Elliptical curve ciphers use much shorter key lengths than the RSA keys that we have traditionally used. We understand elliptical curve keys with short key lengths provide similar strength as RSA keys with much longer length.
The reduction in CPU time to work with the larger keys is optimal due to the reduction in CPU usage and the subsequent reduction in power.
RSA public key algorithms are not considered legacy as of yet. It is likely that they will be in the next several years. In practice RSA key pairs are becoming less efficient each year as computing power increases. Elliptic curve cryptography is a newer alternative to public key cryptography. Elliptic curves are very efficient and offer the same level of security over much shorter prime fields and therefore the performance of ECC is significantly better than RSA public key cryptography. ECC is considered Next Generation Encryption by the US National Security Agency.
In ASA OS 9.4(1), released March 22, 2015, the ASA started supporting several new cipher suites.
In ASA OS 9.3(2), released December 18, 2014, the ASA started supporting Transport Layer Security version 1.2.
In ASA OS 9.0(1), released on October 29, 2012, the ASA started supporting using ECDSA key pairs for generating certificates.
AnyConnect v4.x is required, Apex or Plus license.
Both 9.4(1) and 9.3(2) require Next Generation ASA. They will not run on older ASA models like the ASA 5505, 5510, 5520 or 5540.
Assure you do not have anyconnect-essentials configured under webvpn. AnyConnect Essentials license does not support these ciphers and isn't in use when the Apex or Plus AnyConnect 4 license is installed.
Understanding Cipher Suites
You can view all the ssl cipher suites that the ASA supports by typing
show ssl ciphers
Each cipher suite has several parts. These are a key exchange and establishment algorithm, a bulk encryption algorithm, a message authentication code algorithm and a pseudorandom function.
Let’s look at this cipher suite as an example.
In the cipher suite listed above
The key exchange algorithm is ECDHE-ECDSA.
The bulk encryption algorithm is AES256-GCM.
The message authentication code is SHA384.
ECDHE is an asymmetric algorithm used for key establishment.
ECDSA is an asymmetric algorithm used for digital signatures.
AES256-GCM is a symmetric block or bulk cipher used to protect the ‘data’.
SHA384 is a hash function used to assure the data’s integrity by the receiving party.
The ASA supports lots of other cipher suites and we will not discuss those here.
There are several things we need to do here
We need to create an ECDSA key pair on the ASA.
We need to create an CSR and submit that to a 3rd party certificate provider
Install the certificate we receive from the 3rd party provider.
Configure the ASA to only support elliptic curve ciphers.
Step 1 & 2.
Creating a SHA-2 CSR using ECDHA
See this other document I wrote for this procedure.
Install the Identity Certificate and Intermediate Certificate you receive from the 3rd party provider.
Authenticate the CA
crypto ca authenticate my-trustpoint.lab-asa.xxxx.com
Install the Identity Certificate
crypto ca import my-trustpoint.lab-asa.xxxx.com
I chose to only support TLSv1.2. I did this because all modern OS’s and browsers support TLSv1.2. I also chose to only support elliptical curve cipher suites. All modern OS’s and browsers support elliptic curve ciphers. If you need to provide support to Windows XP or Mac OS X 10.5 or earlier you cannot exclusively use elliptic curve ciphers.
Force the minimum version of TLS to be 1.2
ssl server-version tlsv1.2
Force TLSv1.2 to only support elliptical curve sipher suites
My customer, head of security, wants to ensure the newsletter she is receiving from Cisco/Talos is not some marketing scam. She questioned the sender: Cisco <firstname.lastname@example.org> and wants to validate it's authenticity as it is being sent to...
Hi Cisco Community, I've developed a small web app that provides the UCP portal feature to an ISE deployment.You can download it on https://github.com/luchthrash/ISE-UCPIf you need assistance or implementation of other features like integration with ...
Hello! Friends! I need your advice. I do not have ideas. May be you can help me.So a have two offices (office 1 and office 2), for it connecting i used cisco asa 5510 and VPN between it. (site2site)office 1 - 192.168.101.0/24 office 2 - 192.168.104.0/24Co...
Hi, I tried to configure ECMP with traffic Zones on my ASA 5516-x through FMC's FlexConfig, and it seems not working. I finally did it: At first, I have created a Flex object (In FMC: Objects - Object Management - FlexConfig - F...
Hi all, Trying to set up FlexVPN on an ISR4431 and i've currently got it showing as not secure if i go to the web page of the router as it shows there's no HTTPS and that the certificate is invalid (this is in chrome) but if i go into the certificate it l...