<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Marvin for your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636978#M194753</link>
    <description>&lt;P&gt;Thanks Marvin for your comments. And Ronald if you have not configured your router for anyconnect then here is a good example to start with :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/routers/3800-series-integrated-services-routers/110608-ssl-ios-00.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As Marvin mentioned these are two different &amp;nbsp;client and you have to setup your router for anyconnect.&lt;/P&gt;</description>
    <pubDate>Fri, 01 May 2015 15:54:02 GMT</pubDate>
    <dc:creator>Mohammad Alhyari</dc:creator>
    <dc:date>2015-05-01T15:54:02Z</dc:date>
    <item>
      <title>Ask the Expert: Configuring and Troubleshooting remote access SSL VPN on Cisco Adaptive Security Appliance</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636966#M194741</link>
      <description>&lt;P&gt;&lt;IMG align="right" src="https://community.cisco.com/legacyfs/online/styles/80x110/public/photo/expert/ate-logo_80x110-for-upload_v2_5.jpg" style="padding-left:10px" /&gt;This an opportunity to learn about Cisco SSL VPN&amp;nbsp; feature, clientless VPN and Anyconnect remote access client with Mohammad Alhyari.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color:#FF0000;"&gt;&lt;SPAN class="event-start" data-event-timestamp="" id="eventStart"&gt;Monday, April 27th, 2015&amp;nbsp; &lt;/SPAN&gt; to &lt;SPAN class="event-end" data-event-timestamp="" id="eventEnd"&gt; Friday, May 8th, 2015 &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Featured Expert&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG align="left" alt="Cisco Expert" src="https://community.cisco.com/legacyfs/online/media/malhyari.jpg" style="padding-right:7px;" title="Cisco Expert" /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Mohammad Alhyari&lt;/STRONG&gt; is a customer support engineer at the Cisco Technical assistance center in Krakow, Poland. CCIE security #35093 with over 5 years of experience in the security team. Mohammed's area of expertise is security, including VPN, SSL VPN, and IPSEC VPN on the Cisco IOS and Cisco ASA platforms.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Find other&amp;nbsp; &lt;A href="https://supportforums.cisco.com/expert-corner/events" target="_blank"&gt;https://supportforums.cisco.com/expert-corner/events.&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#FF8C00"&gt;&lt;STRONG&gt;**Ratings Encourage Participation! **&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color:#FF8C00"&gt;&lt;STRONG&gt;Please be sure to rate the Answers to Questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636966#M194741</guid>
      <dc:creator>Lisa Latour</dc:creator>
      <dc:date>2019-03-12T05:49:21Z</dc:date>
    </item>
    <item>
      <title>Hi Mohammad,     I have few</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636967#M194742</link>
      <description>&lt;P&gt;Hi Mohammad,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have few "old" question regarding this discussion's topic, already posted around here, and a new one about licensing.&lt;/P&gt;&lt;P&gt;So here is the question: we manage a scenario based on a couple of old ASA5510 with A/S failover configuration; we have 150 AnyConnect Premium Peers licences but now we need to upgrade them to 200 or more. We got informed that the licensing model is changed and now we need to purchase "Apex" license as "AnyConnect Premium Peers" is no more an option. There will be platform-related problems activating and using the new licences? The old asa5510 support Apex license? It seems that our local Cisco commercial channel can't answer this question.&lt;/P&gt;&lt;P&gt;In my profile ( &lt;A href="https://supportforums.cisco.com/users/flaviovettori" target="_blank"&gt;https://supportforums.cisco.com/users/flaviovettori&lt;/A&gt; ) you can review other "old" question, still unanswered, for example:&lt;/P&gt;&lt;P&gt;"our webvpn portal is deployed in a DMZ scenario, so the webvpn ASA's interface has a private address behind another firewalling gateway; we noticed that a portion of our users do access the portal from within the corporate's network, let's say from 10.0.0.0/8 ip space instead of the "outside" (the whole internet).&lt;/P&gt;&lt;P&gt;We would create something like a DAP which intercepts the situation (useraname: any authenticated, source ip address: from 10.0.0.0/8) and apply a message or another action to the logged user: is this possible?"&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;BR /&gt;Flavio&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 14:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636967#M194742</guid>
      <dc:creator>Flavio Vettori</dc:creator>
      <dc:date>2015-04-29T14:33:37Z</dc:date>
    </item>
    <item>
      <title>Mohammad,What is your opinion</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636968#M194743</link>
      <description>&lt;P&gt;Mohammad,&lt;/P&gt;&lt;P&gt;What is your opinion about setting up SSO (single sign-on) for Cisco AnyConnect?&amp;nbsp;&amp;nbsp;Have you run into any issues with the VPN using SSO?&amp;nbsp; We have ASA 5510 and RADIUS server.&amp;nbsp; Does SSO also work on Cisco VPN client?&amp;nbsp; Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 16:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636968#M194743</guid>
      <dc:creator>laurabolda</dc:creator>
      <dc:date>2015-04-29T16:53:27Z</dc:date>
    </item>
    <item>
      <title>Hi Flavio ,Thanks for posting</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636969#M194744</link>
      <description>&lt;P&gt;Hi Flavio ,&lt;/P&gt;&lt;P&gt;Thanks for posting your question here . Please have a look at the following :&lt;/P&gt;&lt;P&gt;1- There are no restrictions on ASA versions for the Plus/Apex licenses. Any ASA capable of supporting AnyConnect will support the new license model..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2- For your question about the filtering based on the source ip address . Currently this can't be done with DAP and we have the following product enhancement request for this :&lt;/P&gt;&lt;P&gt;CSCsl52329 &amp;nbsp; &amp;nbsp;Choose TG/DAP based upon source IP subnet &amp;amp; other endpoint conditions&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a workaround you can try one of the following :&lt;/P&gt;&lt;P&gt;a) configure a control plane access list to drop the traffic based on the source address . for more information please see this for the control plane option :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/a1.html#wp1558738&lt;/P&gt;&lt;P&gt;b) if you are using Radius you can use the calling station ID attribute .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope you you will find this helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 14:39:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636969#M194744</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-04-30T14:39:19Z</dc:date>
    </item>
    <item>
      <title>Hi Laura ,SSO works with</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636970#M194745</link>
      <description>&lt;P&gt;Hi Laura ,&lt;/P&gt;&lt;P&gt;SSO works with clientless webvpn (ssl portal), it is&amp;nbsp;&amp;nbsp;is not available for the anyconnect client . The produce Enhancement request for this :&lt;/P&gt;&lt;P&gt;CSCti8145&amp;nbsp;Implement SSO (Single Signon) with the AnyConnect client&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 14:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636970#M194745</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-04-30T14:48:57Z</dc:date>
    </item>
    <item>
      <title>Mohammad,We are setting up</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636971#M194746</link>
      <description>&lt;P&gt;Mohammad,&lt;/P&gt;&lt;P&gt;We are setting up the cold site for DR (Disaster Recovery).&amp;nbsp; Would you recommend clientless VPN for DR?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 17:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636971#M194746</guid>
      <dc:creator>laurabolda</dc:creator>
      <dc:date>2015-04-30T17:42:25Z</dc:date>
    </item>
    <item>
      <title>Hi Laura.Clientless vpn</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636972#M194747</link>
      <description>&lt;P&gt;Hi Laura.&lt;/P&gt;&lt;P&gt;Clientless vpn provides the access to internal web based applications through the ssl tunnel that is built between the user browser and the ASA so it requires no client to be installed on the machine. it also supports SSO for those internal resources. It can be used to provide access to the following as an example :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http/https websites .&lt;/P&gt;&lt;P&gt;OWA access&amp;nbsp;&lt;/P&gt;&lt;P&gt;Citrix environments .&lt;/P&gt;&lt;P&gt;File access such as CIFS&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a good document that explains the detail :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/70475-webvpnasa.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the other hand anyconnect provides a full IP tunnel. So it provides full connectivity with the inside resources .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on that and with respect to your requirements you can decide which one is needed .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH .&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 19:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636972#M194747</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-04-30T19:52:27Z</dc:date>
    </item>
    <item>
      <title>Czesc,simply question</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636973#M194748</link>
      <description>&lt;P&gt;Czesc,&lt;/P&gt;&lt;P&gt;simply question Mohammad - when we have to use AnyConnect client and when VPN Client 5.x for&lt;/P&gt;&lt;P&gt;IPSec VPN with MS LDAP authentication (except situation when we have GPRS/LTE modem on USB) ?&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Marcin&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 20:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636973#M194748</guid>
      <dc:creator>marcin_nieweglowski</dc:creator>
      <dc:date>2015-04-30T20:31:28Z</dc:date>
    </item>
    <item>
      <title>Dear Mr Mohammad Alhyari,I</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636974#M194749</link>
      <description>&lt;P&gt;Dear Mr Mohammad Alhyari,&lt;/P&gt;&lt;P&gt;I have installed the Cisco mobility client 3.1.01065 in a win 7 (x64) system and try to connect to a SRP527 router.&lt;/P&gt;&lt;P&gt;When enter the WAN IP address from the SRP I get: could not connect to server.&lt;/P&gt;&lt;P&gt;With my XP computer where version 5 is installed all is working fine and the VPN is activated. How do I get the things running with the Win 7 system?&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2015 11:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636974#M194749</guid>
      <dc:creator>Ronald RiemVis</dc:creator>
      <dc:date>2015-05-01T11:59:19Z</dc:date>
    </item>
    <item>
      <title>Hi Marcin ,Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636975#M194750</link>
      <description>&lt;P&gt;Hi Marcin ,&lt;/P&gt;&lt;P&gt;Thanks for the sharing your question here . First i would like to mention that the ipsec client is EOL :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/products/collateral/security/vpn-client/end_of_life_c51-680819.html&lt;/P&gt;&lt;P&gt;Anyconnect provide full tunnel using TLS, DTLS and IPSEC (with IKEv2 integration) and all the new features are integrated into the cisco anyconnect client so we recommend to migrate from the legacy ipsec client to the cisco anyconnect solution . Anyconnect doesn't have the limitations ipsec client has .&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example :&lt;/P&gt;&lt;P&gt;1- &amp;nbsp;End point assessment features (hostscan , prelogin check .... )&lt;/P&gt;&lt;P&gt;2- More control on the client machine (Trusted network detection and always on).&lt;/P&gt;&lt;P&gt;3- IKEv2 support .&lt;/P&gt;&lt;P&gt;4- optimal gateway selection .&lt;/P&gt;&lt;P&gt;This is just an example &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;one big difference was that the legacy client provided ipsec tunnel functionality which has been added to anyconnect when we started supporting ikev2 .&lt;/P&gt;&lt;P&gt;I encourage you &amp;nbsp;to go through the following :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/products/collateral/security/anyconnect-secure-mobility-client/qa_c67-712937.html?cachemode=refresh&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/solutions/enterprise-networks/anyconnect-secure-mobility-solution/index.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please feel free to post any concerns related to this .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards.&lt;/P&gt;&lt;P&gt;Mohammad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2015 13:55:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636975#M194750</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-05-01T13:55:44Z</dc:date>
    </item>
    <item>
      <title>Hi Ronald,It might be a</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636976#M194751</link>
      <description>&lt;P&gt;Hi Ronald,&lt;/P&gt;&lt;P&gt;It might be a connectivity issue from your machine to the router on TCP port 443 . &amp;nbsp;can you telnet from the machine to the Router on that port ? If you use your Browser, Do you see a response for &lt;A href="https://WAN-ADDRESS" target="_blank"&gt;https://WAN-ADDRESS&lt;/A&gt; ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please show me your configuration if possible .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2015 13:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636976#M194751</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-05-01T13:59:01Z</dc:date>
    </item>
    <item>
      <title>Ronald,Your XP computer with</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636977#M194752</link>
      <description>&lt;P&gt;Ronald,&lt;/P&gt;&lt;P&gt;Your XP computer with version 5 would be version 5 of the Cisco IPsec (IKEv1) VPN client.&lt;/P&gt;&lt;P&gt;AnyConnect Secure Mobility Client is a client primarily for SSL VPN (although it also works with the newer&amp;nbsp;and less common IPsec IKEv2).&lt;/P&gt;&lt;P&gt;The router would need to have a configuration change to additionally support AnyConnect-based clients.&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2015 14:33:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636977#M194752</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-05-01T14:33:04Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin for your</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636978#M194753</link>
      <description>&lt;P&gt;Thanks Marvin for your comments. And Ronald if you have not configured your router for anyconnect then here is a good example to start with :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/routers/3800-series-integrated-services-routers/110608-ssl-ios-00.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As Marvin mentioned these are two different &amp;nbsp;client and you have to setup your router for anyconnect.&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2015 15:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636978#M194753</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-05-01T15:54:02Z</dc:date>
    </item>
    <item>
      <title>I have a ASA5505. I am</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636979#M194754</link>
      <description>&lt;P&gt;I have a ASA5505. I am failing on my PCI compliancy tests because my device only supports TLSv1.0. I needs to support TLSv1.1 or 1.2 Does anyone know how I can fix this?&amp;nbsp;Is there a software upgrade?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2015 19:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636979#M194754</guid>
      <dc:creator>dkajohn123</dc:creator>
      <dc:date>2015-05-01T19:17:43Z</dc:date>
    </item>
    <item>
      <title>Hi ,Thanks a lot for sharing</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636980#M194755</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;Thanks a lot for sharing the question here . U&lt;SPAN style="font-size: 14.399998664856px; background-color: rgb(249, 249, 249);"&gt;nfortunately TLS1.1 and TLS1.2 are not available&amp;nbsp;&amp;nbsp;f&lt;/SPAN&gt;or the legacy ASA models listed below :&lt;/P&gt;&lt;P&gt;5505&lt;BR /&gt;5510&lt;BR /&gt;5520&lt;BR /&gt;5540&lt;BR /&gt;5550&lt;/P&gt;&lt;P&gt;it is available on the ASA next generation firewalls &amp;nbsp;5500-X starting with the software version 9.3.2:&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/release/notes/asarn93.html&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 11.399998664856px; line-height: normal;"&gt;"We now support TLS version 1.2 for secure message transmission for ASDM, Clientless SSVPN, and AnyConnect VPN."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2015 00:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636980#M194755</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-05-02T00:10:57Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin,The SRP500</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636981#M194756</link>
      <description>&lt;P&gt;Thanks Marvin,&lt;/P&gt;&lt;P&gt;The SRP500 series is out&amp;nbsp; of service but loaded with the latest firmware.&lt;/P&gt;&lt;P&gt;I only have the choice for a group + password and users + password.&lt;/P&gt;&lt;P&gt;Is there no way to make a configuration file which I can use on the client side to connect to that router?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2015 05:06:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636981#M194756</guid>
      <dc:creator>Ronald RiemVis</dc:creator>
      <dc:date>2015-05-02T05:06:25Z</dc:date>
    </item>
    <item>
      <title>Hi Mohammad,I can telnet to</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636982#M194757</link>
      <description>&lt;P&gt;Hi Mohammad,&lt;/P&gt;&lt;P&gt;I can telnet to that port from remote but will see no answer, port 443 is accepted&lt;/P&gt;&lt;P&gt;What would be the sequence from the client side to make the connection possible based on user group and single user?&lt;/P&gt;&lt;P&gt;The client will make his own script after a success full connection?&lt;/P&gt;&lt;P&gt;I can send pictures from the GUI interface, I have no configuration files to show you&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2015 05:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636982#M194757</guid>
      <dc:creator>Ronald RiemVis</dc:creator>
      <dc:date>2015-05-02T05:10:54Z</dc:date>
    </item>
    <item>
      <title>I have a Cisco 2851</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636983#M194758</link>
      <description>&lt;P&gt;I have a Cisco 2851 Adventerprise-k9 with the latest cisco anyconnect pkg installed on the router. I am able to get everything to work fine as far as connecting to my private network but I would like to change the self signed cert for one that was purchased from a third party that I would like to insert into the router to make the untrusted servers pop ups go away. Can you provide me with any insight on how to install those 4 certs they provided me with as to how to get them on the router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Matthew&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2015 10:22:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636983#M194758</guid>
      <dc:creator>matthew wolf</dc:creator>
      <dc:date>2015-05-02T10:22:12Z</dc:date>
    </item>
    <item>
      <title>Hi Mathew ,For Certificates</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636984#M194759</link>
      <description>&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;Hi Mathew ,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;For Certificates you have two types :&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;identity certificate &amp;nbsp; : A certificate that is issued to the device .&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;CA/Sub-CA certificates: A certificate authority that signs certificate for end points .&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;Since that you mentioned you have 4 certificates then i'm assuming that you have a chain of certificates . Now to install the certificates let us look at this example :&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;Root-CA-----Sub-CA1-----Sub-&lt;WBR /&gt;CA2---identity .&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;On cisco Routers and ASAs the certificate is installed in a containter that is called Trustpoint ,one trustpoint contains an identity certificate and another CA certificate&amp;nbsp;Please see the following for the steps to install certificates :&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;1-if the CSR was generated on the router itself then :&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;a) authenticate the trustpoint (install the CA certificate) :&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;crypto pki authenticate &amp;lt;trustpoint name&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;&amp;lt;&amp;lt;paste the CA certificate encoded using Base64 PEM&amp;gt;&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;b)Import the identity certificate :&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="font-family: Arial, sans-serif; color: rgb(51, 51, 51);"&gt;crypto pki import &amp;lt;trustpoint name&amp;gt; certificates&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;2- if the CSR was generated externally then most probably they provided you with a p12/pfx file . and in this case you need to use this command :&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;cry pki import trustpoint-name pkcs12 terminal pass&amp;nbsp;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;you dont need to create the trustpoints, the router will do it automatically .&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;Finally, you need to configure the ssl gateway to user that trustpoint :&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;ssl trustpoint&amp;nbsp;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-right: 0in; margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', serif; color: rgb(34, 34, 34); margin-bottom: 7.5pt; line-height: 15pt;"&gt;Moh&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2015 15:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636984#M194759</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-05-02T15:38:30Z</dc:date>
    </item>
    <item>
      <title>Hi Ronald .Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636985#M194760</link>
      <description>&lt;P&gt;Hi Ronald .&lt;/P&gt;&lt;P&gt;Thanks for the reply . Nothing is needed from the client side other than installing the anyconnect secure mobility client . And for anyconnect there is no group password as in the ipsec client .&lt;/P&gt;&lt;P&gt;On the router you need to configure it for anyconnect .The most important point is to make sure the hardware you are using supports anyconnect&amp;nbsp;.Here is the datasheet for ssl vpn:&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/products/collateral/security/ios-sslvpn/product_data_sheet0900aecd80405e25.htmlRegards.&lt;/P&gt;&lt;P&gt;As you can see the SPR500 series is not included there .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for your participation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2015 16:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-configuring-and-troubleshooting-remote-access-ssl/m-p/2636985#M194760</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2015-05-02T16:35:05Z</dc:date>
    </item>
  </channel>
</rss>

