03-19-2020 03:32 PM - edited 03-20-2020 05:55 AM
Hi,
I just configured a new ASAv for remote SSL VPN. I have ciphers concerns and I am not very good at this.
The previous VPN (ASA 9.6) had this configuration :
sl server-version tlsv1
ssl cipher default custom "AES256-SHA:AES128-SHA:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:DES-CBC3-SHA:DES-CBC-SHA:RC4-SHA:RC4-MD5 "
ssl cipher tlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA
ssl cipher tlsv1.1 medium
ssl cipher tlsv1.2 custom "AES256-SHA:AES128-SHA:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:DES-CBC3-SHA:DES-CBC-SHA:RC4-SHA:RC4-MD5 "
ssl cipher dtlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
ssl dh-group group2
ssl ecdh-group group19
I configured the new with the same commands, which also had these two new DTLS defaults commands :
ssl server-version tlsv1 dtlsv1
ssl cipher dtlsv1.2 medium
The rest is the same.
Some users has trouble establishing a connexion. What would be the best thing to do? My concern, right now is to allow every users to connect, not improve security.
I thought of
what do you think?
Thanks,
Steve
Solved! Go to Solution.
03-20-2020 07:32 AM
Hi,
For now, I have some linux users running openconnect that fails to established reliable connexions. What troubleshooting commands do you propose?
Steve
03-20-2020 06:10 AM
03-20-2020 07:32 AM
Hi,
For now, I have some linux users running openconnect that fails to established reliable connexions. What troubleshooting commands do you propose?
Steve
03-20-2020 07:39 AM
03-20-2020 10:57 AM
Hi,
OK we got something. I opened udp/443 et dtls works now! I wasn't aware of udp connexion for dtls.
Steve
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide