AnyConnect SBL is to allow users to connect to the VPN before signing into their Laptop/Desktop. This is useful for companies that want all of their Laptops to use Active Directory to sign into the laptop but need a secure way to reach the AD Server.
AnyConnect SBL Requirements
- Must be using the AnyConnect client and the user must be using a Windows 7 or XP machine. This does not work with 8+ from what I have tested.
Instructions
- Create the default configuration for the AnyConnect VPN.
Note: If you plan on using a Self Signed Certificate the FQDN must be the IP of the firewall or the customer must setup a DNS entry for the FQDN.
- Upload the SBL.xml page to the firewall.
The key thing to change is the value between the <UseStartBeforeLogon> to true. If you are currently using a xml profile, you can also edit this line, or add, for this configuration to work. - Add the SBL.xml file to the webvpn settings.
ASA 8.x Code
webvpn
svc profiles SBL disk0:/SBL.xml
ASA 9.x Code
webvpn
anyconnect profiles SignOn disk0:/SBL.xml - Add this profile along with the vpngina module to that group-policy that you applied to your AnyConnect VPN tunnel-group.
ASA 8.x Code
group-policy <groupname> attributes
webvpn
svc modules value vpngina
svc profiles value SignOn
ASA 9.x Codegroup-policy <groupname> attributes
webvpn
anyconnect modules value vpngina
anyconnect profiles value SBL
- Connect to the VPN as a new session to make sure that your new profile gets pushed from the Firewall.
- If you used an Authorized Certificate – proceed to step 8, otherwise, follow step 9 for Self Signed Certificates
-
Self Signed Certificate steps
- Go to https://<Firewall IP>
- Click on the Lock icon in the URL. Click more information then click view certificate.
- Go to the details tab and click export. Save it as a X.509 certificate with chain (PEM) (*.crt,*.pem).
- Run Microsoft Management Console, by entering “mmc” in the run or search box (requires administrator permissions).
- In the MMC utility go to file and click on add/remove snap-in.
- You will want to add the certificates snap, and set it to computer then local computer.
- Open trusted root certificates and right click on certificates and click import.
- Locate the file you saved earlier, then import that file.
- Save the configuration. The name doesn’t matter.
- Reboot the machine. Once rebooted you can click on switch users and see the following icon:
- Use this button to login to the VPN before logging into the OS.
0 Comments