- When using the IP instead of the hostname you will receive a message stating ‘AnyConnect cannot verify the VPN server: 32.97.185.16’. This occurs because the Server Certificate uses the hostname instead of the IP. Click the ‘Connect Anyway’ button to initiate the connection. Click ‘Connect’ to initiate the connection to the.
- As I explained the most common cause of this issue is that the ASA is using a self signed cert. The default behavior in AnyConnect (in recent versions) is to do strict server checking and to not connect if the server is using a self signed cert.
If you don’t have the necessary routes, you will need to modify the traffic settings on AnyConnect Settings page and reconnect to the AnyConnect server to update your routes. Take packet captures on the AnyConnect VPN interface. Packet captures can be taken on the AnyConnect VPN interface to verify if traffic is making it to the MX.
downloadWhy can't I download this file?'Cannot connect to the Citrix XenApp Server. The Network is down.' 'The connection to 'Desktop/App Name' failed with status (Unknown client error 1110)' ![Verify Verify](/uploads/1/1/9/3/119382447/553164644.png)
![Anyconnect cannot verify server linux Anyconnect cannot verify server linux](/uploads/1/1/9/3/119382447/923083123.JPG)
Solution
Important! This article is intended for use by System Administrators. If you are experiencing this issue and you are not a System Administrator, contact your organization’s Help Desk for assistance.
- Citrix Receiver/Citrix Workspace will not try to establish a DTLS connection unless both HDX Adaptive Transport and Allow Session Reliability is configured on CVAD and there is a Citrix Gateway. If DTLS feature is not enabled on Citrix Gateway frontend VPN vServer, and the Citrix Receiver does not have the EDT/TCP in parallel feature (RfWin 4.10, RfMac 12.8 and RfiOS 7.5 are the first Receivers to have it), then a 10sec DTLS time-out is expected on the connection time. After those 10sec, a TCP connection will be attempted. The connection time will not be impacted with the aforementioned Receivers since they are also attempting TCP in parallel, so even though DTLS took 10sec to time-out, TCP already succeeded and the ICA connection was established.
- If there is a security device, like a firewall, between your Receiver/Workspace and your Citrix Gateway who block UDP 443 (in a working scenario), app/desktop will launch without any problem, with TCP only (unless HDX Adaptive Transport policy is set to Diagnostic mode, which only allows EDT then).
- If the UDP connection succeeds between Receiver/Wokspace and Citrix Gateway, but then fails on the back-end between Gateway and VDA (firewall issues), then Receiver/Workspace will assume that the EDT connection was successful and will not fall back to TCP. This might cause a launch failure.
- Validate that EDT works well internally (without Citrix Gateway). It will help to confirm that HDX Adaptive Transport is correctly configured on XenDesktop and that the UDP ICA Listeners are active.
- Check if DTLS/EDT works well when the client machine is located just behind the ADC(same subnet/switch).
- If using a VPN (like Cisco AnyConnect or similar), be aware that the MTU will not be 1500 and that might cause an EDT failure. Calculate what is the additional overhead introduced by the VPN solution and then edit the ICA file with the new MTU values. See Article CTX231821 .
- In case you want to take a trace, be aware that :
- ADC is currently not able to manage SSLMASTERKEYS for DTLS traffic. You will need to get the Citrix Gateway private key to decrypt the DTLS traffic.
- You need to use the development edition of WireShark to be able to read DTLS traffic (or, at least, WireShark version 2.4). You can at least use the 'Decode As' feature in Wireshark to decode 'QUIC' as DTLS.
- Having said that, there should not be a need to decrypt DTLS traffic most of the time. A simple trace showing packets arriving/leaving the frontend and backend vServer is generally enough
1. Cannot connect to the Citrix XenApp Server. Protocol Driver Error: CTX284942
2. Cannot connect to the Citrix XenApp Server. The Network is down: CTX284943
3. The connection to 'Desktop/App Name' failed with status (Unknown client error 1110): CTX284944
How to check if DTLS connection is established: CTX284947
2. Cannot connect to the Citrix XenApp Server. The Network is down: CTX284943
3. The connection to 'Desktop/App Name' failed with status (Unknown client error 1110): CTX284944
How to check if DTLS connection is established: CTX284947
Additional Resources
How to Configure HDX Enlightened Data Transport Protocol : https://support.citrix.com/article/CTX220732
Configuring Citrix Gateway to Support Enlightened Data Transport : https://docs.citrix.com/en-us/citrix-gateway/current-release/hdx-enlightened-data-transport-support/configuring-citrix-gateway.html
How to Configure EDT when using VPN solutions: CTX231821
Configuring Citrix Gateway to Support Enlightened Data Transport : https://docs.citrix.com/en-us/citrix-gateway/current-release/hdx-enlightened-data-transport-support/configuring-citrix-gateway.html
How to Configure EDT when using VPN solutions: CTX231821
Introduction
This document describes how to configure Security Assertion Markup Language (SAML) with a focus on Adaptive Security Appliance (ASA) AnyConnect through Microsoft Azure MFA.
