07-05-2024 05:54 AM
For a long while we have been reliant on using ASA's L2TP remote access VPN for users to connect to remote sites to access devices that did not have gateway's configured. For this we used the Windows built-in L2TP client, however as Cisco has depreciated the encryption in later ASA versions this is no longer usable. It is my understanding that AnyConnect can not be used as an alternative.
So my question to the community is what tools are available if I need to connect to a FPR1010 from Windows 10/11 and access devices that have no gateway (i.e. essentially needing L2TP). When we use a Sonicwall SSLVPN this has not been an issue as we can essentially create a tunnel and have the client on the same subnet.
Solved! Go to Solution.
07-08-2024 11:14 AM
You can also tailor the built-in Windows L2TP/IPSec client to offer updated ciphers/algorithms to the FPR1010. You can do this in PowerShell using the following syntax:
Set-VpnConnectionIPsecConfiguration -ConnectionName L2TP -AuthenticationTransformConstants SHA196 -CipherTransformConstants AES256 -DHGroup Group14 -EncryptionMethod AES256 -IntegrityCheckMethod SHA1 -PfsGroup PFS2048 -Force
In the example above, the L2TP/IPSec connection name that I created is "L2TP".
The IKEv1 phase 1 parameters are:
AES256/SHA/DH Group14
The IKEv1 phase 2 settings are:
AES256/SHA/PFS Group14
FPR1010 debugs show the custom offer being sent:
# of transforms: 1
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 40
Transform #: 1
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Key Length: 256
Hash Algorithm: SHA1
Group Description: Group 14
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 00 00 70 80
You can refer to this for details on how to change the ciphers/algorithms. It's for IKEv2, but the concept is the same for any IPSec-based VPN connection profile that you create with the built-in Windows client:
07-05-2024 07:34 AM - edited 07-06-2024 02:09 AM
The Anyconnect RA-VPN on ASA/FTD can be configured so that the client is assigned an IP from the device's LAN interface.
07-06-2024 12:46 AM
Also, from the documentation: "Secure Client is the only client supported on endpoint devices for remote VPN connectivity to threat defense devices". This is a purely marketing (non-technical) restriction which doesn't exist on ASA. So, you don't have other options if you want to use FTD on FPR1010.
07-06-2024 02:09 AM
Marketing? Yes! But AnyConnect is far superior to L2TP RAVPN, and rumors say that only one customer was left using L2TP.
07-07-2024 04:46 AM
Hi Friend
sorry I read your post but it summer and Europa League matches so I have little time
but anyway
you can run l2tp over IPsec
and the client will get IP from Pool in same subnet as Inside server so technically client and server connect in same subnet
MHM
07-08-2024 04:25 AM
MHM,
This is actually no longer a viable solution as Cisco has depreciated numerous items in their latest ASA OS version. I can no longer use DES. 3DES. DH group 2, 5, etc.. Problem here is that for Windows built in L2TP client it requires 3DES.
The ASA comes with if I remember correctly a built in license for 2 'admins' for Anyconnect. Looking at a more recent FPR1010 I see I have licensed count of 75 for Anyconnect Premium Peers and Anyconnect Essentials is disabled. Years back I believe the old 5500 and 5506 came with Anyconnect for the admin but the software package was not installed on the device.
We use the ASA's for site to site VPNs, and unfortunately came across the one instance where a contractor put in a FPR1010 with the desired use for remote access VPN. The ASA has I think v9.18. Will we need to purchase an additional Anyconnect license to download the package files that need to be installed on the ASA? On the user end they already have the Cisco Secure Client installed in use for a different project.
07-08-2024 04:39 AM
If you need to provide AnyConnect RA services, you need to buy a licence for this device or for the users (there are different ways to buy the licenses). The base AnyConnect (or Cisco Secure Client what is the actual name) license is not that expensive.
The order code is L-AC-PLS-LIC= where you choose the amount of users (minimum 25) and the length of the subscription (like 3 or 5 years).
07-08-2024 04:49 AM
Do I need anyconnect license? Yes but as i know fw come with 3 anyconnect free' you can use it to try l2tp over ipsec before buy any license.
3des needed ? Yes it need and cisco give it license for free
DH group 2 ? Here I can not answer y0u but sure new window support dh group other than 2' dh group 2 is legacy.
MHM
07-08-2024 06:46 AM
@TRENT WAITE, just to clarify: FPR1010 uses smart licensing, which means you don't need to (and actually cannot) install anyconnect licenses onto ASA.
Each firepower model comes unlocked to the max VPN hardware capacity by default. You only need 3DES license, which is free, and an AnyConnect license(s) to be compliant and to be able to download .pkg file from cisco.com. And you don't actually need this file on ASA if users already have AnyConnect installed (CSCvz88858).
07-08-2024 11:14 AM
You can also tailor the built-in Windows L2TP/IPSec client to offer updated ciphers/algorithms to the FPR1010. You can do this in PowerShell using the following syntax:
Set-VpnConnectionIPsecConfiguration -ConnectionName L2TP -AuthenticationTransformConstants SHA196 -CipherTransformConstants AES256 -DHGroup Group14 -EncryptionMethod AES256 -IntegrityCheckMethod SHA1 -PfsGroup PFS2048 -Force
In the example above, the L2TP/IPSec connection name that I created is "L2TP".
The IKEv1 phase 1 parameters are:
AES256/SHA/DH Group14
The IKEv1 phase 2 settings are:
AES256/SHA/PFS Group14
FPR1010 debugs show the custom offer being sent:
# of transforms: 1
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 40
Transform #: 1
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Key Length: 256
Hash Algorithm: SHA1
Group Description: Group 14
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 00 00 70 80
You can refer to this for details on how to change the ciphers/algorithms. It's for IKEv2, but the concept is the same for any IPSec-based VPN connection profile that you create with the built-in Windows client:
07-11-2024 05:52 AM
A few years back (maybe around 2017-2018) I did look to see if Windows client's default encryption could be modified but never found anything. Figures it would have to be Powershell. I did get this entered into Windows and figured out the config settings on the ASA. Did take me a while but I did connect, did see both P1 and P2 complete. Only frustration now is I dont get ping reply to the ASA's inside interface (management access is inside, icmp inside is in config).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide