03-07-2024 03:26 AM
Good day to everyone.
I have two Cisco ASA running on FPR2130 assembled into a balancing group, for example:
vpn-gw1.example.com
vpn-gw2.example.com
general address vpn.example.com.
Firmware version 9.18.3.56
Anyconnect 4.10.07062
At the moment, all our employees work through profiles with two-factor authentication using SAML. With two-factor authentication, after entering the code from TOTP generator, some users catch the error ERR_SSL_PROTOCOL_ERROR.
While the error is not permanent and may appear to the user a couple of times a week, and then not appear. Some users catch the error stably between 8 a.m. and 10 a.m., after they connect normally, the error may appear on one Gateway and not appear when trying to connect to the second Gateway.
The problem is of a floating nature, one of the most popular solutions is cleaning cookies and cache in the default browser, sometimes deleting the cisco anyconnect profile helps, sometimes cleaning the SSL cache in the browser properties in the control panel
The number of active users in the middle of the day is approximately 1,500 people per device. Most of them do not face the problem, but it is frightening that the problem can manifest itself in anyone at any moment
There is an understanding that the problem is still in the workstations, but maybe someone has encountered and has a universal solution
I will be glad of any help
04-19-2024 06:33 AM
Hello,
We have the same behavior with different hardware and software version.
Our environment consist of:
3 indipendent ASA 5508-X
Firmware version 9.14.4.23
Anyconnect 4.10.07073
The error appeared suddenly on few users at the moment, without we did any change on appliances.
Even updating Anyconnect to version 4.10.08029 on the affected clients the problem remains.
In our case the working solution is deleting the cisco anyconnect profile.
Regards
04-25-2024 07:08 AM
Looks we facing the same issues randomly do we have any fix for this ?
04-29-2024 01:40 AM
We have this problem too.
Only solutin for now is the one suggested from you:
deleting the cisco anyconnect profile and cleaning the SSL cache.
Anyone with a fix for this?
04-29-2024 05:25 AM
Having the same issue, really annoying. The problem seems to come back for some user that has had their profile deleted last week.
04-29-2024 07:25 AM
We had the same issue and could narrow it down: It's because of a new Chromium feature TLS 1.3 hybridized Kyber support starting from Version 124, which breaks TLSv1.2 Handshake. In our case, we also had the problem, that we cannot connect with a Browser to our Cisco ASA outside address with the Error ERR_SSL_PROTOCOL error with Chrome and Edge (nevertheless it works with Firefox, Safari, etc. which are not using Chromium).
You can change back this behavior with the Chrome / Edge flag
chrome://flags/#enable-tls13-kyber
respectivley
edge://flags/#enable-tls13-kyber
Set this to disabled. After this the connection with the browser works again.
However, this doesn't solve the problem with Anyconnect connection because Anyconnect uses Webview2 Runtime, which doesn't use the flag set prior. To workaround this problem you have to create the following DWORD registry value: Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Cisco\Cisco AnyConnect Secure Mobility Client\UseLegacyEmbeddedBrowser with value 1. This tells Anyconnect to use the Legacy Browser (IE) instead of Edge and the connection works again.
Hope this solves your problems too.
I will file a Cisco Ticket concerning this problem.
04-29-2024 07:48 AM - edited 04-29-2024 07:52 AM
Thank you so much, it would be very helpful if you could share the reply to the Cisco ticket when possible. In the meantime we'll try the workaround. Thanks again
04-29-2024 08:59 AM
This worked for me, thanks.
However, not everyone in my company is technical or has the admin rights to change this.
04-29-2024 01:22 PM
Worked for me ASA 9.14 Cisco AnyConnect 4.8
Thank you!
05-12-2024 07:08 PM
Has Cisco come back with a fix other than the registry key? Is there a Cisco BugID for this issue so that we can track it?
04-29-2024 12:20 PM
Any update on this issue? My administrator blocks IE so the registry change will not work.
04-30-2024 02:00 AM
I'm running Cisco Secure Client with AnyConnect VPN 5.1.1.42 so the location of the folder in the registry on Windows 11 is Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Cisco\Cisco Secure Client. It is working now. Ref: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/Cisco-Secure-Client-5/release/notes/release-notes-cisco-secure-client-5-1.html
04-30-2024 01:24 AM
Works for me on 9.8.4(20).
What I do is I created a script to enable the registry mentioned above so everyone can just click the script to create the registry.
04-30-2024 12:29 PM
Hello Muhammad,
Could you share the MS script to enable the registry? thank you in advanced.
05-01-2024 06:35 AM
Hi Daniel,
See if this works for you.
Launch Powershell as Administrator
AnyConnect with VPN 4.x
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Cisco\Cisco AnyConnect Secure Mobility" /v UseLegacyEmbeddedBrowser /t REG_DWORD /d 1 /f
Cisco Secure Client with VPN 5.x
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Cisco\Cisco Secure Client" /v UseLegacyEmbeddedBrowser /t REG_DWORD /d 1 /f
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide