I hope you are doing well. I am writing this message in search of assistance and guidance for a problem I have been experiencing with Cisco AnyConnect on a new machine. First and foremost, I'd like to mention that Cisco AnyConnect works perfectly on other two machines, but on a new one (fresh windows 10 Pro 22h2 installation), I have not been successful in getting it to function properly.
I have tried various versions of the software, including the anyconnect-win-4.7.04056-predeploy-k9.zip, which worked flawlessly on my other machines. However, on the new machine, I cannot make it work. In addition to this version, I also attempted to use version 4.10.04071 and the latest one available at that time, 4.10.07073, but on both occasions, I encountered the same negative outcome.
Firewall turned off. No AV, only Windows Defender, as onto other machines. Good ping to XML service, good tracert, all OK. But looks like connection starts, prompts for credentials, logs correctly and then 5 seconds after falls.
I would greatly appreciate any help or suggestions you can provide to help resolve this issue on my new machine. I am willing to provide additional information if needed to diagnose and address this inconvenience.
When I try to connect via "connect" button, I get login prompt, so I reach the server.
If it were a different problem, I would not even get there and therefore, I would not even have a login prompt.
And once the credentials are entered, it connects properly, but it crashes immediately!
What looks TERRIBLE to me, is that no Cisco Admins or Labs or SAT colud sany anything about this situation, as it's their product and they should be able to talk about whats releated on certificates or through this very issue which clearly looks like an specific bug to me.
- the issue came from the parameter I had in the Anyconnect profile. I let all parameters as default and in my case, i have declared locaaly anyconnect users in my routeur. Then, I should have the parameter "Windows VPN Establishment" = AllowRemoteUsers
After these changes, AnyConnect was still operationnal until that I stopped the remote desktop connection which was running. There is a conflict between both applications and the WA proposed by Cisco is to stop RDC during AnyConnect establishes the connection. While Anyconnect is connected, you can open a RDC as you like. there is no longer conflict.
I have a number of Cisco 5505 ASA's running various levels of software and I am looking at upgrading the users to use the anyconnect software due to the the older cisco vpn client not working correctly on the newer versions of windows.
My question really is what work is involved in setting up anyconnect when a remote vpn is already configured. Can you have both setup or is it one or the other.
What is different of Anyconnect is that the Anyconnect require you to enable the ssl-client protocol in the group policy you also need to upload the Anyconnect image to the ASA and apply it in the global webvpn settings also enable anyconnect to the outside interface and some other configuration will be enabled but in brief this is what you need to enable Anyconnect.
but you need to download the latest anyconnect image and upload it to your firewall then after that any user will need to download the anyconnect client should login to your firewall via SSL page then enter his account information and download the anyconnect client from the firewall and install it on his machine.
From past few days nobody in our organization is able to connect Cisco AnyConnect Secure Client asa firewall ASA5510 . 17 connection working if more than 17 connection another people trying to connect get this popup error :- "Could not connect to server . Please verify Internet connectivity and server address" .
It is interesting that up to 17 users works ok and if more than 17 attempt to connect then they get error message and connection fails. The obvious first question is whether it used to work with more than 17 concurrent users? Another question would be what is the size of the address pool used for AnyConnect?
One of the last issues we are trying to resolve is getting the vpn profiles to work with the client, when the profile is downloaded from our MX68 appliance it works, and the dropdown box populates with multiple gateways. however the powers that be require the profiles to be set before our users connect to the VPN for the first time.
however, after manually placing the .xml file in the profile folder it doesn't populate. I have restarted the services, rebooted, reinstalled, renamed the .xml, remade the file via the profile builder, but nothing I've tried so far has gotten this to work.
##EDIT: to anyone who stumbles on this in the future, the "Profile.xml" is case sensitive. If you attempt to use "profile.xml" for the cisco VPN client, it will not work. @alemabrahao had the solution dead on, this is just a reminder to double check the case of your file.
It's weird because I have been scouring looking for info and what is provided is generally what I have / had done.
@alemabrahao I used your exact profile format posted above thinking maybe its my file, but still the same result.
When you upload the profile in the Meraki dashboard, it ALWAYS appends .XML when it is downloaded by AnyConnect. So if you upload company.xml, it gets downloaded as company.xml.xml. So I tend to upload the profiles without an extension.
Next, if you have another Cisco product, such as Cisco Umbrella, you get to use Cisco SecureX. You can buy just a single licence for Cisco Umbrella (cheap) and not even use it, to get access to SecureX.
Why might you want to use Cisco SecureX? Because it cloud manages AnyConnect. You no longer use profiles - you control the settings in the Cisco SecureX dashboard. You can automate software updates, create test profiles, etc. Basically, this is the way you want to be rolling out new AnyConnect deployments.
SSL-VPN: This has no standard/RFC, so as a rule of thumb you should always assume no compatibility between vendors, unless explicitly confirmed by either side. (And as far as I know, this is the case here too)
IPsec: IPsec is mostly standardized, and there is even a "Dialup - Cisco IPsec Client" wizard template in FortiOS GUI. However, the last time I've heard about this, this teplate supposedly only works with some old/outdated Anyconnect versions, and new/current Anyconnect clients are reportedly incompatible with general third-party solutions due to some vendor-specific proprietary attributes used by Anyconnect and ASA.
I'm using the ASA-5515 in my old system, and as upgrade I'm switching to the Fortigate 200F. Regarding the budged, ZTNA will be implemented in 2024, so that's why I will use the anyconnect solution for the moment.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Could you explain a little more on what you are hoping to accomplish? Do you mean your cisco device that terminates the vpn sits behind a palo and you are trying to access it remotely? I would recommend configuring anyconnect while connected internally if you can. If you are unable to/work remotely, you would have to allow your connection externally by creating DNAT and associated security policy through the palo to get to the cisco device where you are aiming to setup anyconnect.
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.
This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
Cisco has released free software updates that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.
Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:
-user-license-agreement.html
Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.
The Cisco Support and Downloads page on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.
c80f0f1006