02-13-2018 07:43 AM - edited 03-12-2019 05:01 AM
Hello,
I have been asked to deply Firepower Threat Defense Remote Access VPNs with Windows 10 native VPN client. Is this solution supports on FTD with latest code and Windows 10 native VPN client?
VPN Gateway : FTD with latest code
Client will initiate VPN connection from Windows 10 native VPN client.
Note: No vpn client will be deployed from VPN Gateway .
02-13-2018 11:21 AM
Hi,
No, only AnyConnect VPN client is supported. From the FTD 6.2.2 Configuration Guide:
"Firepower Threat Defense provides secure gateway capabilities that support remote access SSL and IPsec IKEv2 VPNs. The full tunnel client, AnyConnect Secure Mobility Client, provides secure SSL and IKEv2 IPsec connections to the security gateway for remote users. It is the only client supported on endpoint devices for remote VPN connectivity to Firepower Threat Defense devices."
HTH
02-14-2018 02:00 AM
02-14-2018 02:06 AM
You mean run the ASA code on the 4150 instead of FTD? Seems like it is possible to use the Windows native client:
https://www.cisco.com/c/en/us/support/docs/security-vpn/webvpn-ssl-vpn/119208-config-asa-00.html
02-14-2018 02:33 AM
02-14-2018 02:44 AM
An SSL-VPN using the Windows native client does not seem to be possible in Windows 10. Checking the configuration on Windows 10 it looks like there are only options for: PPTP, L2TP, SSTP and IKEv2. Any reason why you cannot use IKEv2 which the ASA can do with the native client?
02-14-2018 03:07 AM
02-14-2018 03:14 AM
You can use IKEv2 Remote Access VPN on the ASA, I was asking why you wanted to use SSL-VPN and not IKEv2.
02-14-2018 03:19 AM
02-14-2018 03:21 AM
02-14-2018 03:35 AM
02-14-2018 04:09 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide