cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
49612
Views
18
Helpful
38
Replies

AnyConnect new feature - DTLSv1.2

With the release of v9.10.1, has anyone been able to get DTLSv1.2 working with AnyConnect sessions? (Our clients are v4.6.02074)


-If I don't specify dtlsv1.2, it will always establish the DTLS tunnel using dtlsv1.0.


-If I do specify dtlsv1.2 with the following config, the DTLS tunnel fails to establish with the message "%ASA-5-722043: Group <groupid> User <userid> IP <ipaddress> DTLS disabled: unable to negotiate cipher".   Removing the "ssl cipher dtlsv1" line makes no difference.

 

ssl server-version tlsv1.2 dtlsv1.2

ssl cipher default custom "ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384"

ssl cipher dtlsv1 custom "AES256-SHA"

ssl cipher tlsv1.2 custom "ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384"

ssl cipher dtlsv1.2 custom "ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384"

ssl ecdh-group group20

ssl dh-group group24

38 Replies 38

Thanks arnert, that's good to know!  There is also an LDAP bug in 9.10.1 we're seeing that causes ASA to crash.  It's not published yet, but if you use LDAP to authenticate users I'd suggest not upgrading yet.

Marvin,

The show results you provided still shows DTLSv1.0 not 1.2 under TDLS-Tunnel: The red you highlighted is for TLS, not DTLS.  Any ideas?

@Mountain Man,

 As @stsargen noted, it seems the DTLS 1.2 is supported in native ASA 9.10.1. However my testing shows it does NOT appear to be supported in FTD 6.3.0 that includes ASA 9.10.1-3 in the LINA (ASA) subsystem.

 I just upgraded my ASAv to 9.10.1 and got the following:

  

ccielab-asa# show vpn-sessiondb detail anyconnect 

Session Type: AnyConnect Detailed

Username     : user1                  Index        : 7
Assigned IP  : 172.31.1.200           Public IP    : 192.168.0.105
Protocol     : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel
License      : AnyConnect Premium
Encryption   : AnyConnect-Parent: (1)none  SSL-Tunnel: (1)AES-GCM-256  DTLS-Tunnel: (1)AES-GCM-256
Hashing      : AnyConnect-Parent: (1)none  SSL-Tunnel: (1)SHA384  DTLS-Tunnel: (1)SHA384
Bytes Tx     : 27511                  Bytes Rx     : 31112
Pkts Tx      : 100                    Pkts Rx      : 225
Pkts Tx Drop : 0                      Pkts Rx Drop : 0
Group Policy : GroupPolicy_ccielab    Tunnel Group : ccielab
Login Time   : 19:46:04 MYT Thu Feb 14 2019
Duration     : 0h:02m:44s
Inactivity   : 0h:00m:00s
VLAN Mapping : N/A                    VLAN         : none
Audt Sess ID : ac1f0115000070005c6554fc
Security Grp : none                   

AnyConnect-Parent Tunnels: 1
SSL-Tunnel Tunnels: 1
DTLS-Tunnel Tunnels: 1

AnyConnect-Parent:
  Tunnel ID    : 7.1
  Public IP    : 192.168.0.105
  Encryption   : none                   Hashing      : none                   
  TCP Src Port : 13976                  TCP Dst Port : 443                    
  Auth Mode    : userPassword           
  Idle Time Out: 30 Minutes             Idle TO Left : 27 Minutes             
  Client OS    : win                    
  Client OS Ver: 10.0.17134             
  Client Type  : AnyConnect
  Client Ver   : Cisco AnyConnect VPN Agent for Windows 4.7.00136
  Bytes Tx     : 8087                   Bytes Rx     : 0                      
  Pkts Tx      : 6                      Pkts Rx      : 0                      
  Pkts Tx Drop : 0                      Pkts Rx Drop : 0                      
  
SSL-Tunnel:
  Tunnel ID    : 7.2
  Assigned IP  : 172.31.1.200           Public IP    : 192.168.0.105
  Encryption   : AES-GCM-256            Hashing      : SHA384                 
  Ciphersuite  : ECDHE-RSA-AES256-GCM-SHA384                       
  Encapsulation: TLSv1.2                TCP Src Port : 13979                  
  TCP Dst Port : 443                    Auth Mode    : userPassword           
  Idle Time Out: 30 Minutes             Idle TO Left : 27 Minutes             
  Client OS    : Windows                
  Client Type  : SSL VPN Client
  Client Ver   : Cisco AnyConnect VPN Agent for Windows 4.7.00136
  Bytes Tx     : 8228                   Bytes Rx     : 388                    
  Pkts Tx      : 7                      Pkts Rx      : 7                      
  Pkts Tx Drop : 0                      Pkts Rx Drop : 0                      
  
DTLS-Tunnel:
  Tunnel ID    : 7.3
  Assigned IP  : 172.31.1.200           Public IP    : 192.168.0.105
  Encryption   : AES-GCM-256            Hashing      : SHA384                 
  Ciphersuite  : ECDHE-ECDSA-AES256-GCM-SHA384                     
  Encapsulation: DTLSv1.2               UDP Src Port : 56578                  
  UDP Dst Port : 443                    Auth Mode    : userPassword           
  Idle Time Out: 30 Minutes             Idle TO Left : 29 Minutes             
  Client OS    : Windows                
  Client Type  : DTLS VPN Client
  Client Ver   : Cisco AnyConnect VPN Agent for Windows 4.7.00136
  Bytes Tx     : 11580                  Bytes Rx     : 31050                  
  Pkts Tx      : 90                     Pkts Rx      : 223                    
  Pkts Tx Drop : 0                      Pkts Rx Drop : 0                      
  
ccielab-asa#

 

Thanks, Marvin:

I have just upgrade my ASA to the latest interim release 9.10.1.7 and AnyConnect client 4.7.00136. It comes up with  DTLSv1.2 and it can be seen in both ASA and Client GUI interface:

 

DTLS-Tunnel:
Tunnel ID : 8.3
Assigned IP : 192.168.68.27 Public IP : 10.5.160.27
Encryption : AES-GCM-256 Hashing : SHA384
Ciphersuite : AES256-GCM-SHA384
Encapsulation: DTLSv1.2 UDP Src Port : 56925

 

My tunnels are negotiating properly also. dtlsv1.2 is up and running.

Hi,

I updated my just now:

ASA 9.12(4)

ASDM 7.13(1.101)

AnyConnectClient (4.903049)

but I still see only DTLDv1.0? Could you please tell me, what you configured on your asa?

Many thx in advance

 

 

 

s.schuler@sys-tec.info please share the output of "show run ssl" from your ASA. It should match what the original poster has mentioned above.

Hi Marvin,

 

thx, do am I right, I have to configure these on CLI and not with the ASDM. I only find a box to tag or untag DTLD support?

 

Thx

You can make the changes in ASDM. See the following example:

ASDM Custom SSL SettingsASDM Custom SSL Settings

Hi

 

after doing it in ASDM I've got this message:

Bildschirmfoto 2021-02-04 um 13.36.50.png

ciscoasa# sh run ssl
ssl client-version tlsv1.2
ssl dh-group group24
ssl ecdh-group group20
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 outside
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 inside3
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 backup
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 inside3 vpnlb-ip

 

Any ideas? Thx in advancd

 

 

s.schuler@sys-tec.info please share the output of "show version" so we can confirm the necessary 3DES-AES licenses.

Hi 

 

ciscoasa# sh version

Cisco Adaptive Security Appliance Software Version 9.12(4)
SSP Operating System Version 2.6(1.198)
Device Manager Version 7.13(1)

Compiled on Thu 21-May-20 11:17 PDT by builders
System image file is "disk0:/asa9-12-4-lfbff-k8.SPA"
Config file at boot was "startup-config"

ciscoasa up 1 min 19 secs

Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
Internal ATA Compact Flash, 8000MB
BIOS Flash M25P64 @ 0xfed01000, 16384KB

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
Number of accelerators: 1

1: Ext: GigabitEthernet1/1 : address is 7488.bb56.3244, irq 255
2: Ext: GigabitEthernet1/2 : address is 7488.bb56.3245, irq 255
3: Ext: GigabitEthernet1/3 : address is 7488.bb56.3246, irq 255
.....
14: Int: Internal-Data1/4 : address is 0000.0100.0001, irq 0
The Running Activation Key feature: 2 security contexts exceed the limit on the platform, reduced to 0 security contexts.

Licensed features for this platform:
Maximum Physical Interfaces : Unlimited perpetual
Maximum VLANs : 5 perpetual
Inside Hosts : Unlimited perpetual
Failover : Disabled perpetual
Encryption-DES : Enabled perpetual
Encryption-3DES-AES : Enabled perpetual
Carrier : Disabled perpetual
AnyConnect Premium Peers : 2 perpetual
AnyConnect Essentials : Disabled perpetual
Other VPN Peers : 10 perpetual
Total VPN Peers : 12 perpetual
AnyConnect for Mobile : Disabled perpetual
AnyConnect for Cisco VPN Phone : Disabled perpetual
Advanced Endpoint Assessment : Disabled perpetual
Shared License : Disabled perpetual
Total TLS Proxy Sessions : 2 perpetual
Botnet Traffic Filter : Disabled perpetual
Cluster : Disabled perpetual

This platform has a Base license.

Serial Number: xxxxxxxxxxxxxxxxxx
Running Permanent Activation Key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Configuration register is 0x1
FPGA UPGRADE Version : 3.0
FPGA GOLDEN Version : 3.0
ROMMON Version : 1.1.15
Image type : Release
Key Version : A
Configuration has not been modified since last system restart.
ciscoasa#

 

I think this should not the problem .... 

 

After using more and more ASDM I had to another problem. After configuring v1.2 I couldn't dial in, so I tried to do a full restore. The restore works til 55% showing loading *.pkg file than nothing happens. After I interrupted it, it seems to work, but my AbyConnect client show a profile cisco asa (IPSEC) IPv4 and shows the message cryptographic algorythmen fails ..... If I interrupt this using my outside ip it works.

I never configured a profile asa (IPSEC) IPv4. I don't see this in the xml.files I found. Where I can delete it?

Is there a asa /asdm version combi you works well. I re, that sometimes ASDM do strange things depending on the version?

My thx in advance

 

The recommended releases for an ASA 5506 are currently 9.14(2)8, 9.12(4)10 or 9.8(4)32. All with ASDM 7.15(1).

However none of those should affect your ability to run TLS 1.2 and DTLS 1.2 with customer ciphers. I have it setup fine on my ASA 5506 running 9.10.

You don't have a Firepower service module do you? ASA 5506-X doesn't support those from ASA 9.10 or later.

Hi Marvin,

 

I updated all on the recommend SW. My 5506-x doesn't have a sfr modules:

 

ciscoasa# sh module

Mod Card Type Model Serial No.
---- -------------------------------------------- ------------------ -----------
1 ASA 5506-X with SW, 8GE Data, 1GE Mgmt, AC ASA5506 xxxxxxxxxxxxx
sfr Unsupported Unsupported

Mod MAC Address Range Hw Version Fw Version Sw Version
---- --------------------------------- ------------ ------------ ---------------
1 7488.bb56.3243 to 7488.bb56.324c 2.3 1.1.15 9.12(4)10

Mod SSM Application Name Status SSM Application Version
---- ------------------------------ ---------------- --------------------------

Mod Status Data Plane Status Compatibility
---- ------------------ --------------------- -------------
1 Up Sys Not Applicable

ciscoasa#

 

So would it be possible to show me your running config, so I can compared with my config?

 

Thx in advance

Amafsha1
Level 2
Level 2

how did you get this working?  i currently have 4.7 anyconnect that the clients connect to an ASA with 9.8 and I don't even the options to configure dtlvs1.2.