Regarding Any Connect not being connected, when it reaches the part to enter the password, the software is disconnected and the continuation of work is lost, and I think the ports related to DTLS and TLS, which allow authentication, are closed. Can I get help from Cisco to solve this ...
Regarding Any Connect not being connected, when it reaches the part to enter the password, the software is disconnected and the continuation of work is lost, and I think the ports related to DTLS and TLS, which allow authentication, are closed. Can I get help from Cisco to solve this ...
INFO: Converting to: ssl cipher tlsv1 custom "AES256-SHA:AES128-SHA" INFO: Converting to: ssl cipher dtlsv1 custom "AES256-SHA:AES128-SHA" Disclaimer: SHA1 is bad, where practical all cert ciphers should be at least SHA256 Related Articles, References, Credits, or External Links NA...
Well I think I found the trouble. The point is that I'm not using the default port for HTTPS and DTLS. When I connected to the VPN through the portal, the Connected to box showed my outside IP, so when I disconnect, I try to connect to the same IP
If that's not working, keep in mind VPNs also use TLS (TCP 443) and DTLS (UDP 443). Though typically these are open in most organizations. Hope this helps. Please mark this as helpful or solution accepted to help othersConnect with me https://bigevilbeard.github.io 0 Helpful ...
Here is a link, a few years old but explains https://community.cisco.com/t5/security-documents/anyconnect-dtls-vs-tls/ta-p/3164027Hope this helps. Please mark this as helpful or solution accepted to help othersConnect with me https://bigevilbeard.github.io 0 Helpful Reply...
Assuming you are using the "outside" interface, check that one and enable DTLS. Then click "Device Certificate" and make sure you have the correct certificate chosen for the SSL connection (probably the ASAs self signed certificate". Make sure "Bypass interface access lists for inbound VPN ...