Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide
Solution Guide
Traditional network and content security solutions are ideal for protecting users
and assets behind the network firewall, but they are ineffective when users or
devices are not connected to the network, or when data is not routed through the
security solutions.
Cisco offers AnyConnect Secure Mobility to extend the network perimeter to
remote endpoints, enabling the seamless integration of web filtering services
offered by the Web Security appliance. Cisco AnyConnect Secure Mobility
provides an innovative new way to protect mobile users on computer-based or
smart-phone platforms, providing a more seamless, always-protected experience
for end users and comprehensive policy enforcement for IT administrators.
You might want to use AnyConnect Secure Mobility if your organization has users
who must access resources on the Internet in order to do their work, but who work
on different types of mobile devices outside of a traditional office location.
AnyConnect Secure Mobility is a collection of features across the following Cisco
products:
• Cisco IronPort Web Security appliance (WSA)
• Cisco ASA 5500 series adaptive security appliance (ASA)
• Cisco AnyConnect client
Cisco AnyConnect Secure Mobility addresses the challenges of a mobile
workforce by offering the following features:
• Secure, persistent connectivity. Cisco AnyConnect (with the adaptive
security appliances at the headend) provides the remote access connectivity
portion of AnyConnect Secure Mobility. The connection is secure because
both the user and device must be authenticated and validated prior to being
provided access to the network. The connection is persistent because
AnyConnect is typically configured to be always-on even when roaming
between networks. Although AnyConnect is always-on, it is also flexible
enough to apply different policies based on location, allowing users access to
the Internet in a “captive portal” situation, when users must accept terms of
agreement before accessing the Internet.
• Persistent security and policy enforcement. The Web Security appliance
applies context-aware policies, including enforcing acceptable use policies
and protection from malware for all users, including mobile (remote) users.
The Web Security appliance also accepts user authentication information
Remote and mobile users use the Cisco AnyConnect Secure VPN client to
establish VPN sessions with the adaptive security appliance. The adaptive
security appliance sends web traffic to the Web Security appliance along with
information identifying the user by IP address and user name. The Web Security
appliance scans the traffic, enforces acceptable use policies, and protects the user
from security threats. The adaptive security appliance returns all traffic deemed
safe and acceptable to the user.
All Internet traffic scanning is done by the Web Security appliance, not the client
on the mobile device. This improves overall performance by not burdening the
mobile device, some of which have limited processing power. In addition, by
scanning Internet traffic on the network, you can more easily and quickly update
security updates and acceptable use policies since you do not have to wait days,
weeks, or even months to push the updates to the client.
The Web Security appliance tracks the requests it receives and applies policies
configured for remote users to traffic received from remote users. For information
on how it identifies remote users, see Communication Between the ASA and
WSA, page 4.
Depending on how you configure the Web Security appliance, the AnyConnect
client may use a VPN connection to an adaptive security appliance to
communicate directly with the Web Security appliance. For more information, see
Communication from the Client, page 5.
established, the Web Security appliance authenticates with the adaptive security
appliance using the configured ASA access password. After successful
authentication, the adaptive security appliance sends the IP address-to-user
mapping to the Web Security appliance. The connection remains open, and the
adaptive security appliance updates the IP address-to-user mapping as necessary.
For example, when a new VPN connection is made, it adds a new user to the
mapping, and when a VPN connection is closed, it deletes the user from the
mapping.
Note If the connection between the Web Security appliance and an adaptive security
appliance is lost, the Web Security appliance tries to reestablish the connection
every 60 seconds by default. You can configure this time interval on the Web
Security appliance.
Note The client periodically checks connectivity to the Web Security appliance by
sending a request to a fictitious host. By default, the fictitious host URL is
mus.cisco.com. When AnyConnect Secure Mobility is enabled, the Web Security
appliance intercepts requests destined for the fictitious host and replies to the
client.
Supported Architectures
Enterprise network infrastructures are dynamic and unique, and there is an array
of architectures to consider when implementing the AnyConnect Secure Mobility
solution. In addition to AnyConnect remote access connectivity, the minimum
requirements for a successful Secure Mobility implementation consist of an
adaptive security appliance, Web security appliance, and in many cases, a WCCP
(Web Cache Communication Protocol) enabled router. However, there are design
requirements that could expand these architectures to include additional
appliances and routers.
The WCCP router allows the network to transparently redirect web traffic to the
WSA so that client applications are unaware of the presence of a proxy server on
the network. Most architectures included in this document require at least one
WCCP router. The WCCP router is necessary in most of these cases due to a
limitation in the WCCP implementation on the adaptive security appliance.
Note Consider all adaptive security appliance feature requirements your organization
needs when setting up the network for AnyConnect Secure Mobility. For example,
depending on where the adaptive security appliance is placed in the network,
some features may or may not work, such as IPS.
• The WSA receives web traffic redirected from the WCCP router and enforces
its policies on the traffic received from the AnyConnect client. If the WSA
grants access to the web request, it rewrites the traffic prior to forwarding it
to the Internet via its default route, the ASA. This will enable the ASA to
return the traffic back to the WSA for scanning and policy enforcement. You
must ensure that the WSA has a route to return successfully scanned traffic
back to the AnyConnect client. For example, you could add a static route to
the WSA to send all traffic destined for the client IP address pool
(10.10.10.0/8) back to the ASA.
Note Non-web traffic sent from the Internet back to the ASA will be dropped if the
source and destination of that traffic is in the AnyConnect client IP address pool
(10.10.10.0/8). To prevent this, you can configure a static route (route inside
10.10.10.0 255.0.0.0 192.168.1.2) on the ASA to enable it to forward the
traffic back to the AnyConnect client IP address pool.
All Secure Mobility components reside on a flat network, allowing the WCCP
router to use layer 2 redirection instead of Generic Routing Encapsulation (GRE).
GRE adds traffic overhead, works at layer 3, and is required when the WCCP
router and the WSA are on different subnets.
When the ASA acts as both the remote access and Internet gateway as shown in
Figure 1 on page 8, Network Address Translation (NAT) or Port Address
Translation (PAT) must be configured on the ASA to route non-web traffic or
traffic from the private IP address space to the Internet. In addition, to prevent
traffic sent from the enterprise network back to the AnyConnect client from being
subjected to the NAT or PAT command, you must configure a NAT Exemption rule
for the defined AnyConnect client IP address pool.
the ASA, or to a predefined static route if destined for the enterprise network. On
the WCCP router, you must still apply the command syntax ip wccp [port]
redirect in on the interface configured for redirection. This command enables
web traffic inbound to the interface to be redirected to the WSA. The WSA
decapsulates the GRE packet and enforces its security policies.
Like the architecture in Figure 1 on page 8, the WSA must be configured with the
appropriate route (route 10.10.10.0/8 x.x.x.x) back to the ASA in an effort to
return scanned traffic back to the AnyConnect client. The router in this case is
generally a router residing on the distribution or aggregation layer of the routing
infrastructure.
Note Browser proxy settings can either be defined manually by the end user or
dynamically by the ASA during VPN establishment. You can use the Adaptive
Security Device Manager (ASDM) to configure dynamic proxy configuration
settings under Configuration > Remote Access VPN > Network (Client) Access >
Group Policies > Group Name > Edit > Advanced > Browser Proxy in the
predefined internal Group Policy on the ASA.
Both web and non-web traffic is forwarded to the ASA over the VPN session.
However, web traffic is explicitly sent to the WSA as defined in the browser proxy
settings, and non-web traffic is routed based on the routing table of the ASA.
Note You can only dynamically deploy proxy configuration settings using the ASA to
Internet Explorer on Windows and Safari on Mac OS connected AnyConnect
clients. Other browsers must be manually configured on the client machine in
order to explicitly use the WSA as a proxy. Transparently redirecting web traffic
to the WSA creates a better user experience for end users; however, explicitly
configuring client browsers to use the WSA can be deployed in any network
architecture as long as the AnyConnect client can successfully route web traffic
from its VPN session to the WSA.
When users are remote and client applications are configured to explicitly use the
WSA for web traffic, consider the following information when configuring client
applications to use a proxy server:
• Proxy settings used before the VPN connection is established. When
Internet Explorer is configured to use a proxy, AnyConnect uses those proxy
settings to connect to the ASA. If these proxy settings point to the WSA
inside your enterprise LAN, AnyConnect will fail to connect to the ASA. To
prevent this, you must perform one of the following actions:
– Modify the browser proxy settings to add an exception for the ASAs.
– Using an AnyConnect profile, set the ProxySettings attribute to
IgnoreProxy. For more information, see Configuring the ProxySettings
Attribute, page 13.
• Proxy settings used after the VPN connection is established. To ensure that
the web traffic is sent to the WSA, you have the following options:
– Keep the current browser proxy settings (with the exception for ASAs as
recommended above).
– Use ASDM to dynamically set proxy settings in the browser.
Note AnyConnect profile settings, such as IgnoreProxy, only apply when the
AnyConnect client connects to the ASA. The client does not use these settings
after it establishes a tunnel with the ASA.
Note Version 8.3 of the ASA can only use WCCP to redirect web traffic when the traffic
enters the ASA on the same interface where WCCP is enabled. However, the
AnyConnect client traffic does not enter the ASA on the same interface where
WCCP is enabled (which is the same interface connected to the WSA). To work
around this, you must connect a router off the WCCP enabled interface to direct
all traffic to the router and then return it to the ASA on the WCCP enabled
interface. This allows the ASA to use WCCP to redirect web traffic to the WSA
for scanning. In Figure 4, Router A returns all traffic back to the ASA on the same
interface as the WSA, the inside interface.
Note When using this architecture with the Web Security appliance proxy bypass list
feature, only local users are able to successfully reach websites listed in the proxy
bypass list. When a remote user tries to access a website listed in the proxy bypass
list, the connection fails.
2. Create one or more Identity policies that applies to remote users. You can
choose whether or not authentication is required for the Identity:
3. In the Mobile User Security window in ASDM, add one or more Web Security
appliances that the adaptive security appliance communicates with. After you
choose Add or Edit, you can specify the Interface Name, IP address, and mask
of the host.
4. Enable the Mobile User Security feature on the adaptive security appliance.
This enables the adaptive security appliance to communicate with the Web
Security appliance using a secure HTTPS connection for passing user
credentials to the Web Security appliance for single sign-on functionality.
When enabled, you must enter the access password used by the Web Security
appliance when contacting the adaptive security appliance. You must also
enter a port number for the service to use. If no Web Security appliance is
present, the status is disabled.
5. Change Password. Enables you to configure and change the Web Security
appliance access password required for authentication between the adaptive
security appliance and Web Security appliance. This password must match
the corresponding password configured on the Web Security appliance.
6. (Optional) View session information of Web Security appliances connected
to the adaptive security appliance and the duration of the connection.
For more information on configuring the adaptive security appliance, read the
documentation. See Additional Documentation, page 22 for the location.
3. Load the AnyConnect Secure Mobility client package Release 2.5 or later
onto the adaptive security appliance.
4. Using ASDM, configure the adaptive security appliance to support Network
(Client) Access as usual.
5. In ASDM, consider configuring the VPN profile to be always on. You might
want to configure this feature for when the user is in an untrusted network.
When you configure the VPN profile to be always on, you must also enable
Trusted Network Detection (TND).
The always on feature lets AnyConnect automatically establish a VPN
session after the user logs onto a computer. The VPN session remains up until
the user logs off of the computer. If the physical connection is lost, the session
remains up, and AnyConnect continually attempts to reestablish the physical
connection with the adaptive security appliance to resume the VPN session.
TND gives you the ability to have AnyConnect automatically disconnect a
VPN connection when the user is inside the corporate network (the trusted
network) and start the VPN connection when the user is outside the corporate
network (the untrusted network).
6. When you configure always-on VPN, you can optionally choose to enable any
of the following options that affect the mobile user’s experience:
– Connect Failure Policy. When AnyConnect fails to initiate or maintain
a VPN session in accordance with the always on feature, the connect
failure policy determines whether the user can establish network
connectivity using a service or domain that is not configured as trusted.
You can configure the VPN profile to fail open or fail close.
– Allow Captive Portal Remediation. This is the process of satisfying the
requirements of a captive portal hot spot to obtain network access. When
a facility offering Internet access requires users to accept terms and
conditions before gaining access, users enter a captive portal
environment. By default, captive portals prevent AnyConnect from
connecting to the VPN. You might want to enable Allow Captive Portal
Remediation to give users a few minutes to satisfy the terms and
conditions to gain access, thus allowing AnyConnect to connect to the
VPN.
– Apply Last VPN Local Resource Rules. When the Connect Failure
Policy is set to fail closed, this feature allows users to print locally and
synchronize tethered devices. To allow that, you must also configure the
appropriate firewall rules.
Troubleshooting
Web Security appliance:
• AnyConnect Secure Mobility events are included in the User Discovery
Service (UDS) log.
• The Web Security appliance web interface has a button to test connectivity to
the configured adaptive security appliances.
• Use the musstatus CLI command to view adaptive security appliance to Web
Security appliance connections and statistics.
Adaptive security appliance:
• mus server enable <port> command can be verified using show config |
include mus
Additional Documentation
This document is intended to serve as an overview of the entire AnyConnect
Secure Mobility solution. It does not include detailed steps on configuring each
component of the product, nor does it list all potential interactions with other
features of each component. For detailed information on how to install, configure,
and upgrade each component in the solution, see the release notes and user guides
for each product.
Cisco adaptive security appliance (ASA) documentation home page:
http://www.cisco.com/en/US/products/ps6120/tsd_products_support_series
_home.html
Contacting Support
Because the Cisco AnyConnect Secure Mobility solution covers multiple Cisco
products, you might need to contact a different support group for help resolving
issues related to AnyConnect Secure Mobility. Each AnyConnect Secure Mobility
product is supported by a different product support team which is located in either
Cisco TAC (Technical Assistance Center) or Cisco IronPort Customer Support.
Both Cisco TAC and Cisco IronPort Customer Support have communication
measures in place to work with each other to resolve AnyConnect Secure Mobility
related issues. However, when you encounter an AnyConnect Secure Mobility
issue, apply your best judgment to identify where the problem might exist and
contact the appropriate support team when possible. This can help decrease the
time required to resolve the issue.
• For problems related to the adaptive security appliance or AnyConnect client,
open a case with Cisco TAC at the following location:
http://tools.cisco.com/ServiceRequestTool/create/launch.do
Use “Security - Adaptive Security Appliance (ASA) and PIX” for the
technology field and “WebVPN/SSLVPN - Anyconnect Client issue” for the
subtechnology field.
• For problems related to the Web Security appliance, open a case with Cisco
IronPort Customer support using the built in support request functionality on
the Web Security appliance. From the CLI, use the supportrequest
command. From the web interface, go to Support and Help > Open A Support
Case. Or, you can open a case from the web at the following location:
http://www.cisco.com/web/ironport/index.html.