38-6
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 38 Configuring AnyConnect VPN Client Connections
Prompting Remote Users
Ensuring Reliable DTLS Connections Through Third-Party Firewalls
When a third-party network firewall is located between the client PC and the security appliance, it
inspects each DTLS packet and makes a decision whether to pass the packet along to the destination. If
there has been an idle period of DTLS traffic, the firewall might stop sending data to the client or security
appliance.
A customer has observed that the default behavior of a third party firewall in their network results in the
DTLS (UDP) traffic being dropped after an idle period of 40 seconds. This occurs when the DTLS
keepalive is not configured, or is configured with a value that is greater than the timeout interval of the
third party firewall.
By default, the DTLS keepalive is disabled.
When DTLS traffic is stopped by the firewall, applications such as Microsoft Outlook stop responding
while the DTLS tunnel remains active. The time of inactivity is directly related to the interval set for
client DTLS DPD. By default, DPD is set to an optimal value of 30 seconds which should work in most
cases.
If the client DTLS DPD is too high, failover does not occur quickly enough, and a user notices
applications being unresponsive. Once the client DTLS DPD is set correctly, the customer then notices
excessive loss and re-establishment of the DTLS channel. This might also be perceived as poor
performance of the tunnel.
To correct this problem, do the following steps:
Step 1
Enable the client DTLS DPD and configure it to be twice the interval of the firewall idle timer.
For example, set this value to 2 minutes when using the default setting with the third party firewall (40
seconds). The client DTLS DPD value should be no greater than 10 minutes to ensure TLS fallback
occurs in a timely manner. Use the
svc dpd-interval
command from group policy or username webvpn
mode:
hostname(config)#
group-policy sales attributes
hostname(config-group-policy)#
webvpn
hostname(config-group-webvpn)#
svc dpd-interval client 120
Step 2
Step 2 Enable the client DTLS keepalive and configure it to be at least 10 seconds less than the firewall
idle timer interval.
For example, set this value to 30 seconds if using the default configuration (40 seconds) of the third party
firewall. Use the
svc keepalive
command from group policy webvpn or username webvpn configuration
modes:
hostname(config)#
group-policy sales attributes
hostname(config-group-policy)#
webvpn
hostname(config-group-webvpn)#
svc keepalive 30
Prompting Remote Users
You can enable the security appliance to prompt remote SSL VPN client users to download the client
with the
svc ask
command from group policy webvpn or username webvpn configuration modes:
[
no
]
svc ask
{
none
|
enable
[
default
{
webvpn
|
svc
}
timeout
value
]}
svc ask enable
prompts the remote user to download the client or go to the WebVPN portal page and
waits indefinitely for user response.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......