07-29-2012 04:29 AM - edited 02-21-2020 06:14 PM
Hello,
So I'm pretty much familiar with asa
But not very much with VPN's
My goal is, to get as much security as possible when a user login via vpn
which means, I want the user to login with a username,password, and a certificate made just for that user
and not a group certificate
also to validate the user via LDAP
but if the both cant be done together, it's more important to me the first option I mentioned
so my question is, how can it be done on the asa? is it possible to have each user to login using a different certificate
it was possible on my old firewall using OpenVpn
I want to use the asa as the certificate server
I'm using ASDM 6.4
ASA 5510 Software version 8.4 (4)
Thanks in advance.
Solved! Go to Solution.
07-31-2012 06:10 AM
For the legacy VPN-Client you have to use an enterprise CA like the one build into Windows Server 2k3/2k8. On the ASA-CA only SSL-VPNs are supported. But for a new deployment you really should go for the AnyConnect-Client.
07-29-2012 07:00 AM
Yes, two factor authentication is not at all uncommon. There are several thread on this site describing experiences with it.
07-29-2012 07:57 AM
Thank you,
But the reference you gave, which leads to Cisco documentation, talk about an outside CA server
Does it have to be like that? Can't I use the asa as the CA Server?
Maybe it's there and I've missed it/didn't get it, my apologies if so,
If someone can please point it out more specifically I would appreciate it
07-29-2012 09:45 AM
The ASA can be a CA-server, but keep in mind that it won't work if you are running Failover. So, also if you are not using failover at the moment, I would use a company-PKI which is on the inside of network.
If you decide not to go with certificates but with a secondary authentication, I would suggest to look into DuoSecurity (http://www.duosecurity.com) or YubiKeys (http://www.yubico.com).
07-31-2012 12:33 AM
I'm not using a failover asa, and im not planning to use one either.
So please if someone can explain me how can I configure the asa as the ca-server, create a certificate per VPN user
Export the certificates to the clients, and the whole process
It would be a great deal of help.
07-31-2012 12:41 AM
a very good how-to can be found on the blog from IPExpert:
07-31-2012 05:09 AM
Thank you Karsten
I followed the manual
it was excellent, made me understand just how it works, but Im still left in a puzzle
basically from what I've figured out, it's a general Certificate which I've created
any local user on the asa, can login through it
and what I want, is that each user will have his own unique certificate
07-31-2012 05:25 AM
in the example you generate a user named ipxuser. This user gets his certificate and you would repeat that for every vpn-user in your organization.
07-31-2012 05:35 AM
Hi
You basically need to have your users go to https://hostname/+CSCOCA+/enroll.html, enter the correct credentials / OTP and the ASA will provide them with an ID certificate.
Then you could use a group-url to map your users to the correct profile (optional, you could use a group-alias) and use the "authentication aaa certificate" under the webvpn attributes of the specific profile to authenticate the incoming session with certs and AAA credentials (2-factor authentication).
ASA 8.x: Allow Users to Select a Group at WebVPN Login via Group-Alias and Group-URL Method
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808bd83d.shtml
Certificate mapping to AnyConnect tunnel-group I.
http://itsecworks.wordpress.com/2011/07/15/certificate-mapping-to-anyconnect-tunnel-group/
Let me know if you have any questions.
Please rate any post that you find helpful.
07-31-2012 06:02 AM
Im using Cisco VPN Client
Can you please explain me how it's getting done for that?
Thank you.
07-31-2012 06:10 AM
For the legacy VPN-Client you have to use an enterprise CA like the one build into Windows Server 2k3/2k8. On the ASA-CA only SSL-VPNs are supported. But for a new deployment you really should go for the AnyConnect-Client.
07-31-2012 06:16 AM
I agree with Karsten (5 stars).
For the Legacy VPN client, you must use an external CA server.
Please check this out:
ASA/PIX 8.x and VPN Client IPSec Authentication Using Digital Certificates with Microsoft CA Configuration Example
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080930f21.shtml
Let us know.
07-31-2012 06:30 AM
Thank you for bringing that into my attention Karsten
And sure is something that I would discuss about in my company and check that possibility to purchase Anyconnect Licenses,
But I would need another option like that one I was looking for
So for that matter,
Let's assume I have an outside enterprise CA
How then, can I bind the certificate created there, to a specific user on the asa to login via Cisco VPN?
**Edit
Sorry, didnt see your reply, i'll check it and get back at you guys
thanks again for all of the help
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide