02-23-2020 09:05 PM
Hardware: ASA 5510
Version: 9.1(7)25
AnyConnect File: anyconnect-win-4.7.01076-webdeploy-k9.pkg
I've read many posts and watched multiple videos but for some reason I cannot get the web deploy page to show up that allows a user to authenticate and then download the AnyConnect client. I can get the ASDM page to come up just fine but not the webvpn page.
I've tried a different AnyConnect image to see if that was the issue but there was no change. Could anyone point me in the right direction on this one?
ciscoasa(config)# show run
: Saved
:
: Serial Number: **************
: Hardware: ASA5510-K8, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz
:
ASA Version 9.1(7)25
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
names
ip local pool VPN-POOL 192.168.255.1-192.168.255.15 mask 255.255.255.240
!
interface Ethernet0/0
nameif OUTSIDE
security-level 0
ip address dhcp
!
interface Ethernet0/1
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
nameif INSIDE
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Management0/0
management-only
shutdown
no nameif
no security-level
no ip address
!
ftp mode passive
object network LAN
subnet 192.168.0.0 255.255.255.0
object network VPN-NET
subnet 192.168.255.0 255.255.255.240
pager lines 24
mtu OUTSIDE 1500
mtu INSIDE 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (INSIDE,OUTSIDE) source static LAN LAN destination static VPN-NET VPN-NET no-proxy-arp route-lookup
!
object network LAN
nat (INSIDE,OUTSIDE) dynamic interface
route OUTSIDE 0.0.0.0 0.0.0.0 10.0.0.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 0.0.0.0 0.0.0.0 OUTSIDE
no snmp-server location
no snmp-server contact
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint Identity_Cert
enrollment self
fqdn vpn.cisco.com
subject-name CN=vpn.cisco.com,OU=IT,O=Cisco,C=US,St=CA,L=San_Jose
proxy-ldc-issuer
crl configure
crypto ca trustpool policy
crypto ca certificate chain Identity_Cert
certificate e030123e
308203e3 308202cb a0030201 020204e0 30123e30 0d06092a 864886f7 0d010105
05003081 80311130 0f060355 04070c08 53616e5f 4a6f7365 310b3009 06035504
08130243 41310b30 09060355 04061302 5553310e 300c0603 55040a13 05436973
636f310b 30090603 55040b13 02495431 16301406 03550403 130d7670 6e2e6369
73636f2e 636f6d31 1c301a06 092a8648 86f70d01 0902160d 76706e2e 63697363
6f2e636f 6d301e17 0d303330 31323731 39353735 395a170d 31333031 32343139
35373539 5a308180 3111300f 06035504 070c0853 616e5f4a 6f736531 0b300906
03550408 13024341 310b3009 06035504 06130255 53310e30 0c060355 040a1305
43697363 6f310b30 09060355 040b1302 49543116 30140603 55040313 0d76706e
2e636973 636f2e63 6f6d311c 301a0609 2a864886 f70d0109 02160d76 706e2e63
6973636f 2e636f6d 30820122 300d0609 2a864886 f70d0101 01050003 82010f00
3082010a 02820101 00b4e3d3 6126b8ce 8b2549cb 1503ffbd 420ad489 3c963aae
c78be506 f73f3d18 5f21c1b9 536a50ce 7abed237 77cf6324 77b8187c aceb60ce
e0a9afbe ee0a83fe cf8bfa46 7a844023 868d2ba7 e771cc3a dbec517e 105eaea0
3d4e5576 08054e00 28061b29 58e0ff7d 64fca281 50628ce3 62198137 58e14111
9fefaaf7 865ed5b5 0be0855d a5e249bf bd2f05d6 8e6d21a5 b8475ea1 72e54206
b8013cad 05124056 e8ed7039 ea24988f b7ceea6f 6f07eb6c 9eeec6e4 be6d398c
6f1e5324 119ae50c b3a35f48 fe873d83 27c0af86 b72d8a37 71854c8a d328faee
7b382147 c4c7b214 55361bd7 90444e41 37181200 e031b99f 0c7d5e02 a4ef8fca
4ced4d9b d8015ff9 b5020301 0001a363 3061300f 0603551d 130101ff 04053003
0101ff30 0e060355 1d0f0101 ff040403 02018630 1f060355 1d230418 30168014
2a7cf772 ace63805 b1519bd8 7f67199d 001960b0 301d0603 551d0e04 1604142a
7cf772ac e63805b1 519bd87f 67199d00 1960b030 0d06092a 864886f7 0d010105
05000382 01010034 244f16bc 89578b80 401a9416 d82703cd 9a89b106 cbdd175d
b1d9a282 7d06d136 d135c7c5 905fa56e 39e4e513 2edf5f02 a8a8430d 99025a60
23c83bde d9db97e7 b11054e4 2107b2d8 5fe9dad7 f035400a 2752172a b1a3a5a9
902dece0 3691762a f34e9e4f 396ce0e9 9da6333b 0c89f67b 399c3aad fd51b921
95c70336 57887c23 38a5ebe8 50edf71f 54e63a86 df612354 15e8d8ab 92800461
6e2b44c2 7779f437 e028188e f408c86f 20ae0832 9e581715 1e050ab4 4fd22470
d5c51c49 42d7d2ac 70be1474 acdafdfd 03de1d86 61ef39c0 4e6c1005 bd7dead8
bd3c81f9 e6a8598c 0bdf0689 50903928 cdd4d27f 0c2d34b8 349db7a9 e5abc5d2
6d04b8f4 3b1eb1
quit
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl trust-point Identity_Cert INSIDE
ssl trust-point Identity_Cert OUTSIDE
webvpn
enable OUTSIDE
anyconnect image disk0:/anyconnect-win-4.7.01076-webdeploy-k9.pkg 1
anyconnect enable
tunnel-group-list enable
cache
disable
group-policy GroupPolicy_SSL-VPN internal
group-policy GroupPolicy_SSL-VPN attributes
wins-server none
dns-server value 10.0.2.9
vpn-tunnel-protocol ssl-client ssl-clientless
default-domain none
username tjoachims password 291k9ma./1014n9aahsli encrypted privilege 15
tunnel-group SSL-VPN type remote-access
tunnel-group SSL-VPN general-attributes
address-pool VPN-POOL
default-group-policy GroupPolicy_SSL-VPN
tunnel-group SSL-VPN webvpn-attributes
group-alias SSL-VPN enable
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:07d594c3ad342559e388b10265928dd5
02-24-2020 11:23 AM
02-24-2020 11:43 AM
for starters change your http configuration to use a different port than 443 and then test. Use port 4433 for example. Keep in mind that each time you access the ASA via ASDM you need to specify this port or the connection will fail.
http server enable 4433
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide