cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
392
Views
0
Helpful
2
Replies

VPN with Alias on FTD

tahscolony
Level 1
Level 1

Currently we have an ASA and use Secure Client 5.1.8.105 and two profiles using Alia that authenticate via 2FA. To get the correct profile, split tunnel or full tunnel a use tacks the alias on to the URL and then connects, authenticates full 2FA and gets the appropriate profile and goes to work.

Trying to replicate this on an FTD using same versions of client, and 7.4.2 gold star, it fails when trying to add the alias with a No valid certificates available for authentication being logged before disconnect.

To block hackers and spammers, DefaultGroup is setup for DefaultWEbVPN and is sent to AAA in the sky, IOW a dead server. To avoid being hacked on our active profiles, the drop down is disabled on login.  Its the exact same setup as the ASA which works fine. 

I attempted to access this page since I managed via CDO, It's description states

Aliases —Provide an alternate name or URL for the connection profile. Remote Access VPN administrators can enable or disable the Alias names and Alias URLs. VPN users can choose an Alias name when they connect to the FTD device remote access VPN using the AnyConnect VPN client. Step 4: Click Save.

but the URL is https://edge.us.cdo.cisco.com/content/docs/t_configure_multiple_connection_profiles.html#!c-migrating-palo-alto-networks-firewall-to-multicloud-defense-with-the-firewall-migration-tool-in-cisco-defense-orchestrator.html and it directs to a Migration document for Palo Alto.  Cisco  web techs must be drunk.

It looked like what I need is the doc prior to redirection, but its doesn't stay up long enough to understand what it says. Where can I find the documentation to configure teh Secure Connect to work as it does on my ASA by adding the alias to the URL  

https://vpn.domain.com/mfa

 

 

2 Replies 2

Marvin Rhoads
Hall of Fame
Hall of Fame

You can reference the documentation for this feature in the on-prem FMC guide as this feature works the same from either management location.

https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/770/management-center-device-config-77/vpn-remote-access.html#task_pvz_m35_5gb

 

tahscolony
Level 1
Level 1

I figured it out, fat fingered the URL.

 

Time for new glasses.

Review Cisco Networking for a $25 gift card