Cisco 5505 Administration Guide - Page 65

svc rekey, method {new-tunnel | none | ssl, method new-tunnel, method none, method ssl - asa 10 user security appliance

Page 65 highlights

Chapter 6 Configuring AnyConnect Features Using CLI Configuring, Enabling, and Using Other AnyConnect Features [no] svc rekey {method {new-tunnel | none | ssl} | time minutes} method new-tunnel specifies that the client establishes a new tunnel during rekey. method none disables rekey. method ssl specifies that SSL renegotiation takes place during rekey. time minutes specifies the number of minutes from the start of the session or from the last rekey until the next rekey takes place, from 1 to 10080 (1 week). In the following example, the client is configured to renegotiate with SSL during rekey, which takes place 30 minutes after the session begins, for the existing group-policy sales: hostname(config)# group-policy sales attributes hostname(config-group-policy)# webvpn hostname(config-group-policy)# svc rekey method ssl hostname(config-group-policy)# svc rekey time 30 Note The security appliance does not currently support inline DTLS rekey. The AnyConnect client, therefore, treats all DTLS rekey events as though they were of the new tunnel method instead of the inline ssl type (CSC93610). Enabling and Adjusting Dead Peer Detection Dead Peer Detection (DPD) ensures that the security appliance (gateway) or the client can quickly detect a condition where the peer is not responding, and the connection has failed. Note When using the AnyConnect client with DTLS on security appliance, Dead Peer Detection must be enabled in the group policy on the ASA to allow the AnyConnect client to fall back to TLS, if necessary. Fallback to TLS occurs if the AnyConnect client cannot send data over the UPD/DTLS session, and the DPD mechanism is necessary for fallback to occur. To enable DPD on the security appliance or client for a specific group or user, and to set the frequency with which either the security appliance or client performs DPD, use the svc dpd-interval command from group-policy or username webvpn mode: svc dpd-interval {[gateway {seconds | none}] | [client {seconds | none}]} no svc dpd-interval {[gateway {seconds | none}] | [client {seconds | none}]} Where: gateway seconds enables DPD performed by the security appliance (gateway) and specifies the frequency, from 30 to 3600 seconds, with which the security appliance (gateway) performs DPD. gateway none disables DPD performed by the security appliance. client seconds enable DPD performed by the client, and specifies the frequency, from 30 to 3600 seconds, with which the client performs DPD. client none disables DPD performed by the client. To remove the svc dpd-interval command from the configuration, use the no form of the command: The following example sets the frequency of DPD performed by the security appliance to 30 seconds, and the frequency of DPD performed by the client set to 10 seconds for the existing group-policy sales: hostname(config)# group-policy sales attributes OL-12950-012 Cisco AnyConnect VPN Client Administrator Guide 6-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

6-7
Cisco AnyConnect VPN Client Administrator Guide
OL-12950-012
Chapter 6
Configuring AnyConnect Features Using CLI
Configuring, Enabling, and Using Other AnyConnect Features
[
no
]
svc rekey
{
method {new-tunnel | none | ssl
}
| time
minutes
}
method new-tunnel
specifies that the client establishes a new tunnel during rekey.
method none
disables rekey.
method ssl
specifies that SSL renegotiation takes place during rekey.
time
minutes
specifies the number of minutes from the start of the session or from the last rekey until
the next rekey takes place, from 1 to 10080 (1 week).
In the following example, the client is configured to renegotiate with SSL during rekey, which takes
place 30 minutes after the session begins, for the existing group-policy
sales
:
hostname(config)#
group-policy sales attributes
hostname(config-group-policy)#
webvpn
hostname(config-group-policy)#
svc rekey method ssl
hostname(config-group-policy)#
svc rekey time 30
Note
The security appliance does not currently support inline DTLS rekey. The AnyConnect client, therefore,
treats all DTLS rekey events as though they were of the new tunnel method instead of the inline ssl type
(CSC93610).
Enabling and Adjusting Dead Peer Detection
Dead Peer Detection (DPD) ensures that the security appliance (gateway) or the client can quickly detect
a condition where the peer is not responding, and the connection has failed.
Note
When using the AnyConnect client with DTLS on security appliance, Dead Peer Detection must be
enabled in the group policy on the ASA to allow the AnyConnect client to fall back to TLS, if necessary.
Fallback to TLS occurs if the AnyConnect client cannot send data over the UPD/DTLS session, and the
DPD mechanism is necessary for fallback to occur.
To enable DPD on the security appliance or client for a specific group or user, and to set the frequency
with which either the security appliance or client performs DPD, use the
svc dpd-interval
command
from group-policy or username webvpn mode:
svc dpd-interval
{[
gateway
{
seconds |
none
}]
|
[
client
{
seconds |
none
}]}
no svc dpd-interval
{[
gateway
{
seconds |
none
}]
|
[
client
{
seconds |
none
}]}
Where:
gateway
seconds enables DPD performed by the security appliance (gateway) and specifies the
frequency, from 30 to 3600 seconds, with which the security appliance (gateway) performs DPD.
gateway none
disables DPD performed by the security appliance.
client
seconds
enable DPD performed by the client, and specifies the frequency, from 30 to 3600
seconds, with which the client performs DPD.
client
none
disables DPD performed by the client.
To remove the
svc dpd-interval
command from the configuration, use the
no
form of the command:
The following example sets the frequency of DPD performed by the security appliance to 30 seconds,
and the frequency of DPD performed by the client set to 10 seconds for the existing group-policy
sales
:
hostname(config)#
group-policy sales attributes