 inbound connections&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;tlsv1.2 Specify the ciphers for TLSv1.2 inbound connections&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 01:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/harden-anyconnect-ra-vpn-headend/m-p/4179671#M1075547</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2020-11-06T01:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Harden AnyConnect RA VPN Headend</title>
      <link>https://community.cisco.com/t5/network-security/harden-anyconnect-ra-vpn-headend/m-p/4179826#M1075551</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326072"&gt;@johnlloyd_13&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should go with DH group14, as group 2, 5 and 24 are depreciated from ASA 9.13 as being insecure. Group 14 will be the default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes specify the same for DTLS, as you want to be using DTLS over TLS. When using DTLS it uses AES-GCM as default (which is observed by your output), so you can expect improved performance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a useful guide&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/asa-best-practices-for-remote-access-vpn-performance/ta-p/4070579" target="_self"&gt;https://community.cisco.com/t5/security-documents/asa-best-practices-for-remote-access-vpn-performance/ta-p/4070579&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 07:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/harden-anyconnect-ra-vpn-headend/m-p/4179826#M1075551</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-11-06T07:53:53Z</dc:date>
    </item>
    <item>
      <title>Re: Harden AnyConnect RA VPN Headend</title>
      <link>https://community.cisco.com/t5/network-security/harden-anyconnect-ra-vpn-headend/m-p/4179828#M1075552</link>
      <description>&lt;P&gt;hi rob,&lt;/P&gt;&lt;P&gt;thanks for your feedback and the cool link provided!&lt;/P&gt;&lt;P&gt;just another question, when i change these settings will it cause a disruption to the VPN users?&lt;/P&gt;&lt;P&gt;i want to take precautions here since a lot of us are WFH.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 08:03:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/harden-anyconnect-ra-vpn-headend/m-p/4179828#M1075552</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2020-11-06T08:03:25Z</dc:date>
    </item>
  </channel>
</rss>