Prerequisites
Requirements
![Verify Verify](/uploads/1/1/9/3/119382447/553164644.png)
Cisco recommends that you have knowledge of these topics:
- Basic knowledge of RA VPN configuration on ASA.
- Basic knowledge of SAML and Microsoft Azure.
- AnyConnect Licenses enabled (APEX or VPN-Only).
Components Used
The information in this document is based on these software and hardware versions:
- A Microsoft Azure AD subscription.
- Cisco ASA 9.7+ and Anyconnect 4.6+
- Working AnyConnect VPN profile
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Background Information
SAML is an XML-based framework for exchanging authentication and authorization data between security domains. It creates a circle of trust between the user, a Service Provider (SP), and an Identity Provider (IdP) which allows the user to sign in a single time for multiple services. Microsoft Azure MFA seamlessly integrates with Cisco ASA VPN appliance to provide additional security for the Cisco AnyConnect VPN logins.
SAML Components
Metadata: It is an XML based document that ensures a secure transaction between an IdP and an SP. It allows the IdP and SP to negotiate agreements.
Roles supported by the devices (IdP, SP)
A device may support more than one role and could contain values for both an SP and an IdP. Under the EntityDescriptor field is an IDPSSODescriptor if the information contained is for a Single Sign-On IdP or a SPSSODescriptor if the information contained is for a Single Sign-On SP. This is important since the correct values must be taken from the appropriate sections in order to set up SAML successfully.
Entity ID: This field is a unique identifier for an SP or an IdP. A single device might have several services and can use different Entity IDs to differentiate them. For example, ASA has different Entity IDs for different tunnel-groups that need to be authenticated. An IdP authenticating each tunnel-group has a separate Entity ID entries for each tunnel-group in order to accurately identify those services.
ASA can support multiple IdPs and has a separate entity ID for each IdP to differentiate them. If either side receives a message from a device that does not contain an entity ID that has been previously configured, the device likely drops this message, and SAML authentication fails. The Entity ID can be found within the EntityDescriptor field beside entityID.
Service URLs: These define the URL to a SAML service provided by the SP or IdP. For IdPs, this is most commonly the Single Logout Service and Single Sign-On Service. For SPs, this is commonly the Assertion Consumer Service and the Single Logout Service.
The Single Sign-On Service URL found in the IdP metadata is used by the SP to redirect the user to the IdP for authentication. If this value is incorrectly configured, the IdP does not receive or is unable to successfully process the Authentication request sent by the SP.
The Assertion Consumer Service URL found in the SP metadata is used by the IdP to redirect the user back to the SP and provide information about the user's authentication attempt. If this is configured incorrectly, the SP does not receive the assertion (the response) or is unable to successfully process it.
The Single Logout Service URL can be found on both the SP and the IdP. It is used to facilitate logging out of all SSO services from the SP and is optional on the ASA. When the SLO service URL from the IdP metadata is configured on the SP, when the user logs out of the service on the SP, the SP sends the request to the IdP. Once the IdP has successfully logged the user out of the services, it redirects the user back to the SP using the SLO service URL found within the SP’s metadata.
SAML Bindings for Service URLs: Bindings are the method the SP uses to uses to transfer information to the IdP and vice versa for services. This includes HTTP Redirect, HTTP POST, and Artifact. Each method has a different way of transferring data. The binding method supported by the service is included within the definition of that services. For example: SingleSignOnService Binding='urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' Location='https://saml.example.com/simplesaml/saml2/idp/SSOService.php'/ >. The ASA does not support the Artifact binding. ASA always uses the HTTP Redirect method for SAML authentication requests, so it is important to choose the SSO Service URL that uses the HTTP Redirect binding so that the IdP expects this.
Certificates for Signature and Encryption Operations
To provide confidentiality and integrity for the messages sent between the SP and the IdP, SAML includes the ability to encrypt and sign the data. The certificate used to encrypt and/or sign the data can be included within the metadata so that the receiving end can verify the SAML message and ensure that it comes from the expected source. The certificates used for signing and encryption can be found within the metadata under KeyDescriptor use='signing' and KeyDescriptor use='encryption', respectfully, then X509Certificate. The ASA does not support encrypting SAML messages.
Network Diagram
Configure
Add Cisco AnyConnect from the Microsoft App Gallery
Step 1. Log in to Azure Portal and select Azure Active Directory.
Step 2. As shown in this image, select Enterprise Applications.
Step 3. Now select New Application, as shown in this image.
Step 4. In the Add from the gallery section, type AnyConnect in the search box, select Cisco AnyConnect from the results panel, and then add the app.
Step 5. Select the Single Sign-on menu item, as shown in this image.
Step 6. Select SAML, as shown in the image.
Step 7. Edit Section 1 with these details.
Step 8. In the SAML Signing Certificate section, select Download to download the certificate file and save it on your computer.
Step 9. Note this, it is required for ASA configuration.
- Azure AD Identifier - This is the saml idp in our VPN configuration.
- Login URL - This is the URL sign-in.
- Logout URL - This is the URL sign-out.
Assign Azure AD User to the App
In this section, Test1 is enabled to use Azure single sign-on, as you grant access to the Cisco AnyConnect app.
Step 1. In the app's overview page, select Users and groups and then Add user.
Step 2. Select Users and groups in the Add Assignment dialog.
Step 3. In the Add Assignment dialog, click the Assign button.
Configure ASA for SAML via CLI
Step 1. Create a Trustpoint and import our SAML cert.
Step 2. These commands provision your SAML IdP.
Step 3. Apply SAML Authentication to a VPN Tunnel Configuration.
Anyconnect Cannot Verify The Vpn Server
Note: If you make changes to the IdP config you need to remove the saml identity-provider config from your Tunnel Group and re-apply it for the changes to become effective.
Verify
Test AnyConnect with SAML Auth
Step 1. Connect to your VPN URL and input your login Azure AD details.
Step 2. Approve sign-in request.
Step 3. AnyConnect is Connected.
Common Issues
Entity ID Mismatch
Debug Example:
[SAML] consume_assertion: The identifier of a provider is unknown to #LassoServer. In order to register a provider in a #LassoServer object, you must use the methods lasso_server_add_provider() or lasso_server_add_provider_from_buffer().
Problem: Generally means that saml idp [entityID] command under the ASA's webvpn configuration does not match the IdP Entity ID found in the IdP’s metadata.
Solution: Check the entity ID of the IdP’s metadata file and change the saml idp [entity id] command to match this.
Time Mismatch
Debug Example:
[SAML] NotBefore:2017-09-05T23:59:01.896Z NotOnOrAfter:2017-09-06T00:59:01.896Z timeout: 0
[SAML] consume_assertion: assertion is expired or not valid
Problem 1. ASA time not synced with IdP’s time.
Solution 1. Configure ASA with the same NTP server used by IdP.
Problem 2. The assertion is not valid between the specified time.
Solution 2. Modify the timeout value configured on the ASA.
Wrong IdP Signing Certificate Used
Debug Example:
Cisco AnyConnect Mobility Client Authentication Failed ...
[Lasso] func=xmlSecOpenSSLEvpSignatureVerify:file=signatures.c:line=493:obj=rsa-sha1:subj=EVP_VerifyFinal:error=18:data do not match:signature do not match
[SAML] consume_assertion: The profile cannot verify a signature on the message
Problem: ASA not able to verify the message signed by the IdP or there is no signature for the ASA to verify.
Solution: Check the IdP signing certificate installed on the ASA to make sure it matches what is sent by the IdP. If this is confirmed, make sure that the signature is included in the SAML response.
Invalid Assertion Audience
Debug Example:
[SAML] consume_assertion: assertion audience is invalid
Problem: IdP is defining the incorrect audience.
Solution: Correct the Audience configuration on the IdP. It should match the ASA’s Entity ID.
Wrong URL for Assertion Consumer Service
Example Debug: Unable to receive any debugs after the initial authentication request is sent. The user is able to enter credentials at IdP but IdP does not redirect to ASA.
Problem: IdP is configured for the wrong Assertion Consumer Service URL.
Anyconnect Cannot Confirm
Solution(s): Check base URL in configuration and make sure it is correct. Check ASA metadata with show to make sure that the Assertion Consumer Service URL is correct. In order to test it, browse it, If both are correct on the ASA, check the IdP to make sure that the URL is correct.
Anyconnect Cannot Verify Server Ise
SAML Configuration Changes Not Taking Effect
Example: After a single sign-on URL is modified or changed, the SP certificate, SAML still does not work and sends previous configurations.
Problem: ASA needs to regenerate it's metadata when there is a configuration change that affects it. It does not do this automatically.
See Full List On Cisco.com
Solution: After making changes, under the affected tunnel-group remove and re-apply the saml idp [entity-id] command.
Troubleshoot
Most SAML troubleshoots involve a misconfiguration that can be found when the SAML configuration is checked or debugs are run. debug webvpn saml 255 can be used to troubleshoot most issues, however in scenarios where this debug does not provide useful information, additional debugs can be run: