The debug in the beginning tells you the problem.  Look at the following
output.  I thought you were troubleshooting ASDM not WebVPN.  I am sorry I
didn't read the subject of this email.

 

SSL-VPNBOX(config)#
SSL-VPNBOX(config)# %ASA-6-302014: Teardown TCP connection 81 for
outside:1.1.1.2/1091 to identity:1.1.1.1/443 duration 0:01:58 bytes 0 TCP
Reset-I
%ASA-7-609002: Teardown local-host outside:1.1.1.2 duration 0:01:58
%ASA-7-609002: Teardown local-host identity:1.1.1.1 duration 0:01:58
%ASA-7-609001: Built local-host outside:1.1.1.2
%ASA-7-609001: Built local-host identity:1.1.1.1
%ASA-6-302013: Built inbound TCP connection 82 for outside:1.1.1.2/1093
(1.1.1.2/1093) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/1093 for
TLSv1session.
%ASA-7-725010: Device supports the following 1 cipher(s).
%ASA-7-725011: Cipher[1] : DES-CBC-SHA
%ASA-7-725008: SSL client outside:1.1.1.2/1093 proposes the following 8
cipher(s).
%ASA-7-725011: Cipher[1] : AES128-SHA
%ASA-7-725011: Cipher[2] : AES256-SHA
%ASA-7-725011: Cipher[3] : RC4-SHA
%ASA-7-725011: Cipher[4] : DES-CBC3-SHA
%ASA-7-725011: Cipher[5] : DHE-DSS-AES128-SHA
%ASA-7-725011: Cipher[6] : DHE-DSS-AES256-SHA
%ASA-7-725011: Cipher[7] : EDH-DSS-DES-CBC3-SHA
%ASA-7-725011: Cipher[8] : RC4-MD5
%ASA-7-725014: SSL lib error. Function: SSL3_GET_CLIENT_HELLO Reason: no
shared cipher
%ASA-6-302014: Teardown TCP connection 82 for outside:1.1.1.2/1093 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I




What does that mean?  What does the ASA support and what does the client
propose?

 

What do you need to do to fix the problem?  Why is it that the ASA only
supports such a weak cipher?  What can you do to get it to support the same
ciphers as the client?

 

some good things to start with would be checking your key size "show crypto
key mypubkey rsa".  What is the size of your key length.  Create a new key
size of 2048.

 

First make sure time is accurate between the host and the ASA before
performing the following steps

 

domain-name ipexpert.com

 

crypto key generate rsa label SECURE  modulus 2048

crypto ca trustpoint SELF-SIGNED

     enroll self

     fqdn SSL-VPNBOX.ipexpert.com

     subject-name CN=SSL-VPNBOX.ipexpert.com,O=IPexpert,OU=Security
Student,L=China,ST=MI,C=US

     keypair SECURE

crypto ca enroll SELF-SIGNED noconfirm

ssl trust-point SELF-SIGNED outside

write mem

 

Test Again

 

Regards,

 

Tyson Scott - CCIE #13513 R&S, Security, and SP
Managing Partner / Sr. Instructor - IPexpert, Inc.
Mailto:  <mailto:[email protected]> [email protected]
Telephone: +1.810.326.1444, ext. 208
Live Assistance, Please visit:  <http://www.ipexpert.com/chat>
www.ipexpert.com/chat
eFax: +1.810.454.0130

 

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
CCIE (R&S, Voice, Security & Service Provider) certification(s) with
training locations throughout the United States, Europe, South Asia and
Australia. Be sure to visit our online communities at
<http://www.ipexpert.com/communities> www.ipexpert.com/communities and our
public website at  <http://www.ipexpert.com/> www.ipexpert.com

 

From: kamran shakil [mailto:[email protected]] 
Sent: Monday, January 31, 2011 11:46 PM
To: Tyson Scott; Piotr Matusiak
Cc: [email protected]
Subject: Re: [OSL | CCIE_Security] [help plz] ASA SSL Clientless VPN - stuck
!!! NOT working ( page is not showing / loading up !!! )

 


Well, Tyson and Piotr, 

here is the error list  when i try to access https://1.1.1.1 

%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49334 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 90 for outside:1.1.1.2/49334 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 91 for outside:1.1.1.2/49335
(1.1.1.2/49335) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49335 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 91 for outside:1.1.1.2/49335 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 92 for outside:1.1.1.2/49336
(1.1.1.2/49336) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49336 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 92 for outside:1.1.1.2/49336 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 93 for outside:1.1.1.2/49337
(1.1.1.2/49337) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49337 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 93 for outside:1.1.1.2/49337 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 94 for outside:1.1.1.2/49338
(1.1.1.2/49338) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49338 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 94 for outside:1.1.1.2/49338 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 95 for outside:1.1.1.2/49339
(1.1.1.2/49339) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49339 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 95 for outside:1.1.1.2/49339 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 96 for outside:1.1.1.2/49340
(1.1.1.2/49340) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49340 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 96 for outside:1.1.1.2/49340 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 97 for outside:1.1.1.2/49341
(1.1.1.2/49341) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49341 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 97 for outside:1.1.1.2/49341 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 98 for outside:1.1.1.2/49342
(1.1.1.2/49342) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49342 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 98 for outside:1.1.1.2/49342 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I
%ASA-6-302013: Built inbound TCP connection 99 for outside:1.1.1.2/49343
(1.1.1.2/49343) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/49343 for
TLSv1 session.
%ASA-6-302014: Teardown TCP connection 99 for outside:1.1.1.2/49343 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I


and plus https://1.1.1.1:4043 do not respond as well, and i  believe 4043 is
for ASDM to launch and 443 is the web vpn launch , so i wanted to check
both.  it is confusing , since asdm is in flash and also anyconnect client
in flash and asa is fine as well. using version 8.2 , i pasted the full
config before.

regards,
Kamran.



On Mon, Jan 31, 2011 at 8:27 PM, Tyson Scott <[email protected]> wrote:

Your HTTP server is running on 4043.

 

Regards,

 

Tyson Scott - CCIE #13513 R&S, Security, and SP
Managing Partner / Sr. Instructor - IPexpert, Inc.
Mailto: [email protected]
Telephone: +1.810.326.1444, ext. 208
Live Assistance, Please visit: www.ipexpert.com/chat
eFax: +1.810.454.0130

 

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
CCIE (R&S, Voice, Security & Service Provider) certification(s) with
training locations throughout the United States, Europe, South Asia and
Australia. Be sure to visit our online communities at
www.ipexpert.com/communities and our public website at www.ipexpert.com
<http://www.ipexpert.com/> 

 

From: [email protected]
[mailto:[email protected]] On Behalf Of kamran
shakil
Sent: Sunday, January 30, 2011 11:35 PM


To: [email protected]

Subject: [OSL | CCIE_Security] [help plz] ASA SSL Clientless VPN - stuck !!!
NOT working ( page is not showing / loading up !!! )

 

Dears,
I have a simple setup of ASA with 1 inside and 1 outside interface and even
no nat-control is enabled. Following is what i am having :- 

The browser FIREFOX or IE do not open the page when i try to browse either
http://1.1.1.1 or  https://1.1.1.1  !!!!
[But when i try to telnet 1.1.1.1 443  it connects and gives me the clue
that 443 is not blocked on 1.1.1.1 IP Address ] 


MY ASA VERSION IS : 8.2(1) , and on WINDOWS 7 PC , used  IE version
8.0.7600.16385  +  FIREFOX version 3.6.13 


FOLLOWING IS THE CONFIG:
======================

hostname SSL-VPNBOX
enable password 2KFQnbNIdI.2KYOU encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface GigabitEthernet0/0
 nameif outside
 description *** NETWORK facing the OUTSIDE WORLD - directly coneccted to my
test pc 1.1.1.2/24***
 security-level 0
 ip address 1.1.1.1 255.255.255.0 
!
interface GigabitEthernet0/1
 nameif inside
 security-level 100
 ip address 2.2.2.2 255.255.255.0 
!
interface GigabitEthernet0/2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 shutdown
 no nameif
 no security-level
 no ip address
!
ftp mode passive
dns domain-lookup inside
dns server-group WEBVPN
 name-server 136.1.121.1
 domain-name cisco.com
same-security-traffic permit inter-interface
access-list SSL extended permit tcp any any log 
access-list SSL extended permit icmp any any log 
access-list SSL extended permit udp any any log 
access-list WEBACCESS webtype permit url http://*.com:80
pager lines 24
logging enable
mtu outside 1500
mtu inside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-621.bin
no asdm history enable
arp timeout 14400
no nat-control
access-group SSL in interface outside
aaa authentication http console LOCAL 
http server enable 4043
http 0.0.0.0 0.0.0.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
 enable outside
 svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1
 svc enable
 tunnel-group-list enable
group-policy WEBVPN internal
group-policy WEBVPN attributes
 vpn-tunnel-protocol webvpn
 webvpn
  filter value WEBACCESS
  url-entry enable
username WEBVPN password ioz3dgMc0MXqzvzX encrypted
username WEBVPN attributes
 group-lock value WEBVPN
username kamran password mk2g0NZxPq/cd0UW encrypted
username cisco password 3USUcOPFUiMCO4Jk encrypted
tunnel-group WEBVPN type remote-access
tunnel-group WEBVPN general-attributes
 default-group-policy WEBVPN
tunnel-group WEBVPN webvpn-attributes
 group-alias WEBVPN enable
 dns-group WEBVPN
!
class-map inspection_default
 match default-inspection-traffic
!
!

route outside 0 0 1.1.1.2


policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect netbios 
  inspect rsh 
  inspect rtsp 
  inspect skinny  
  inspect esmtp 
  inspect sqlnet 
  inspect sunrpc 
  inspect tftp 
  inspect sip  
  inspect xdmcp 
  inspect icmp 









DEBUG OUTPUT :
================

When i run the command # debug webvpn , i get the following ERRORS on ASA
Console :

SSL-VPNBOX(config)#
SSL-VPNBOX(config)# %ASA-6-302014: Teardown TCP connection 81 for
outside:1.1.1.2/1091 to identity:1.1.1.1/443 duration 0:01:58 bytes 0 TCP
Reset-I
%ASA-7-609002: Teardown local-host outside:1.1.1.2 duration 0:01:58
%ASA-7-609002: Teardown local-host identity:1.1.1.1 duration 0:01:58
%ASA-7-609001: Built local-host outside:1.1.1.2
%ASA-7-609001: Built local-host identity:1.1.1.1
%ASA-6-302013: Built inbound TCP connection 82 for outside:1.1.1.2/1093
(1.1.1.2/1093) to identity:1.1.1.1/443 (1.1.1.1/443)
%ASA-6-725001: Starting SSL handshake with client outside:1.1.1.2/1093 for
TLSv1session.
%ASA-7-725010: Device supports the following 1 cipher(s).
%ASA-7-725011: Cipher[1] : DES-CBC-SHA
%ASA-7-725008: SSL client outside:1.1.1.2/1093 proposes the following 8
cipher(s).
%ASA-7-725011: Cipher[1] : AES128-SHA
%ASA-7-725011: Cipher[2] : AES256-SHA
%ASA-7-725011: Cipher[3] : RC4-SHA
%ASA-7-725011: Cipher[4] : DES-CBC3-SHA
%ASA-7-725011: Cipher[5] : DHE-DSS-AES128-SHA
%ASA-7-725011: Cipher[6] : DHE-DSS-AES256-SHA
%ASA-7-725011: Cipher[7] : EDH-DSS-DES-CBC3-SHA
%ASA-7-725011: Cipher[8] : RC4-MD5
%ASA-7-725014: SSL lib error. Function: SSL3_GET_CLIENT_HELLO Reason: no
shared cipher
%ASA-6-302014: Teardown TCP connection 82 for outside:1.1.1.2/1093 to
identity:1.1.1.1/443 duration 0:00:00 bytes 7 TCP Reset-I



regards,
Kamran....

 

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to