Fatal error with webdeploy upgrade (CSCwi37384)—ASA or ISE webdeploy only on Windows 11 ARM64 results in a fatal error when
upgrading from Cisco Secure Client 5.1.0.x to 5.1.1.x. You will need to uninstall Secure Client 5.1.0.x for a fresh install
of 5.1.1.x as a workaround in order for webdeploy to work on Windows 11 ARM64 devices. Alternatively, you can upgrade from
Windows 11 ARM64 devices from Secure Client 5.1.0.x to 5.1.1.x using predeploy.
Web Deploy Upgrade on macOS Requires Admin Privileges (CSCwi69393)—Due to a new Apple API change, when using webdeploy to
upgrade from Cisco Secure Client 5.0.x (or earlier) to 5.1.x (or later), you must have administrator privileges or manage
the macOS devices via MDM to pre-approve the application extension.
Extended the Collection Parameter Module Name List to include browser plugin information (name and version) for Chrome, Firefox,
and MS Edge browser flows from Windows and macOS clients.
Known Issue:
CSCwi48979—The HTTP Host field for macOS is reported as empty instead of providing the proper destination host name for HTTP
traffic.
Zero Trust Access Module—Reduces the attack surface by hiding applications, and expands your level of knowing, understanding,
and controlling who and what is on your network. You must have the appropriate AnyConnect VPN version (5.1.0.136) to interoperate
with the Zero Trust Access Module (5.1.0.4464). The Zero Trust Access module currently only supports the Cisco Secure Access
service. Refer to
Secure Access documentation
for additional details.
Duo Desktop will be packaged and installed automatically in the Zero Trust Access module installer (for Windows and macOS),
even though it is a standalone application that is separate from Cisco Secure Client. However, on macOS, Duo Desktop requires
additional setup requirements for certificate deployment. Refer to
Getting Zero Trust Access Up and Running on Desktop
for additional details.
DART was enhanced to collect Duo Desktop logs. On Windows, DART can only collect Duo Desktop logs if the Duo troubleshooting
script is allowed to execute. Duo uses a PowerShell script to collect logs.
Current Limitations or Restrictions
ASDM does not show Zero Trust Access as a module in the group-policy (Configuration > Remote Access VPN > Network (Client)
Access > Secure Client Connection Profiles Edit Group-Policy, Advanced-Secure Client-Optional Modules to Download) drop-down
menu. A defect has been assigned to the ASDM team to address.
Network Access Manager added support for WPA3 802.11 CCMP128 encryption and Protected Management Frames (PMF). However, WPA3
will not work until Microsoft releases a fix that relates to Integrity Group Temporal Key generation. The fix is not available
in a production environment, but we anticipate the fix in an upcoming Windows 11 release and Windows 10 22H2 update. While
PMF can be used in WPA2, it is required for WPA3 Enterprise. If you have a WPA2 network with PMF required or optional, your
connection to Secure Client 5.1.0.136 will fail until the Microsoft fix.
The Secure Firewall Posture (formerly HostScan) 5.1.4.74 release includes updates to the OPSWAT engine versions for Windows,
macOS, and Linux and resolves the defects described in
Secure Firewall Posture (Formerly HostScan) 5.1.4.74
.
The Secure Firewall Posture (formerly HostScan) 5.1.3.62 release includes updates to the OPSWAT engine versions for Windows,
macOS, and Linux and resolves the defects described in
Secure Firewall Posture (Formerly HostScan) 5.1.3.62
.
The Secure Firewall Posture, formerly HostScan, 5.1.2.42 release includes updates to the OPSWAT engine versions for Windows,
macOS, and Linux.
The Secure Firewall Posture (formerly HostScan) 5.1.1.42 release includes updates to the OPSWAT engine versions for Windows,
macOS, and Linux and resolves the defect listed in
Secure Firewall Posture (Formerly HostScan) 5.1.1.42
.
The Secure Firewall Posture (formerly HostScan) 5.1.0.136 release includes updates to the OPSWAT engine versions for Windows,
macOS, and Linux and resolves the defect listed in
Secure Firewall Posture (Formerly HostScan) 5.1.0.136
.
This section identifies the management and endpoint requirements for this
release. For endpoint OS support and license requirements for each feature, see
Cisco
Secure Client
Features, Licenses, and OSs
.
Cisco cannot guarantee compatibility with other VPN third-party
clients.
You must install Java, version 8 or higher, before launching the profile editor.
Cisco
Secure Client
Profile Editor supports OpenJDK and also Oracle Java. For certain OpenJDK builds, Profile Editor may fail to launch when
the JRE path cannot be determined. Navigate to the installed JRE path where you will be prompted to properly launch the Profile
Editor.
Warning!
Incompatibility Warning: If you are an Identity Services Engine (ISE)
customer running 2.0 (or later), you must read this before
proceeding!
The ISE RADIUS has supported TLS 1.2 since
release 2.0; however, there is a defect in the ISE implementation of
EAP-FAST using TLS 1.2, tracked by CSCvm03681. The defect has been fixed
in the 2.4p5 release of ISE. The fix will be made available in future
hot patches for supported releases of ISE.
If Network Access
Manager 4.7 (and later) is used to authenticate using EAP-FAST with
any ISE releases that support TLS 1.2 prior to the above releases,
the authentication will fail, and the endpoint will not have access
to the network.
ISE 2.6 (and later) with
Cisco
Secure Client
4.7MR1 (and later) supports IPv6 non-redirection flows (using stage 2
discovery) on wired and VPN flows.
Cisco
Secure Client
temporal agent flows are working on IPv6 networks based on network
topology. ISE supports multiple ways of IPv6 configuration on a network
interface (for example, eth0/eth1).
IPv6 networks with regards to ISE posture flows have the following
limitations: [IPv6] ISE posture discovery is in infinite loop due to
specific type of network adapters (for example, Microsoft Teredo virtual
adapter) (CSCvo36890).
ISE 2.0 is the minimum release capable of deploying
Cisco
Secure Client
software to an endpoint and posturing that endpoint using the new ISE
Posture module in
Cisco
Secure Client
4.0 and later.
ISE 2.0 can only deploy
Cisco
Secure Client
release 4.0 and later. Older releases of
Cisco
Secure Client
must be web deployed from an ASA, predeployed with an SMS, or manually deployed.
If you are installing or updating the
Cisco
Secure Client
ISE Posture module, the package and modules configured on ASA must be the same as the ones configured on ISE. VPN is always
upgraded when other modules are upgraded, and a VPN module upgrade is not allowed from ISE when the tunnel is active.
To deploy
Cisco
Secure Client
from an ISE headend and use the ISE Posture module, a Cisco ISE Premier License
is required on the ISE Administration node. For detailed ISE license information,
see the
Cisco ISE Licenses
chapter of the
Cisco Identity Services Engine Admin Guide
.
You must upgrade to Secure Firewall ASA 9.17.x (or later) and ASDM 7.17.x (or later) to use
Cisco
Secure Client
VPN SAML External Browser. With that version and
Cisco
Secure Client
version 5, you can configure VPN SAML external browser to enable additional authentication choices, such as passwordless
authentication, WebAuthN, FIDO2, SSO, U2F, and an improved SAML experience due to the persistence of cookies. When you use
SAML as the primary authentication method for a remote access VPN connection profile, you can elect to have the Secure Client
use the client's local browser instead of the Secure Client embedded browser to perform the web authentication. This option
enables single sign-on (SSO) between your VPN authentication and other corporate logins. Also choose this option if you want
to support web authentication methods, such as biometric authentication and Yubikeys, which cannot be performed in the embedded
browser.
You must upgrade to Secure Firewall ASA 9.10.1 (or later) and ASDM 7.10.1 (or later) to use DTLSv1.2.
DTLSv1.2 is supported on all Secure Firewall ASA models except the 5506-X, 5508-X, and 5516-X and applies when the ASA is
acting as a server only, not a client. DTLS 1.2 supports additional ciphers, as well as all current TLS/DTLS ciphers and a
larger cookie size.
Deploy firewall rules. If you deploy always-on VPN, you might
want to enable split tunneling and configure firewall rules to restrict network
access to local printing and tethered mobile devices.
Configure dynamic access policies to display a message on the
Cisco
Secure Client
GUI when an
Cisco
Secure Client
session is in quarantine.
The minimum flash memory recommended for all Secure Firewall ASA models using
Cisco
Secure Client
is 512MB. This will allow hosting of multiple endpoint operating systems, and logging and debugging to be enabled on the
Due to flash size limitations on the Secure Firewall ASA (maximum of 128 MB), not all permutations of the
Cisco
Secure Client
package will be able to be loaded onto this model. To successfully load
Cisco
Secure Client
, you will need to reduce the size of your packages (such as fewer OSs, no
Secure Firewall Posture
, and so on) until they fit on the available flash.
asa3# show memory
Free memory: 304701712 bytes (57%)
Used memory: 232169200 bytes (43%)
------------- ----------------
Total memory: 536870912 bytes (100%)
If your Secure Firewall ASA has only the default internal flash memory size or the default DRAM size (for cache memory), you
could have problems storing and loading multiple
Cisco
Secure Client
packages on the ASA. Even if you have enough space on the flash to hold the package files, the Secure Firewall ASA could
run out of cache memory when it unzips and loads the client images. For additional information about the ASA memory requirements
and upgrading ASA memory, see the
latest release notes for the Cisco ASA
.
Cisco Secure Client 5.0.x will not establish a VPN connection when used with an incompatible version of HostScan; therefore,
using HostScan 4.x with Cisco Secure Client 5.0.x endpoints is not supported.
If you are currently using
HostScan 4.3.x or earlier
, a one-time HostScan migration
must
be performed prior to upgrading to any newer version of HostScan. Refer to the
AnyConnect HostScan Migration 4.3.x to 4.6.x and Later
documentation for the specifics of how to do this migration.
Also, Cisco does not recommend the combined use of
Secure Firewall Posture
and ISE posture. Unexpected results occur when the two different posture agents are run.
The Secure Firewall Posture Module, formerly HostScan provides
Cisco
Secure Client
the ability to identify the operating system, antimalware, and firewall software installed on the host to the Secure Firewall
When using Start Before Login (SBL) and
Secure Firewall Posture
, you must install the
Cisco
Secure Client
predeploy module on the endpoints to achieve full
Secure Firewall Posture
functionality, since SBL is pre-login.
Secure Firewall Posture, available as its own software package, is periodically updated with new operating system, antimalware,
and firewall software information. We recommend that you run the most recent version of Secure Firewall Posture (which is
the same as the version of Cisco Secure Client).
The
Secure Firewall Posture
Antimalware and Firewall Support Charts
are available on cisco.com.
(CSCwa91572) For compatibility and ease of deployment, you must use the following Compliance Modules with Cisco Secure Client
version 5.0.01242 and later: Windows version 4.3.2755, macOS version 4.3.2379, and Linux version 4.3.2063. Also, already released
Compliance Modules are not supported for Cisco Secure Client version 5.0.01242 (and later) builds.
(CSCvy53730-Windows only) As of AnyConnect 4.9.06037, the Compliance Modules from ISE cannot be updated. Due to this change,
Compliance Module version 4.3.1634.6145 or later are required for AnyConnect 4.9.06037 (and above) and Cisco Secure Client
5 (up to 5.0.01242).
The ISE Posture compliance module contains the list of supported antimalware and firewall for ISE posture. While the
Secure Firewall Posture
list is organized by vendor, the ISE posture list organizes by product type. When the version number on the headend (ISE
or Secure Firewall ASA) is greater than the version on the endpoint, the OPSWAT gets updated. These upgrades are mandatory
and happen automatically without end user intervention.
The individual files within the library (a zip file) are digitally signed by OPSWAT, Inc., and the library itself is packaged
as a single, self-extracting executable which is code signed by a Cisco certificate. Refer to the
ISE compliance modules
for details.
Cisco supports AnyConnect VPN access to IOS Release 15.1(2)T functioning
as the secure gateway; however, IOS Release 15.1(2)T does not currently support the
following
Cisco
Secure Client
features:
For additional limitations of IOS support for AnyConnect VPN,
please see
Features Not Supported on the
Cisco IOS SSL VPN
.
Refer to
http://www.cisco.com/go/fn
for additional IOS feature support information.
The following tables list the minimum versions supported. When specific versions are noted, as opposed to something such as
8.x
, it is because only particular versions are supported. For example, ISE Posture is not supported on Red Hat 8.0, but it is
supported on Red Hat 8.1 and later, and noted as such.
Before AnyConnect release 4.10.03104, Windows ADVERTISE installer action was not supported (CSCvw79615). With release 4.10.03104
and later, we provided a fix to successfully upgrade with Windows ADVERTISE for those with a lower version of AnyConnect.
Consider however that future upgrades could still fail if AnyConnect version 4.10.02086 or earlier (as opposed to 4.10.03104
or later) is advertised.
Cisco
Secure Client
is not supported on Windows RT. There are no APIs provided in the
operating system to implement this functionality. Cisco has an open request
with Microsoft on this topic. Those who want this functionality should
contact Microsoft to express their interest.
Other third-party product’s incompatibility with Windows 8 prevent
Cisco
Secure Client
from establishing a VPN connection over wireless networks. Here are two
examples of this problem:
WinPcap service “Remote Packet Capture Protocol v.0
(experimental)” distributed with Wireshark
does not support Windows
To work around this problem, uninstall Wireshark or disable the
WinPcap service, reboot your Windows 8 computer, and attempt the
Cisco
Secure Client
connection again.
Outdated wireless cards or wireless card drivers that do not support
Windows 8 prevent
Cisco
Secure Client
from establishing a VPN connection.
To work around this problem, make sure you have the latest
wireless network cards or drivers that support Windows 8 installed on your
Windows 8 computer.
Cisco
Secure Client
is not integrated with the new UI framework, known as the Metro design
language, that is deployed on Windows 8; however,
Cisco
Secure Client
does run on Windows 8 in desktop mode.
If you are
using Network Access Manager on a system that supports standby, Cisco
recommends that the default Windows 8.x association timer value (5 seconds) is
used. If you find the Scanlist in Windows appears shorter than expected,
increase the association timer so that the driver can complete a network scan
and populate the scanlist.
Verify that the driver on the client system is supported by your
Windows version. Drivers that are not supported may have intermittent
connection problems.
For Network Access Manager, machine authentication using machine
password will not work on Windows 8 or 10 / Server 2012 unless a registry
fix described in Microsoft KB 2743127 is applied to the client desktop. This
fix includes adding a DWORD value LsaAllowReturningUnencryptedSecrets to the
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa registry key and
setting this value to 1.
Machine authentication using machine certificate (rather than machine password) does not
require a change and is the more secure option. Because machine password was
accessible in an unencrypted format, Microsoft changed the OS so that a
special key was required. Network Access Manager cannot know the password
established between the operating system and active directory server and can
only obtain it by setting the key above. This change permits Local Security
Authority (LSA) to provide clients like Cisco Network Access Manager with
the machine password.
Machine authentication allows a client desktop to be authenticated to the network before the
user logs in. During this time the administrator can perform scheduled
administrative tasks for this client machine. Machine authentication is
also required for the EAP Chaining feature where a RADIUS server can
authenticate both the User and Machine for a particular client. This
will result in identifying company assets and applying appropriate
access policies. For example, if this is a personal asset
(PC/laptop/tablet), and corporate credentials are used, the endpoint
will fail Machine authentication, but succeed User authentication, and
the proper network access restrictions are applied to the user's network
connection.
On Windows 8, the Export Stats button on the Preferences >
VPN > Statistics tab saves the file on the desktop. In other versions of
Windows, the user is asked where to save the file.
Because of the introduction of access control in macOS 10.15, you may see additional popups when Secure Firewall Posture (formerly
HostScan) or ISE posture are performing a scan on the endpoint. You are required to accept which files and folders can be
accessed and scanned.
For the latest end-user license agreement, see
Cisco End User License Agreement,
Cisco Secure Client
.
For our open source licensing acknowledgments, see
Open Source Software Used in
Cisco Secure Client
.
To deploy
Cisco
Secure Client
from an ISE headend and use the ISE Posture module, a Cisco ISE Premier License is required on the ISE Administration node.
For detailed ISE license information, see the
Cisco ISE Licenses
chapter of the
Cisco Identity Services Engine
.
To deploy
Cisco
Secure Client
from a Secure Firewall ASA headend and use the VPN and
Secure Firewall Posture
modules, an Advantage or Premier license is required. Trial licenses are available. See the
Cisco
Secure Client
Ordering Guide
.
For an overview of the Advantage and Premier licenses and a description of which license the features use, see
Cisco Secure Client
Features, Licenses, and OSs
.
Deploying
Cisco
Secure Client
refers to installing, configuring, and upgrading the
Cisco
Secure Client
and its related files. The
Cisco
Secure Client
can be deployed to remote users by the following methods:
Predeploy—New installations and upgrades are done either by the end user, or by using an enterprise software management system
(SMS).
Web Deploy—The
Cisco
Secure Client
package is loaded on the headend, which is either a Secure Firewall ASA or ISE server. When the user connects to a Secure
Firewall ASA or to ISE,
Cisco
Secure Client
is deployed to the client.
For new installations, the user connects to a headend to download
Cisco
Secure Client
. The client is either installed manually, or automatically
(web-launch).
SecureX Cloud Management—You can click the
Network Installer
button on the
Deployment Management pages of the SecureX UI. It results in the downloading of
the installer executable. The Secure Client options that you want to enable
(such as Start Before Login, Diagnostics and Reporting Tool, Secure Firewall
Posture, Network Visibility Module, Secure Umbrella, ISE Posture, and Network
Access Manager) can also be selected.
When you deploy
Cisco
Secure Client
, you can include the optional modules that enable extra features, and client profiles
that configure the VPN and other features. Keep in mind the following:
All
Cisco
Secure Client
modules and profiles can be predeployed. When predeploying, you must pay
special attention to the module installation sequence and other details.
Make sure to update the localization MST files with the latest release
from CCO whenever you upgrade to a new
Cisco
Secure Client
package.
This issue applies to Internet Explorer versions 10 and 11, on Windows 8.
When the Windows registry entry
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\TabProcGrowth is set to
0, Active X has problems during
Cisco
Secure Client
web deployment.
http://support.microsoft.com/kb/2716529
for more
information.
The solution to is to:
On Windows 8, starting Internet Explorer from the Windows start
screen runs the 64-bit version. Starting from the desktop runs the 32-bit
version.
Cisco only provides fixes and enhancements for 5.x based on the most recent
Version 5
release. TAC support is available to any customer with an active
Cisco
Secure Client
Version 5
term/contract running a released version of
Cisco
Secure Client
Version 5
. If you experience a problem with an out-of-date software version, you may be asked to validate whether the current maintenance
release resolves your issue.
Software Center access is limited to
Cisco
Secure Client
Version 5
versions with current fixes. We recommend that you download all images for your
deployment, as we cannot guarantee that the version you are looking to deploy will
still be available for download at a future date.
Network Access Manager can use Single Sign On (SSO) credentials for network authentication when a user logs on with a username
and password, or a certificate PIN. Microsoft introduced Windows Hello for Business (WHfB) as an additional way to log on,
but WHfB SSO credentials cannot be used by Network Access Manager and are not currently supported. Because WHfB SSO credentials
are not supported, you will be prompted for 802.1x authentication credentials after WHfB log on.
Due to a new OS requirement, one-time administrator privileges are necessary when performing a web deploy upgrade from 5.0.x
(or earlier) to 5.1.x (or later). Further updates do not need them. You can circumvent this limitation by managing macOS devices
via MDM and pre-approving the application.
With the deprecation of IE11, Secure Client embedded browser defaults to WebView2, as long as the runtime is installed. If
you need to revert back to the legacy embedded browser control, add a DWORD registry value
UseLegacyEmbeddedBrowser
set to 1 to the following Windows registry key:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Cisco\Cisco Secure Client
Encrypted Domain Name System (DNS) resolution impacts Secure Client functionality, namely that network flows targeting FQDNs
resolved via encrypted DNS either circumvent or are not properly handled by the following Secure Client features: Umbrella
DNS protection, Umbrella web protection (when name-based redirect rules are used), AnyConnect VPN (split DNS, dynamic split
tunneling and Always On with name-based exceptions), Network Visibility (reporting of peer FQDN) and Zero Trust Access (when
name-based rules are applied). To mitigate this impact, you should disable encrypted DNS in browser settings pertaining to
Secure Client users.
As an additional mitigation,
Cisco Secure Client
prohibits DNS over HTTPS (DoH) name resolution for the Windows DNS client via local policy setting
Configure DNS over HTTP (DoH) name resolution
(under Computer Configuration > Administrative Templates > Network > DNS Client). This change is applicable to Windows 11
and later versions and is enforced while any of the following modules is active: VPN, Umbrella Roaming Security, Network Visibility,
or Zero Trust Access.
Cisco Secure Client
does not alter this policy setting if a conflicting setting of higher precedence (for example, domain GPO setting) is detected.
CSCwd81735—When Secure Firewall ASA has Secure Firewall Posture (formerly HostScan) enabled and running the same 5.0 version
as Secure Client, a failure could result. However, the Secure Client UI shows no status message or error. The client may still
be functioning normally and responds to clicking Connect, but the status message gives no indication.
For the Network Visibility Module in ARM64 platforms, Module Name and Module Hash are not reported in flows that are generated
for SVCHost processes.
If the Network Access Manager is configured for machine or user authentication while a Windows Remote Desktop Protocol attempt
is made from a remote device, the connection may fail. The cause of the failure is an interface change in how Microsoft firewall
establishes quarantines for the network. Until we can coordinate a resolution with Microsoft, you can try the workaround documented
in CSCvo47467.
Those running
Cisco
Secure Client
on macOS 12.x may experience a loss of DNS (name resolution), requiring a reboot for restoration. The cause has been identified
as a macOS bug, which has been addressed in macOS 12.3 (FB9803355).
Global DNS settings Searchlist and UseDomainNameDevolution are used by
Cisco
Secure Client
to build the DNS suffix search list for a VPN connection. Any overrides
configured via local group policy will be ignored.
When a root certificate authority (CA) is public trusted, it is already in the File
Certificate Store. However, if the Firefox NSS store is left enabled at the same
time, the OCSP check might be bypassed, as we only support OCSP check with File Cert
Store. To prevent this bypass, disable Firefox NSS store by setting
ExcludeFirefoxNSSCertStore to
true
in the local policy file.
When using Trusted Network Detection, the automatic VPN connection may not be
initiated according to the TND policy, if the system route table does not contain a
default route.
If you are using web deploy to upgrade to AnyConnect or HostScan 4.10 from a version prior to 4.9.01095, an error could result.
Since AnyConnect versions prior to 4.9.01095 did not have the capacity to parse the system CA store, the result is an upgrade
failure, because the correct NSS certificate store path could not be determined in the user's profile directory. If you are
upgrading to AnyConnect 4.10 from a release prior to 4.9.01095, copy the root certificate (DigiCertAssuredIDRootCA.pem) to
/opt/.cisco/certificates/ca prior to upgrading AnyConnect on the endpoint.
If you are using Ubuntu 20.04 (which has kernel version 5.4), you must use AnyConnect 4.8 (or later), or Network Visibility
Module installation fails.
Local and/or network proxies (such as software/security applications like Fiddler,
Charles Proxy, or Third-party Antimalware/Security software that includes Web
HTTP/HTTPS inspection and/or decryption capabilities) are not compatible with
Cisco
Secure Client
.
The Ubuntu NetworkManager Connectivity Checking functionality allows
periodic testing, whether the internet can be accessed or not. Because
Connectivity Checking has its own prompt, you can receive a network
logon window if a network without internet connectivity is detected. To
avoid such network prompts, that aren’t tied to a browser window and
don't have download capability, you should disable Connectivity Checking
in Ubuntu 17 and beyond. By disabling, the user will be able to download
a file from the ISE portal using a browser for ISE-based
Cisco
Secure Client
web deployment.
Before doing a web deploy onto a Linux endpoint, you must disable access control with the xhost+ command. Xhost controls the
access of a remote host running a terminal on the endpoint, which is restricted by default. Without disabling access control,
Cisco
Secure Client
web deployment fails.
With the fix of CSCvu65566 and its device ID computation change, certain deployments of Linux (particularly those that use
LVM) experience a one-time connection attempt error immediately after updating from a headend to 4.9.01xxx or later. Linux
users running AnyConnect 4.8 (and later) and connecting to a headend to perform an auto update (web-deploy) may receive this
error: "The secure gateway has rejected the connection attempt. A new connection attempt to the same or another secure gateway
is needed, which requires re-authentication." To successfully connect, you can manually initiate another VPN connection after
Cisco
Secure Client
upgrade. After an initial upgrade to 4.9.01xxx or later, you will no longer hit this issue.
The Network Access Manager made a revision to write wireless LAN profiles to disk
rather than just using temporary profiles in memory. Microsoft requested this change
to address an OS bug, but it resulted in a crash of the Wireless LAN Data Usage
window and eventual intermittent wireless connectivity issues. To prevent these
issues, we reverted the Network Access Manager to using the original temporary WLAN
profiles in memory. The Network Access Manager removes most of the wireless LAN
profiles on disk when upgrading to version 4.8MR2 or later. Some hard profiles
cannot be removed by the OS WLAN service when directed, but any remaining interfere
with the ability for the Network Access Manager to connect to wireless networks.
Follow these steps if you experience problems connecting to a wireless network after
an upgrade from 4.7MR4 to 4.8MR2:
This removes leftover profiles from previous versions (
Secure Client
4.7MR4 to 4.8MR2). Alternatively, you can look for profiles with
AC
appended to the name and delete them from the native supplicant.
macOS 11 fixed an issue seen in AnyConnect version 4.8.03036 (and later) related to the nslookup command, namely nslookup
not sending DNS queries through the VPN tunnel with split-include tunneling configuration. The issue initiated in AnyConnect
4.8.03036 when that version included a fix for defect CSCvo18938. The Apple-suggested changes for that defect ended up revealing
another OS issue, causing the nslookup problematic behavior.
As a workaround for macOS 10.x, you can pass the VPN DNS server as a parameter to
nslookup:
nslookup [name] [ip_dnsServer_vpn]
.
(CSCvu71024)
Cisco
Secure Client
authentication may fail if the Secure Firewall ASA headend or SAML provider uses
certificates signed by the AddTrust root (or one of the intermediaries), because
they expired in May 2020. The expired certificate causes
Cisco
Secure Client
to fail and presents as a server certificate validation error, until operating
systems make the required updates to accommodate the May 2020 expiration.
Windows DNS Client optimizations present in Windows 8 and above may result in failure
to resolve certain domain names when split DNS is enabled. The workaround is to
disable such optimizations by updating the following registry keys:
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters
Value:DisableParallelAandAAAA
Data: 1
Key: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\DNSClient
Value: DisableSmartNameResolution
Data: 1
The macOS 10.15 operating system does not support 32-bit binaries. Additionally, Apple verifies that all software installed
on 10.15 has been cryptographically notarized via digital signature. From AnyConnect 4.8 and later, operation on macOS 10.15
is supported with no 32-bit code.
Make note of these limitations:
HostScan packages earlier than 4.8.x will not function with macOS Catalina (10.15). End users who attempt to connect from
macOS Catalina to Secure Firewall ASA headends running HostScan packages earlier than 4.8.x will not be able to successfully
complete VPN connections, receiving a posture assessment failed message.
AnyConnect 4.10.x clients on macOS Big Sur (11.x) must use HostScan 4.9.04045 or later.
To enable successful VPN connections for
Secure Firewall Posture
users, all DAP and
Secure Firewall Posture
policies must be HostScan 4.8.00175 (or later) compatible. Refer to
AnyConnect HostScan Migration 4.3.x to 4.6.x and Later
for additional information related to policy migration from HostScan 4.3.x to 4.8.x.
As a workaround to restore VPN connectivity, administrators of systems with
Secure Firewall Posture
packages on their Secure Firewall ASA headends may disable
Secure Firewall Posture
. If disabled, all
Secure Firewall Posture
posture functionality, and DAP policies that depend on endpoint information, will be unavailable.
The associated field notice can be found here:
https://www.cisco.com/c/en/us/support/docs/field-notices/704/fn70445.html
.
macOS 10.15 (and later) requires that applications obtain user permissions for access
to Desktop, Documents, Downloads, and Network Volume
folders. To grant this access, you may see popups
during an initial launch of
Secure Firewall Posture
,
ISE
Posture
(when ISE posture is enabled on the network), or
DART (when ISE posture or
Cisco
Secure Client
is installed). ISE posture and
Secure Firewall Posture
use OPSWAT for posture assessment on endpoints,
and the posture checks access these folders based on
the product and policies configured.
At these popups, you must click
OK
to have access to these folders and to continue with the posture flow. If you click
Don't Allow
, the endpoint may not remain compliant, and the posture assessment and remediation may fail without access to these folders.
To Remedy a
Don't Allow
Selection
To see these popups again and grant access to the folders, edit cached settings:
Open
System Preferences
.
If configured to allow access (without prompting) to the
Cisco
Secure Client
app or executables, ACLs must be reconfigured after upgrading to AnyConnect 4.8 (or later), by re-adding the app or executable.
You must change the private key access in the system store of the keychain access to include the vpnagentd process:
AnyConnect releases 4.6.2 and 4.6.3 had IPsec connection issues. With the restoration of the IPsec connection (CSCvm87884)
in AnyConnect release 4.7 (and later), Diffie-Hellman groups 2 and 5 in FIPS mode are no longer supported. Therefore,
Cisco
Secure Client
in FIPS mode can no longer connect to Secure Firewall ASA prior to release 9.6 and with configuration dictating DH groups
2 or 5.
(Only Impacting users using Firefox prior to 58)
Due to
the NSS certificate store DB format change starting with Firefox 58,
Cisco
Secure Client
also made the change to use new certificate DB. If using Firefox version prior to
58, set NSS_DEFAULT_DB_TYPE="sql" environment variable to 58 to ensure Firefox and
Cisco
Secure Client
are accessing the same DB files.
If your wired or wireless network settings or specific SSIDs are pushed from a Windows group policy, they can conflict with
the proper operation of the Network Access Manager. With the Network Access Manager installed, a group policy for wireless
settings is not supported.
Windows 10 version 1703 changed their WLAN behavior, which caused disruptions when the Network Access Manager scans for wireless
network SSIDs. Because of a bug with the Windows code that Microsoft is investigating, the Network Access Manager's attempt
to access hidden networks is impacted. To provide the best user experience, we have disabled Microsoft's new functionality
by setting two registry keys during Network Access Manager installation and removing them during an uninstall.
AnyConnect 4.5.02XXX and later has additional functionality and warnings to guide users through the steps needed to leverage
complete capabilities, by enabling the Secure Client, formerly AnyConnect, software extension in their macOS Preferences ->
Security & Privacy pane. The requirement to manually enable the software extension is a new operating system requirement in
macOS 10.13 (High Sierra). Additionally, if
Secure Client
is upgraded before a user’s system is upgraded to macOS 10.13 and later, the user will automatically have the
Secure Client
software extension enabled.
Users running macOS 10.13 (and later) with a version earlier than 4.5.02XXX must enable the Secure Client, formerly AnyConnect,
software extension in their macOS Preferences -> Security & Privacy pane. You may need to manually reboot after enabling the
extension.
As described in
https://support.apple.com/en-gb/HT208019
,
macOS system administrators potentially have
additional capabilities to disable User Approved
Kernel Extension Loading, which would be effective
with any currently supported version of
Secure Client
.
If a network change or power event occurs, a posture process
that is interrupted will not complete successfully.
The network or power change results in the
Cisco
Secure Client
downloader error that must be acknowledged by the
user before continuing the process.
All connections to WWAN/3G/4G/5G must be manually triggered
by the user. The Network Access Manager does NOT
automatically connect to these networks if no wired
or wireless connection is available.
A "timestamp signature and/or certificate could not be verified or is malformed" error only occurs on Windows during web deploy
of AnyConnect 4.4MR2 (or later) from Secure Firewall ASA or ISE. Only the Network Access Manager, DART, ISE Posture, and Posture
modules that are deployed as MSI files are affected. Because of the use of SHA-2 timestamping certificate service, the most
up-to-date trusted root certificates are required to properly validate the timestamp certificate chain. You will not have
this issue with predeploy or an out-of-the-box Windows system configured to automatically update root certificates. However,
if the automatic root certificate update setting has been disabled (not the default), refer to
https://technet.microsoft.com/en-us/library/dn265983(v=ws.11).aspx
or manually install the timestamping root certificates that we use. You can also use the signtool to verify if the issue
is outside of
Cisco
Secure Client
by running the
signtool.exe verify /v /all/debug/pa<file to verify>
command from a Microsoft provided Windows SDK.
On macOS, a keychain authentication prompt may appear after the VPN connection is initiated. The prompt only occurs when access
to a client certificate private key is necessary, after a client certificate request from the secure gateway. Even if the
tunnel group is not configured with certificate authentication, certificate mapping may be configured on the Secure Firewall
ASA, causing the keychain prompts when the access control setting for the client certificate private key is configured as
Confirm Before Allowing Access
.
Configure the
Cisco
Secure Client
profile to restrict
Secure Client
access strictly to clients certificates from the
login keychain (in the ASDM profile editor, choose
Login under Preferences (Part 1) - Certificate Store
- macOS). You can stop the keychain authentication
prompts with one of the following actions:
Configure the access control setting
for the client certificate private keys in the
system keychain to allow access to
Cisco
Secure Client
.
The dashboard to retrieve the
OrgInfo.json
file is
https://dashboard.umbrella.com
. From
there you navigate to
, click the
+
(Add icon) in the upper left, and click
Module
Profile
from the
Cisco
Secure Client
Umbrella Roaming Security Module section.
For best results, we recommend a clean install of
Cisco
Secure Client
on a Windows 10 system and not an upgrade from Windows 7/8/8.1. If you are planning to perform an upgrade from Windows 7/8/8.1
with
Cisco
Secure Client
pre-installed, make sure that you first upgrade
Cisco
Secure Client
prior to uprading the operating system. The Network Access Manager Module
must
be uninstalled prior to upgrading to Windows 10. After the system upgrade is complete, you can re-install Network Access
Manager on the system. You may also choose to fully uninstall
Cisco
Secure Client
and re-install one of the supported versions after upgrading to Windows 10.
Formerly, if a split-include network was a Supernet of a Local Subnet, the local subnet traffic was
not
tunneled unless a split-include network that exactly matches the Local Subnet was configured. With the resolution of CSCum90946,
when a split-include network is a Supernet of a Local Subnet, the Local Subnet traffic is tunneled, unless a split-exclude
(deny 0.0.0.0/32 or ::/128) is also configured in the access-list (ACE/ACL).
The following configuration is required when a Supernet is configured in the split-include
and
the desired behavior is to allow LocalLan access:
Enable Local LAN Access in the
Cisco
Secure Client
profile (in the Preferences Part 1 menu) of the profile editor. (You also
have the option to make it user controllable.)
(For Windows 7, 8, and 8.1 users running an AnyConnect version prior to 4.9.03047) When the
client uses a SHA512 certificate for authentication, authentication fails, even
though the client logs show that the certificate is being used. The ASA logs
correctly show that no certificate was sent by AnyConnect. These versions of Windows
require that you enable support for SHA512 certificates in TLS 1.2, which is not
supported by default. Refer to
https://support.microsoft.com/en-us/kb/2973337
for
information on enabling support for these SHA512 certificates. 4.9.03049
After a fresh installation, you see ISE posture log trace messages as expected. However, if you
go into the ISE Posture Profile Editor and change the Enable Agent Log Trace file to
0 (disable), a service restart of
Cisco
Secure Client
is required to get expected results.
If you are using macOS 10.9 or later and want to use ISE posture, you may need to do the following to avoid issues:
Turn off certificate
validation to avoid a "failed to contact policy server" error during posture
assessment.
The Firefox certificate store on macOS is stored with permissions that
allow any user to alter the contents of the store, which allows unauthorized users
or processes to add an illegitimate CA into the trusted root store.
Cisco
Secure Client
no longer utilizes the Firefox store for either server validation or client
certificates.
If necessary, instruct your users how to export your
Cisco
Secure Client
certificates from their Firefox certificate stores, and how to import them into
the macOS keychain. The following steps are an example of what you may want to tell
your
Cisco
Secure Client
users.
Your
Cisco
Secure Client
Certificate(s) will most likely be located under the Authorities
category. Verify with your Certificate Administrator, as they may be located
under a different category (Your Certificates or Servers).
In the Format pull down menu, select
X.509
Certificate (DER)
. Add the .der extension to the certificate name,
if required.
If more than one
Cisco
Secure Client
Certificate and/or a Private Key is used/required, repeat the above
process for each Certificate).
In the Destination Keychain:, select the desired Keychain. The
login Keychain that is used for this example may not be the one used at your
company. Ask your Certificate Administrator to which Keychain your
certificate(s) should be imported.
In the
Destination Keychain:, select the desired Keychain. The login Keychain that is
used for this example may not be the one used at your company. Ask your
Certificate Administrator to which keychain your certificate(s) should be
imported.
Repeat the preceding steps for additional Certificates that are used or
required for
Cisco
Secure Client
.
Automatic upgrades of
Cisco
Secure Client
software via WebLaunch will work with limited user accounts as long as there are
no changes required for the ActiveX control.
Occasionally, the control will change due to either a security fix or the addition of new functionality.
Should the control require an upgrade when invoked from a limited user
account, the administrator must deploy the control using the
Cisco
Secure Client
pre-installer, SMS, GPO or other administrative deployment methodology.
