- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 12:04 AM
Hi,
when we using ssl anyconenct vpn , what type of password protection and data encryption running .
Thanks
Solved! Go to Solution.
- Labels:
-
AnyConnect
-
Remote Access
-
VPN
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 03:17 AM
@bluesea2010 what ASA hardware and software version are you running, you may need to upgrade to support TLS1.2 and DTLS1.2.
Using AES-GCM-256 (you are using AES CBC not GCM) and SHA384 would be sufficient.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 01:13 AM
@bluesea2010 what have you configured for your TLS/SSL settings? If you left as default then you probably want to change the encryption algorithms in use. Here is a guide to secure your encryption ciphers.
What authentication method are you using? If using RADIUS then you could be using PAP, MSCHAPv1 or v2 protocol. MSCHAPv2 would be preferred
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 01:32 AM
Thanks
I am using cisco ise for authentication .
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 01:37 AM
@bluesea2010 what do you actually need to know? Do you need to know what authentication type ASA and ISE are using to communicate when authenticating the users? Provide your configuration and or look in the ISE Live Logs, this would tell you if using PAP or MSCHAP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 02:51 AM
Hi,
I want to know when client and ASA communicating , what type of authentication and encryption it uses
second from asa to ise what type of authentication it use ?
when i check ise login details , i am getting the below
No Data available for this record. Either the data is purged or authentication for this session record happened a week ago.
Or if this is an 'PassiveID' or 'PassiveID Visibility' session, it will not have authentication details on ISE but only the session.
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 02:57 AM
@bluesea2010 run show vpn-sessiondb ratio encryption to determine what encryption all your clients are using when connecting to the VPN.
Run show vpn-sessiondb detail anyconnect to determine the authentication (AuthMode) method and encryption/hashing algorithms each client has used when connecting to the VPN. This command will only provide information on connected users.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 03:02 AM
Hi ,
here is the output
Result of the command: "show vpn-sessiondb detail anyconnect"
Username : Index : 1222
Assigned IP : 172.30.228.6 Public IP :
Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel
License : AnyConnect Premium
Encryption : AnyConnect-Parent: (1)none SSL-Tunnel: (1)AES256 DTLS-Tunnel: (1)AES256
Hashing : AnyConnect-Parent: (1)none SSL-Tunnel: (1)SHA1 DTLS-Tunnel: (1)SHA1
Bytes Tx : 4514753 Bytes Rx : 4701289
Pkts Tx : 17080 Pkts Rx : 19344
Pkts Tx Drop : 0 Pkts Rx Drop : 0
Group Policy : GroupPolicy-n Tunnel Group :
Login Time : 13:44:55 AST Sun Jul 24 2022
Duration : 0h:31m:05s
Inactivity : 0h:00m:00s
VLAN Mapping : N/A VLAN : none
Audt Sess ID : ac100307004c600062dd22a7
Security Grp : none
AnyConnect-Parent Tunnels: 1
SSL-Tunnel Tunnels: 1
DTLS-Tunnel Tunnels: 1
AnyConnect-Parent:
Tunnel ID : 1222.1
Public IP :
Encryption : none Hashing : none
TCP Src Port : 51169 TCP Dst Port : 443
Auth Mode : userPassword
Idle Time Out: 30 Minutes Idle TO Left : 0 Minutes
Client OS : win
Client OS Ver: 10.0.19043
Client Type : AnyConnect
Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.02045
Bytes Tx : 12678 Bytes Rx : 3343
Pkts Tx : 10 Pkts Rx : 5
Pkts Tx Drop : 0 Pkts Rx Drop : 0
SSL-Tunnel:
Tunnel ID : 1222.4
Assigned IP : 172.30.228.6 Public IP :
Encryption : AES256 Hashing : SHA1
Encapsulation: TLSv1.0 TCP Src Port : 51271
TCP Dst Port : 443 Auth Mode : userPassword
Idle Time Out: 30 Minutes Idle TO Left : 0 Minutes
Client OS : Windows
Client Type : SSL VPN Client
Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.02045
Bytes Tx : 7659 Bytes Rx : 0
Pkts Tx : 14 Pkts Rx : 0
Pkts Tx Drop : 0 Pkts Rx Drop : 0
Filter Name : #ACSACL#-IP-PERMIT_ALL_TRAFFIC-55386fb1
DTLS-Tunnel:
Tunnel ID : 1222.5
Assigned IP : 172.30.228.6 Public IP :
Encryption : AES256 Hashing : SHA1
Encapsulation: DTLSv1.0 UDP Src Port : 55938
UDP Dst Port : 443 Auth Mode : userPassword
Idle Time Out: 30 Minutes Idle TO Left : 30 Minutes
Client OS : Windows
Client Type : DTLS VPN Client
Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.02045
Bytes Tx : 4448355 Bytes Rx : 4653578
Pkts Tx : 16875 Pkts Rx : 19119
Pkts Tx Drop : 0 Pkts Rx Drop : 0
Filter Name : #ACSACL#-IP-PERMIT_ALL_TRAFFIC-55386fb1
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 03:07 AM
@bluesea2010 so that user has connected using AES256 (encryption), SHA1 (hashing) and User/Password for authentication.
You probably want to use better encryption/hashing algorithms and also you are only using DTLS1.0, you probably want to use DTLS1.2 for better performance. Refer to guide to reconfigure these settings https://integratingit.wordpress.com/2021/01/27/securing-asa-tls-ciphers/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 03:12 AM
Hi @Rob Ingram
I have only tlsv1.0 , I dont have tls v1.2 as in the article
When you say better encryption /hashing ,what you are recommending
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 03:17 AM
@bluesea2010 what ASA hardware and software version are you running, you may need to upgrade to support TLS1.2 and DTLS1.2.
Using AES-GCM-256 (you are using AES CBC not GCM) and SHA384 would be sufficient.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 03:19 AM
Asa 5585 -ssp 10 and 9.2(4)27
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 03:36 AM
@bluesea2010 you will need to upgrade, 9.2 is very old and TLS/DTLS 1.2 won't be supported, nor will the latest encryption/hashing algorithms.
Version 9.12 is the latest your hardware supports. https://software.cisco.com/download/home/283123066/type/280775065/release/9.12.4%20Interim
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 04:25 AM
Asa 5585 ssp10 end of support is next month
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2022 04:29 AM - edited 07-24-2022 04:43 AM
@bluesea2010 well if you want to use more secure encryption/hashing algorithms you'd need to upgrade the software, you should be able to do this if you have access rights to download the software from the cisco site.
Or buy newer hardware and run the latest code.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-25-2022 12:00 AM
Hi @Rob Ingram
If we joined ise in the active directory , what authentication type are using when ise is authenticating a user against active directory
Thanks
