cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1225
Views
1
Helpful
4
Replies

Cisco AnyConnect IPSec/SSL Connection

mikiNet
Level 1
Level 1

Hi Team!

I have a question for you — is it possible to configure AnyConnect to work in the following way:
First, it tries to establish a connection using IPSec, but if it cannot (for example, because the user is at an airport where UDP ports 500/4500 are blocked), and after 2–3 failed attempts, it would then automatically try to establish a connection using SSL?

Or is it necessary to create separate tunnel-groups and group-policies for each connection method?

4 Replies 4

Ben Weber
Level 1
Level 1

Unfortunately, AFAIK the answer is no. AnyConnect will not fail-over to the SSL VPN if the IPsec tunnel is down or blocked. You have to create separate tunnel-groups for each transport method, which allows users to toggle between tunnel-groups if IKEv2 ports are blocked.

 

- BW
Please rate posts if they have been helpful.

I agree with @Ben Weber, it's been my experience that there is no such a failover from IPsec to SSL, however, there is a failover mechanism with SSL VPN if port 443/udp in not allowed, in that case the SSL VPN will stick with port 443 in TCP. May I ask why would you want to use IPsec rather than SSL?

Because IPSec has better performance (more fast) rather than SSL  

I personally never noticed any issue or latency with using SSL VPN that would provide any bad user experience. Secure Connect can be configured to use IPsec. However, a big challenge with using IPsec for the remote users is that it's quite common for the IPsec protocol to be blocked or throttled. I think that is one of the reasons why SSL VPN is recommended for remote users VPN and it's a better candidate compared to IPsec.