• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1719
  • Last Modified:

Cisco ASA 5510 Anyconnect VPN fails every 36-48 hours

3 weeks ago the SSL Certificate on our Cisco ASA 5510 was replaced as it had expired.  I did not do the replacement, the system's admin did.  We have always used AnyConnect VPN with CSD enabled and there have never been any issues with that.  Since the replacement of the certificate, about every 36-48 hours the vpn will fail at the client with the message " Posture assessment failed: "Unable to get the available CSD version from the secure gateway" and will not allow any new vpn client connections but does maintain any of those that are currently logged in.  The solution is to do a reload on the primary asa host and this clears up the issue.  

I have already been through Cisco TAC about this and they cannot find anything out of the ordinary that could be causing this.  I have done my own research and the only thing close that I found was to add a line

crypto engine large-mod-accel

as the new certificate is of the 2048 encryption variety and the previous was 1024.  This is a bug according to Cisco release notes (we have 8.4(3) running.  I did add that line and restarted both ASA in the failover pair, but to no avail as last night at 10pm it happened again.  I am at my wits end and this certainly isn't boding well for my reputation at work, I just started this job 3 months ago.

Is there anyone here that can possibly assist me with this issue or anyone that has experienced this issue before?  Disabling CSD/HostScan is not an option either.

Thanks in advance.
0
Timothy Kashin
Asked:
Timothy Kashin
  • 2
1 Solution
 
asavenerCommented:
Well, first I'd start beating up on TAC, and ask for them to escalate the issue.  Don't let them off the phone until the problem is resolved.  Start at 8:00 AM and just work through the day.

Honestly, your employer shouldn't expect you to be more knowledgeable about a product than the actual vendor.

Another work around would be to try installing a different certificate with 1024-bit encryption.  

Another option would be to upgrade the OS version on the ASA.
0
 
Timothy KashinInfrastructure ManagerAuthor Commented:
Thanks for the reply.  The TAC seems to have no idea how to solve the problem.  The certificate change didn't make a difference, I already tried that route and we are at the highest version available for the ASA5510.  I'll keep working on it until we find that resolution or replace the device with a Palo Alto next year.
0
 
Timothy KashinInfrastructure ManagerAuthor Commented:
Apparently this is not a common issue, but it seems to be since it's happening on both of our production ASA devices.  I have even tried to completely reload the ASA back to before the original cert change to resolve this issue to no avail.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now