04-30-2020 02:59 AM
Hello all
I am struggling to get something working, and need a bit of a hand to get me across the line.
I have a Linux laptop that needs to connect to a ASA using AnyConnect.
Both the laptop and the ASA have trusted certificates, and I have had no issues getting it working using SSL as the configured protocol.
But I need to use IPSec as the protocol due to security constraints. But as soon as I untick SSL on the client profile and use only IPSec, the connection is not working.
I have done lots of research around extended key usage that needs to be applied whilst using IPSec, but it is not going in (my head).
When using the Anyconnect client in Linux, and using only IPSec as the transport protocol, I am receiving a Cetifcate validation failure and the ipsec vpn connection was terminated due to an authentication failure or timeout.
So clearly something is amiss in the profile to accept a trusted valid certificate that is not an issue if i use SSL.
Hence, I have to bow to your superior knowledge and ask for some help.
Thanks
James
04-30-2020 03:26 AM
here is some example guide for reference :
also provide what License and version and any Logs ?
04-30-2020 03:35 AM
04-30-2020 03:51 AM - edited 04-30-2020 04:06 AM
Hi,
Make sure the correct trustpoint is configured under the command "crypto ikev2 remote-access trustpoint <TP_NAME>". If SSL is working without an error, I assume a different trustpoint has been defined, as the SSL trustpoint is configured using another command.
HTH
04-30-2020 05:07 AM
Hello, yes, I have checked and the ASA trusted cert is configured for both SSL and IKE.
That command is in place on the ASA ok.
Thanks
James
04-30-2020 05:17 AM
04-30-2020 05:23 AM
Hi, here are my connection logs from a couple of failed attempts today.
The linux version of Anyconnect is 4.6.03049.
ASA IOS version is 9.6(4) 8.
The licence on the ASA is just a basic licence with only 4 premium Anyconnect peers allowed. This is a test box, so currently no other users are connected.
Regards
James
04-30-2020 05:52 AM
OK, good news.
After pasting in the logs, I had a good trawl through them and it was easier than I thought to fix.
Could not acquire any X509 certificates in the /home/u2/.cisco/certificates/client/ directory.
I had my directory in the wrong place, which is a bit of a **bleep** up.
In Linux, you have to create these folders, and a simple slip of the finger placed them not in the home directory....DOH!
Thanks for all your comments thus far!
James
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide