19.07.2013 Views

AnyConnect VPN - The Cisco Learning Network

AnyConnect VPN - The Cisco Learning Network

AnyConnect VPN - The Cisco Learning Network

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>AnyConnect</strong> <strong>VPN</strong> (SSL) Client on IOS Router with<br />

CCP Configuration Example<br />

Document ID: 110608<br />

Contents<br />

Introduction<br />

Prerequisites<br />

Requirements<br />

Components Used<br />

Conventions<br />

<strong>Network</strong> Diagram<br />

Preconfiguration Tasks<br />

Configure Anyconnect <strong>VPN</strong> on IOS<br />

Step 1. Install and Enable the Anyconnect <strong>VPN</strong> Software on the IOS Router<br />

Step 2. Configure a SSL<strong>VPN</strong> Context and SSL<strong>VPN</strong> Gateway with the CCP Wizard<br />

Step 3. Configure the User Database for Anyconnect <strong>VPN</strong> Users<br />

Step 4. Configure the Anyconnect Full Tunnel<br />

CLI Configuration<br />

Establish the <strong>AnyConnect</strong> <strong>VPN</strong> Client Connection<br />

Verify<br />

Commands<br />

Troubleshoot<br />

SSL Connectivity Issue<br />

Error: SSL<strong>VPN</strong> Package SSL−<strong>VPN</strong>−Client : installed Error: Disk<br />

Troubleshooting Commands<br />

Related Information<br />

Introduction<br />

This document describes how to set up a <strong>Cisco</strong> IOS ® router to perform SSL <strong>VPN</strong> on a stick with <strong>Cisco</strong><br />

<strong>AnyConnect</strong> <strong>VPN</strong> client using <strong>Cisco</strong> Configuration Professional (CCP). This setup applies to a specific case<br />

where the Router does not allow split tunneling, and users connect directly to the Router before they are<br />

permitted to go to the Internet.<br />

SSL <strong>VPN</strong> or Web<strong>VPN</strong> technology is supported on these IOS router platforms:<br />

• 870, 1811, 1841, 2801, 2811, 2821, 2851<br />

• 3725, 3745, 3825, 3845, 7200, and 7301<br />

CCP is a GUI−based device management tool that allows you to configure <strong>Cisco</strong> IOS−based access routers,<br />

including <strong>Cisco</strong> integrated services routers, <strong>Cisco</strong> 7200 series routers, and the <strong>Cisco</strong> 7301 router. CCP is<br />

installed on a PC and simplifies router, security, unified communications, wireless, WAN, and basic LAN<br />

configuration through GUI−based, easy−to−use wizards.<br />

Routers that are ordered with CCP are shipped with <strong>Cisco</strong> Configuration Professional Express (CCP Express)<br />

installed in router flash memory. CCP Express is a lightweight version of CCP. You can use CCP Express to<br />

configure basic security features on the router's LAN and WAN interfaces. CCP Express is available on the<br />

router flash memory.


Prerequisites<br />

Requirements<br />

Ensure that you meet these requirements before you attempt this configuration:<br />

• Microsoft Windows 2000 or XP<br />

• Web Browser with SUN JRE 1.4 or later or an ActiveX controlled browser<br />

• Local administrative privileges on the client<br />

• <strong>Cisco</strong> IOS Router with Advanced Security image −12.4(20)T or later<br />

• <strong>Cisco</strong> Configuration Professional 1.3<br />

If the <strong>Cisco</strong> Configuration Professional is not already loaded on your computer, you can obtain a free<br />

copy of the software and install the .exe (cisco−config−pro−k9−pkg−1_3−en.zip) file from Software<br />

Download. For detailed information on the installation and configuration of CCP, refer to <strong>Cisco</strong><br />

Configuration Professional Quick Start Guide.<br />

Components Used<br />

<strong>The</strong> information in this document is based on these software and hardware versions:<br />

• <strong>Cisco</strong> IOS Series 1841 Router with software version 12.4(24)T<br />

• <strong>Cisco</strong> Configuration Professional (CCP) 1.3<br />

• <strong>Cisco</strong> <strong>AnyConnect</strong> SSL <strong>VPN</strong> Client version for Windows 2.3.2016<br />

Note: <strong>The</strong> information in this document was created from devices in a specific lab environment. All of the<br />

devices used in this document started with a cleared (default) configuration. If your network is live, make sure<br />

that you understand the potential impact of any command.<br />

Conventions<br />

Refer to the <strong>Cisco</strong> Technical Tips Conventions for more information on document conventions.<br />

<strong>Network</strong> Diagram<br />

This document uses this network setup:<br />

Preconfiguration Tasks<br />

1.<br />

You must configure the router for CCP.


Routers with the appropriate security bundle license already have the CCP application loaded in flash.<br />

Refer to <strong>Cisco</strong> Configuration Professional Quick Start Guide to obtain and configure the software.<br />

2. Download a copy of the Anyconnect <strong>VPN</strong> .pkg file to your management PC.<br />

Configure Anyconnect <strong>VPN</strong> on IOS<br />

In this section, you are presented with the steps necessary to configure the features described in this<br />

document. This example configuration uses the CCP Wizard to enable the operation of the Anyconnect <strong>VPN</strong><br />

on the IOS router.<br />

Complete these steps in order to configure Anyconnect <strong>VPN</strong> on the <strong>Cisco</strong> IOS router:<br />

1. Install and Enable the Anyconnect <strong>VPN</strong> Software on the <strong>Cisco</strong> IOS Router<br />

2. Configure a SSL <strong>VPN</strong> Context and SSL <strong>VPN</strong> Gateway with the CCP Wizard<br />

3. Configure the User Database for Anyconnect <strong>VPN</strong> Users<br />

4. Configure the Resources to Expose to Users<br />

Step 1. Install and Enable the Anyconnect <strong>VPN</strong> Software on the IOS<br />

Router<br />

To install and enable the Anyconnect <strong>VPN</strong> software on the IOS router, complete these steps:<br />

1. Open the CCP application, go to Configure > Security, and then click <strong>VPN</strong>.<br />

2. Expand SSL<strong>VPN</strong>, and choose Packages.<br />

3.<br />

In the <strong>Cisco</strong> SSL<strong>VPN</strong> client software, click Browse.<br />

<strong>The</strong> Install SSL <strong>VPN</strong> Client Package dialog box appears.


4. Specify the location of the <strong>Cisco</strong> Anyconnect <strong>VPN</strong> client image.<br />

♦ If the <strong>Cisco</strong> Anyconnect <strong>VPN</strong> client image is in the router's flash, click the Router File<br />

System radio button dialog box, and click Browse.<br />

♦ If the <strong>Cisco</strong> Anyconnect <strong>VPN</strong> client image is not in the router's flash, click the My<br />

Computer radio dialog box, and click Browse.<br />

<strong>The</strong> File Selection dialog box appears.<br />

5.<br />

Select the client image that you want to install, and click OK.


6. Once you specify the location of the client image, click Install.<br />

7. Click Yes, and then click OK.<br />

8. Once the client image is successfully installed, you receive this message:<br />

9. Click OK to continue.<br />

Step 2. Configure a SSL<strong>VPN</strong> Context and SSL<strong>VPN</strong> Gateway with the CCP<br />

Wizard<br />

Complete these steps in order to configure a SSL <strong>VPN</strong> context and SSL <strong>VPN</strong> gateway:<br />

1. Go to Configure > Security > <strong>VPN</strong>, and then click SSL <strong>VPN</strong>.<br />

2. Click SSL <strong>VPN</strong> Manager, and click the Create SSL <strong>VPN</strong> tab.<br />

3.<br />

Check the Create a New SSL <strong>VPN</strong> radio button, and then click Launch the selected task.<br />

<strong>The</strong> SSL <strong>VPN</strong> Wizard dialog box appears.


4. Click Next.<br />

5.<br />

Enter the IP Address of the new SSL <strong>VPN</strong> gateway, and enter a unique name for this SSL <strong>VPN</strong><br />

context.


You can create different SSL <strong>VPN</strong> contexts for the same IP address (SSL <strong>VPN</strong> gateway), but each<br />

name must be unique. This example uses this IP address: https://172.16.1.1/<br />

6. Click Next, and continue to Step 3.<br />

Step 3. Configure the User Database for Anyconnect <strong>VPN</strong> Users<br />

For authentication, you can use an AAA Server, local users, or both. This configuration example uses locally<br />

created users for authentication.<br />

Complete these steps in order to configure the user database for Anyconnect <strong>VPN</strong> users:<br />

1.<br />

After you complete Step 2, click the Locally on this router radio button located in the SSL <strong>VPN</strong><br />

Wizard User Authentication dialog box.<br />

This dialog box allows you to add users to the local database.<br />

2.<br />

Click Add, and enter user information.


3. Click OK, and add additional users as necessary.<br />

4. After you add the necessary users, click Next, and continue to Step 4.<br />

Step 4. Configure the Anyconnect Full Tunnel<br />

Complete these steps in order to configure the Anyconnect full tunnel and pool of ip addresses for the users:<br />

1.<br />

As Anyconnect gives the direct access to corporate intranet resources, the URL list is not needed to<br />

configure. Click the Next button located in the Configure Intranet Websites dialog box.


2. Verify that the Enable Full Tunnel check box is checked.<br />

3. Create a pool of IP addresses that clients of this SSL <strong>VPN</strong> context can use.<br />

<strong>The</strong> pool of addresses must correspond to addresses available and routable on your Intranet.<br />

4.<br />

Click the ellipses (...) next to the IP Address Pool field, and choose Create a new IP Pool.


5. In the Add IP Local Pool dialog box, enter a namefor the pool (for example, new), and click Add.<br />

6.<br />

In the Add IP address range dialog box, enter the address pool range for the Anyconnect <strong>VPN</strong> clients,<br />

and click OK.<br />

Note: Before 12.4(20)T, the IP address pool should be in a range of an interface directly connected to<br />

the router. If you want to use a different pool range, you can create a loopback address associated with<br />

your new pool to satisfy this requirement. .<br />

7. Click OK.<br />

8.<br />

Make sure to check the Install Full Tunnel Client check box.


9.<br />

Configure advanced tunnel options, such as split tunneling, split DNS, browser proxy settings, and<br />

DNS and WNS servers.<br />

Note: <strong>Cisco</strong> recommends you configure at least DNS and WINS servers.<br />

To configure advanced tunnel options, complete these steps:<br />

a. Click the Advanced Tunnel Options button.<br />

b. Click the DNS and WINS Servers tab, and enter the primary IP addresses for the DNS and<br />

WINS servers.


c. To configure split tunneling, click the Split Tunneling tab.<br />

<strong>The</strong> ability to transmit both secured and unsecured traffic on the same interface is known as<br />

split tunneling. Split tunneling requires that you specify exactly which traffic is secured and<br />

what the destination of that traffic is, so that only the specified traffic enters the tunnel while<br />

the rest is transmitted unencrypted across the public network (Internet).<br />

For example, refer to ASA 8.x : Allow Split Tunneling for <strong>AnyConnect</strong> <strong>VPN</strong> Client on the<br />

ASA Configuration Example which provides step−by−step instructions on how to allow<br />

<strong>Cisco</strong> <strong>AnyConnect</strong> <strong>VPN</strong> client access to the Internet while they are tunneled into a <strong>Cisco</strong><br />

Adaptive Security Appliance (ASA) 8.0.2.<br />

10. After you configure the necessary options, click Next.<br />

11.<br />

Customize the SSL <strong>VPN</strong> Portal Page or select the default values.<br />

<strong>The</strong> Customize SSL <strong>VPN</strong> Portal Page allows you to customize how the SSL <strong>VPN</strong> Portal Page appears<br />

to your customers.


12. After you customize the SSL <strong>VPN</strong> portal page, click Next.<br />

13. Click Finish.<br />

14.<br />

Click Deliver in order to save your configuration, and then click OK.<br />

<strong>The</strong> SSL <strong>VPN</strong> Wizard submits tour commands to the router.


Note: If you receive an error message, the SSL <strong>VPN</strong> license may be incorrect.<br />

To correct a license issue, complete these steps:<br />

a. Go to Configure > Security > <strong>VPN</strong>, and then click SSL <strong>VPN</strong>.<br />

b. Click SSL <strong>VPN</strong> Manager, and then click the Edit SSL <strong>VPN</strong> tab in the right hand side.<br />

c.<br />

Highlight your newly created context, and click the Edit button.


d. In the Maximum Number of users field, enter the correct number of users for your license.<br />

e. Click OK, and then click Deliver.<br />

CLI Configuration<br />

Your commands are written to the configuration file.<br />

CCP creates these command−line configurations:<br />

Router#show run<br />

Building configuration...<br />

Current configuration : 4110 bytes<br />

!<br />

version 12.4<br />

service timestamps debug datetime msec<br />

service timestamps log datetime msec<br />

no service password−encryption<br />

!<br />

hostname Router<br />

!<br />

boot−start−marker<br />

boot−end−marker<br />

!<br />

logging message−counter syslog<br />

no logging buffered<br />

enable password cisco<br />

!<br />

aaa new−model<br />

!<br />

Router


!<br />

aaa authentication login default local<br />

aaa authentication login ciscocp_vpn_xauth_ml_1 local<br />

aaa authorization exec default local<br />

!<br />

!<br />

aaa session−id common<br />

!<br />

crypto pki trustpoint TP−self−signed−1951692551<br />

enrollment selfsigned<br />

subject−name cn=IOS−Self−Signed−Certificate−1951692551<br />

revocation−check none<br />

rsakeypair TP−self−signed−1951692551<br />

!<br />

!<br />

crypto pki certificate chain TP−self−signed−1951692551<br />

certificate self−signed 02<br />

3082023E 308201A7 A0030201 02020102 300D0609 2A864886 F70D0101 04050030<br />

31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274<br />

69666963 6174652D 31393531 36393235 3531301E 170D3039 30383037 31303538<br />

33345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649<br />

4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 39353136<br />

39323535 3130819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281<br />

8100CD40 156E21C4 4F84401A F5674319 CC05B708 72A79C69 90997D30 6F556A37<br />

75FC53DA AB0B43AF 70E7DBC2 C9416C4B 009C3695 67C20847 4F0BC7B0 715F0518<br />

5E558DFC 13A20167 5D169C47 3BC083C9 A2B66790 79B83814 5008EBF6 169FA897<br />

6D955F46 2BDADBB0 5275F07E C124CCF3 64DD9CE1 1B6F5744 282E4EA5 A0840385<br />

5FD90203 010001A3 66306430 0F060355 1D130101 FF040530 030101FF 30110603<br />

551D1104 0A300882 06526F75 74657230 1F060355 1D230418 30168014 05F279A9<br />

C556AF46 C5F7A1F0 2ADD2D22 F75BF7B7 301D0603 551D0E04 16041405 F279A9C5<br />

56AF46C5 F7A1F02A DD2D22F7 5BF7B730 0D06092A 864886F7 0D010104 05000381<br />

81004886 D666121E 42862509 CA7FDACC 9C57C8BE EB6745FC 533A8C08 FEF2C007<br />

274374EE 803823FB 79CFD135 2B116544 88B5CFB1 B7BB03E2 F3D65A62 B0EE050A<br />

924D3168 98357A5B E1F15449 5C9C22D0 577FB036 A3D8BB08 5507C574 18F2F48F<br />

0694F21C 0983F254 6620FCD7 8E460D29 B09B87E8 ADC3D589 F4D74659 A5CEA30F 1A9C<br />

quit<br />

dot11 syslog<br />

ip source−route<br />

!<br />

!<br />

!<br />

!<br />

ip cef<br />

!<br />

multilink bundle−name authenticated<br />

!<br />

!<br />

!<br />

username test privilege 15 password 0 test<br />

username tsweb privilege 15 password 0 tsweb<br />

!<br />

!<br />

!<br />

archive<br />

log config<br />

hidekeys<br />

!<br />

!<br />

!<br />

!<br />

!<br />

!<br />

interface FastEthernet0/0<br />

ip address 10.77.241.111 255.255.255.192<br />

duplex auto<br />

speed auto


!<br />

interface FastEthernet0/1<br />

description $ES_LAN$<br />

ip address 172.16.1.1 255.255.255.0<br />

ip virtual−reassembly<br />

duplex auto<br />

speed auto<br />

!<br />

interface FastEthernet0/1/0<br />

!<br />

interface FastEthernet0/1/1<br />

!<br />

interface FastEthernet0/1/2<br />

!<br />

interface FastEthernet0/1/3<br />

!<br />

interface ATM0/0/0<br />

no ip address<br />

shutdown<br />

no atm ilmi−keepalive<br />

!<br />

interface Vlan1<br />

no ip address<br />

!<br />

ip local pool new 192.168.10.1 192.168.10.10<br />

ip forward−protocol nd<br />

ip route 10.20.10.0 255.255.255.0 172.16.1.2<br />

ip route 10.77.233.0 255.255.255.0 10.77.241.65<br />

ip http server<br />

ip http authentication local<br />

ip http secure−server<br />

!<br />

!<br />

!<br />

!<br />

!<br />

!<br />

!<br />

!<br />

control−plane<br />

!<br />

!<br />

line con 0<br />

line aux 0<br />

line vty 0 4<br />

password cisco<br />

transport input telnet ssh<br />

transport output telnet<br />

!<br />

scheduler allocate 20000 1000<br />

!<br />

webvpn gateway gateway_1<br />

ip address 172.16.1.1 port 443<br />

http−redirect port 80<br />

ssl trustpoint TP−self−signed−1951692551<br />

inservice<br />

!<br />

webvpn install svc flash:/webvpn/svc_1.pkg sequence 1<br />

!<br />

webvpn context sales<br />

secondary−color white<br />

title−color #CCCC66<br />

text−color black<br />

ssl authenticate verify all<br />

!


!<br />

policy group policy_1<br />

functions svc−enabled<br />

svc address−pool "new"<br />

svc dns−server primary 10.1.1.1<br />

svc wins−server primary 10.1.1.2<br />

default−group−policy policy_1<br />

aaa authentication list ciscocp_vpn_xauth_ml_1<br />

gateway gateway_1<br />

max−users 10<br />

inservice<br />

!<br />

end<br />

Establish the <strong>AnyConnect</strong> <strong>VPN</strong> Client Connection<br />

Complete these steps in order to establish an <strong>AnyConnect</strong> <strong>VPN</strong> connection with Router.<br />

Note: Add a router to the list of trusted sites in the Internet Explorer. For more information, refer to Adding a<br />

Security Appliance/Router to the List of Trusted Sites (IE).<br />

1.<br />

Enter the URL or IP address of the router's Web<strong>VPN</strong> interface in your web browser in the format as<br />

shown.<br />

OR<br />

https://<br />

https://


2. Enter your user name and password.<br />

3.<br />

Click the start button to initiate the Anyconnect <strong>VPN</strong> Tunnel Connection.


4.<br />

This window appears before the SSL <strong>VPN</strong> connection is established.<br />

Note: ActiveX software must be installed in your computer before you download the Anyconnect<br />

<strong>VPN</strong>.<br />

<strong>The</strong> Connection Established message appears once the client successfully connects.


5. Once the connection is successfully established, click the Statistics tab.<br />

<strong>The</strong> Statistics tab displays information about the SSL connection.<br />

6.<br />

Click Details.


<strong>The</strong> <strong>Cisco</strong> <strong>AnyConnect</strong> <strong>VPN</strong> Client: Statistics Detail dialog box appears.<br />

<strong>The</strong> Statistics Details dialog box displays detailed connection statistical information, including the<br />

tunnel state and mode, the duration of the connection, the number of bytes and frames sent and<br />

received, address information, transport information, and <strong>Cisco</strong> Secure Desktop posture assessment<br />

status. <strong>The</strong> Reset button on this tab resets the transmission statistics. <strong>The</strong> Export button allows you to<br />

export the current statistics, interface, and routing table to a text file. <strong>The</strong> <strong>AnyConnect</strong> client prompts<br />

you for a name and location for the text file. <strong>The</strong> default name is <strong>AnyConnect</strong>−ExportedStats.txt, and<br />

the default location is on the desktop.<br />

7.<br />

In the <strong>Cisco</strong> <strong>AnyConnect</strong> <strong>VPN</strong> Client dialog box, click the About tab.<br />

This tab displays the <strong>Cisco</strong> <strong>AnyConnect</strong> <strong>VPN</strong> Client Version information.


Verify<br />

Use this section to confirm that your configuration works properly.<br />

Commands<br />

Several show commands are associated with Web<strong>VPN</strong>. You can execute these commands at the<br />

command−line interface (CLI) to show statistics and other information. For detailed information about show<br />

commands, refer to Verifying Web<strong>VPN</strong> Configuration.<br />

Note: <strong>The</strong> Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use<br />

the OIT to view an analysis of show command output.<br />

•<br />

•<br />

Router#show webvpn session context all<br />

Web<strong>VPN</strong> context name: sales<br />

Client_Login_Name Client_IP_Address No_of_Connections Created Last_Used<br />

test 10.20.10.2 3 00:03:10 00:02:56<br />

Router#show webvpn session user test context sales<br />

Web<strong>VPN</strong> user name = test ; IP address = 10.20.10.2 ; context = sales<br />

No of connections: 0<br />

Created 00:26:05, Last−used 00:25:24<br />

User Policy Parameters<br />

Group name = policy_1<br />

Group Policy Parameters<br />

url list name = "webserver"<br />

idle timeout = 2100 sec<br />

session timeout = Disabled<br />

functions =<br />

mask−urls<br />

svc−enabled


•<br />

citrix disabled<br />

address pool name = "new"<br />

dpd client timeout = 300 sec<br />

dpd gateway timeout = 300 sec<br />

keepalive interval = 30 sec<br />

SSL<strong>VPN</strong> Full Tunnel mtu size = 1406 bytes<br />

keep sslvpn client installed = enabled<br />

rekey interval = 3600 sec<br />

rekey method =<br />

lease duration = 43200 sec<br />

Router#show webvpn stats<br />

User session statistics:<br />

Active user sessions : 1 AAA pending reqs : 0<br />

Peak user sessions : 2 Peak time : 00:00:52<br />

Active user TCP conns : 0 Terminated user sessions : 2<br />

Session alloc failures : 0 Authentication failures : 1<br />

<strong>VPN</strong> session timeout : 0 <strong>VPN</strong> idle timeout : 0<br />

User cleared <strong>VPN</strong> sessions: 0 Exceeded ctx user limit : 0<br />

Exceeded total user limit: 0<br />

Client process rcvd pkts : 108 Server process rcvd pkts : 0<br />

Client process sent pkts : 589 Server process sent pkts : 0<br />

Client CEF received pkts : 76 Server CEF received pkts : 0<br />

Client CEF rcv punt pkts : 0 Server CEF rcv punt pkts : 0<br />

Client CEF sent pkts : 0 Server CEF sent pkts : 0<br />

Client CEF sent punt pkts: 0 Server CEF sent punt pkts: 0<br />

SSL<strong>VPN</strong> appl bufs inuse : 0 SSL<strong>VPN</strong> eng bufs inuse : 0<br />

Active server TCP conns : 0<br />

Mangling statistics:<br />

Relative urls : 0 Absolute urls : 0<br />

Non−http(s) absolute urls: 0 Non−standard path urls : 0<br />

Interesting tags : 0 Uninteresting tags : 0<br />

Interesting attributes : 0 Uninteresting attributes : 0<br />

Embedded script statement: 0 Embedded style statement : 0<br />

Inline scripts : 0 Inline styles : 0<br />

HTML comments : 0 HTTP/1.0 requests : 0<br />

HTTP/1.1 requests : 9 Unknown HTTP version : 0<br />

GET requests : 9 POST requests : 0<br />

CONNECT requests : 0 Other request methods : 0<br />

Through requests : 0 Gateway requests : 9<br />

Pipelined requests : 0 Req with header size >1K : 0<br />

Processed req hdr bytes : 2475 Processed req body bytes : 0<br />

HTTP/1.0 responses : 0 HTTP/1.1 responses : 0<br />

HTML responses : 0 CSS responses : 0<br />

XML responses : 0 JS responses : 0<br />

Other content type resp : 0 Chunked encoding resp : 0<br />

Resp with encoded content: 0 Resp with content length : 0<br />

Close after response : 0 Resp with header size >1K: 0<br />

Processed resp hdr size : 0 Processed resp body bytes: 0<br />

Backend https response : 0 Chunked encoding requests: 0<br />

HTTP Authentication stats :<br />

Successful NTLM Auth : 0 Failed NTLM Auth : 0<br />

Successful Basic Auth : 0 Failed Basic Auth : 0<br />

Unsupported Auth : 0 Unsup Basic HTTP Method : 0<br />

NTLM srv kp alive disabld: 0 NTLM Negotiation Error : 0<br />

Oversize NTLM Type3 cred : 0 Internal Error : 0<br />

Num 401 responses : 0 Num non−401 responses : 0<br />

Num Basic forms served : 0 Num NTLM forms served : 0<br />

Num Basic Auth sent : 0 Num NTLM Auth sent : 0<br />

CIFS statistics:<br />

SMB related Per Context:<br />

TCP VC's : 0 UDP VC's : 0<br />

Active VC's : 0 Active Contexts : 0


Aborted Conns : 0<br />

NetBIOS related Per Context:<br />

Name Queries : 0 Name Replies : 0<br />

NB DGM Requests : 0 NB DGM Replies : 0<br />

NB TCP Connect Fails : 0 NB Name Resolution Fails : 0<br />

SMB related Global:<br />

Sessions in use : 0 Mbufs in use : 0<br />

Mbuf Chains in use : 0 Active VC's : 0<br />

Active Contexts : 0 Browse Errors : 0<br />

Empty Browser List : 0 NetServEnum Errors : 0<br />

Empty Server List : 0 NBNS Config Errors : 0<br />

NetShareEnum Errors : 0<br />

HTTP related Per Context:<br />

Requests : 0 Request Bytes RX : 0<br />

Request Packets RX : 0 Response Bytes TX : 26286<br />

Response Packets TX : 33 Active Connections : 0<br />

Active CIFS context : 0 Requests Dropped : 0<br />

HTTP related Global:<br />

Server User data : 0 CIFS User data : 0<br />

Net Handles : 0 Active CIFS context : 0<br />

Authentication Fails : 0 Operations Aborted : 0<br />

Timers Expired : 0 Pending Close : 0<br />

Net Handles Pending SMB : 0 File Open Fails : 0<br />

Browse <strong>Network</strong> Ops : 0 Browse <strong>Network</strong> Fails : 0<br />

Browse Domain Ops : 0 Browse Domain Fails : 0<br />

Browse Server Ops : 0 Browse Server Fails : 0<br />

Browse Share Ops : 0 Browse Share Fails : 0<br />

Browse Dir Ops : 0 Browse <strong>Network</strong> Fails : 0<br />

File Read Ops : 0 File Read Fails : 0<br />

File Write Ops : 0 File Write Fails : 0<br />

Folder Create Ops : 0 Folder Create Fails : 0<br />

File Delete Ops : 0 File Delete Fails : 0<br />

File Rename Ops : 0 File Rename Fails : 0<br />

URL List Access OK : 0 URL List Access Fails : 0<br />

Socket statistics:<br />

Sockets in use : 1 Sock Usr Blocks in use : 1<br />

Sock Data Buffers in use : 0 Sock Buf desc in use : 0<br />

Select timers in use : 1 Sock Select Timeouts : 0<br />

Sock Tx Blocked : 0 Sock Tx Unblocked : 0<br />

Sock Rx Blocked : 0 Sock Rx Unblocked : 0<br />

Sock UDP Connects : 0 Sock UDP Disconnects : 0<br />

Sock Premature Close : 0 Sock Pipe Errors : 12<br />

Sock Select Timeout Errs : 0<br />

Port Forward statistics:<br />

Client Server<br />

proc pkts : 0 proc pkts : 0<br />

proc bytes : 0 proc bytes : 0<br />

cef pkts : 0 cef pkts : 0<br />

cef bytes : 0 cef bytes : 0<br />

WEB<strong>VPN</strong> Citrix statistics:<br />

Server Client<br />

Packets in : 0 0<br />

Packets out : 0 0<br />

Bytes in : 0 0<br />

Bytes out : 0 0<br />

ACL statistics:<br />

Permit web request : 0 Deny web request : 0<br />

Permit cifs request : 0 Deny cifs request : 0<br />

Permit without ACL : 0 Deny without match ACL : 0<br />

Permit with match ACL : 0 Deny with match ACL : 0


Single Sign On statistics:<br />

Auth Requests : 0 Pending Auth Requests : 0<br />

Successful Requests : 0 Failed Requests : 0<br />

Retranmissions : 0 DNS Errors : 0<br />

Connection Errors : 0 Request Timeouts : 0<br />

Unknown Responses : 0<br />

URL−rewrite splitter statistics:<br />

Direct access request : 0 Redirect request : 0<br />

Internal request : 0<br />

Tunnel Statistics:<br />

Active connections : 0<br />

Peak connections : 1 Peak time : 00:34:51<br />

Connect succeed : 3 Connect failed : 0<br />

Reconnect succeed : 0 Reconnect failed : 0<br />

DPD timeout : 0<br />

Client Server<br />

in CSTP frames : 32 out IP pkts : 5<br />

in CSTP data : 5<br />

in CSTP control : 27<br />

in CSTP bytes : 1176 out IP bytes : 805<br />

out CSTP frames : 4 in IP pkts : 0<br />

out CSTP data : 0<br />

out CSTP control : 4<br />

out CSTP bytes : 32 in IP bytes : 0<br />

cef in CSTP data frames : 0 cef out forwarded pkts : 0<br />

cef in CSTP data bytes : 0 cef out forwarded bytes : 0<br />

cef out CSTP data frames : 0 cef in forwarded pkts : 0<br />

cef out CSTP data bytes : 0 cef in forwarded bytes : 0<br />

• In CCP, choose Monitoring > Security > <strong>VPN</strong> Status > SSL <strong>VPN</strong> > Users in order to view the<br />

current SSL <strong>VPN</strong> user lists in the router.<br />

•<br />

Choose Monitoring > Security > <strong>VPN</strong> Status > SSL <strong>VPN</strong> > Sales in order to view the current SSL<br />

<strong>VPN</strong> session information in the router.


Troubleshoot<br />

Use this section to troubleshoot your configuration.<br />

SSL Connectivity Issue<br />

Problem: SSL <strong>VPN</strong> clients are unable to connect the router.<br />

Solution: Insufficient IP addresses in the IP address pool might cause this issue. Increase the number of IP<br />

addresses in the pool of IP addresses on the router in order to resolve this issue.<br />

For more information on Troubleshooting <strong>AnyConnect</strong> <strong>VPN</strong> Client, refer to <strong>AnyConnect</strong> <strong>VPN</strong> Client FAQ.<br />

Error: SSL<strong>VPN</strong> Package SSL−<strong>VPN</strong>−Client : installed Error: Disk<br />

Problem: You receive this error when you install the SVC package on a router: SSL<strong>VPN</strong> Package<br />

SSL−<strong>VPN</strong>−Client : installed Error: Disk.<br />

Solution: This error can be resolved by reformatting the flash.<br />

Troubleshooting Commands<br />

Several clear commands are associated with Web<strong>VPN</strong>. For detailed information about these commands, refer<br />

to Using Web<strong>VPN</strong> Clear Commands.<br />

Several debug commands are associated with Web<strong>VPN</strong>. For detailed information about these commands,<br />

refer to Using Web<strong>VPN</strong> Debug Commands.<br />

Note: <strong>The</strong> use of debug commands can adversely impact your <strong>Cisco</strong> device. Before you use debug<br />

commands, refer to Important Information on Debug Commands.


Related Information<br />

• <strong>Cisco</strong> IOS SSL<strong>VPN</strong><br />

• <strong>AnyConnect</strong> <strong>VPN</strong> Client FAQ<br />

• <strong>Cisco</strong> <strong>AnyConnect</strong> <strong>VPN</strong> Client Administrator Guide, Release 2.3<br />

• SSL <strong>VPN</strong> − Web<strong>VPN</strong><br />

• Clientless SSL <strong>VPN</strong> (Web<strong>VPN</strong>) on <strong>Cisco</strong> IOS with SDM Configuration Example<br />

• Thin−Client SSL <strong>VPN</strong> (Web<strong>VPN</strong>) IOS Configuration Example with SDM<br />

• Web<strong>VPN</strong> and DM<strong>VPN</strong> Convergence Deployment Guide<br />

• Technical Support & Documentation − <strong>Cisco</strong> Systems<br />

Contacts & Feedback | Help | Site Map<br />

© 2010 − 2011 <strong>Cisco</strong> Systems, Inc. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks of<br />

<strong>Cisco</strong> Systems, Inc.<br />

Updated: Aug 28, 2009 Document ID: 110608

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!