Java 7 can cause problems with
Cisco
Secure Client
and
Secure Firewall Posture
. A description of the issues and workarounds is provided in the Troubleshooting
Technote
Java 7 Issues with AnyConnect,
CSD/HostScan, and WebVPN - Troubleshooting Guide
, which is in Cisco
documentation under Security > Cisco
Secure Firewall Posture
.
To allow local DHCP traffic to flow in the clear when Tunnel All Networks
is configured,
Cisco
Secure Client
adds a specific route to the local DHCP server when
Cisco
Secure Client
connects. To prevent data leakage on this route,
Cisco
Secure Client
also applies an implicit filter on the LAN adapter of the host machine, blocking
all traffic for that route except DHCP traffic.
Network connectivity provided by Bluetooth or USB tethered mobile phones or
mobile data devices are not specifically qualified by Cisco and should be verified
with
Cisco
Secure Client
before deployment.
We do not support running
Cisco
Secure Client
in virtual environments; however, we expect
Cisco
Secure Client
to function properly in the VMWare environments we test in.
If you encounter any issues with
Cisco
Secure Client
in your virtual environment, report them. We will make our best effort to resolve
them.
When Auto Update is disabled for a client running
Cisco
Secure Client
, the Secure Firewall ASA must have the same version of
Cisco
Secure Client
or earlier installed, or the client will fail to connect to the VPN.
To avoid this problem, configure the same version or earlier
Cisco
Secure Client
package on the Secure Firewall ASA, or upgrade the client to the new version by enabling Auto Update.
When the Network Access Manager operates, it takes exclusive control over
the network adapters and blocks attempts by other software connection managers
(including the Windows native connection manager) to establish connections.
Therefore, if you want
Cisco
Secure Client
users to use other connection managers on their endpoint computers (such as
iPassConnect Mobility Manager), they must disable Network Access Manager either
through the Disable Client option in the Network Access Manager GUI, or by stopping
the Network Access Manager service.
The Intel wireless network interface card driver, version 12.4.4.5, is incompatible with Network Access Manager. If this driver
is installed on the same endpoint as the Network Access Manager, it can cause inconsistent network connectivity and an abrupt
shutdown of the Windows operating system.
Applications like antivirus, antimalware, and Intrusion Prevention System
(IPS) can misinterpret the behavior of
Cisco Secure Client
applications as malicious. You can configure
exceptions to avoid such misinterpretation. After
installing the
Cisco
Secure Client
modules or packages, configure your antivirus
software to allow the
Secure Client
Installation folder or make security exceptions
for the
Secure Client
applications.
The common directories to exclude are listed
below, although the list may not be complete:
Antivirus applications can misinterpret the behavior of some of the
applications included in the posture module and
the
Secure Firewall Posture
package as malicious. Before installing the
posture module or
Secure Firewall Posture
package, configure your antivirus software to
allow or make security exceptions for these
Secure Firewall Posture
applications:
cscan.exe
ciscod.exe
cstub.exe
IKEv2 does not support the public-side proxy. If you need support for that feature, use SSL. Private-side proxies are supported
by both IKEv2 and SSL as dictated by the configuration sent from the secure gateway. IKEv2 applies the proxy configuration
sent from the gateway, and subsequent HTTP traffic is subject to that proxy configuration.
Cisco
Secure Client
sometimes receives and drops packet fragments with some routers, resulting in a
failure of some web traffic to pass.
To avoid this, lower the value of the MTU. We recommend 1200. The following example shows how to do this using CLI:
hostname# config t
hostname(config)# group-policy DfltGrpPolicy attributes
hostname(config-group-policy)# webvpn
hostname(config-group-webvpn)# anyconnect mtu 1200
To set the MTU using ASDM, go to
Configuration
>
Network (Client) Access
>
Group Policies
>
Add
or
Edit
>
Advanced
>
AnyConnect Client
.
If Dead Peer Detection (DPD) is enabled for DTLS, the client automatically determines the path MTU. If you previously reduced
the MTU using the Secure Firewall ASA, you should restore the setting to the default (1406). During tunnel establishment,
the client auto-tunes the MTU using special DPD packets. If you still have a problem, use the MTU configuration on the Secure
Firewall ASA to restrict the MTU as before.
Windows Active Directory Wireless Group Policies manage the wireless
settings and any wireless networks that are deployed to PCs in a specific Active
Directory Domain. When installing the Network Access Manager, administrators must be
aware that certain wireless Group Policy Objects (GPOs) can affect the behavior of
the Network Access Manager. Administrators should test the GPO policy settings with
the Network Access Manager before doing full GPO deployment. GPOs pertaining to
wireless networks are not supported.
To use Network Access Manager, you
may need to adjust the FreeRADIUS configuration. Any ECDH related ciphers are
disabled by default to prevent vulnerability. In /etc/raddb/eap.conf, change
the cipher_list value.
A mobile endpoint running Windows 7 or later must do a full EAP
authentication instead of leveraging the quicker PMKID reassociation when the client
roams between access points on the same network. Consequently, in some cases,
Cisco
Secure Client
prompts the user to enter credentials for every full authentication if the active
profile requires it.
After one uses
Cisco
Secure Client
to establish a VPN session with Windows 7 or
later on a remote LAN, the network browsers on the
other devices in the user’s LAN display the names
of hosts on the protected remote network. However,
the other devices cannot access these hosts.
To ensure the
Cisco
Secure Client
host prevents the hostname leak between
subnets, including the name of the
Cisco
Secure Client
endpoint host, configure that endpoint to never
become the primary or backup browser.
Enter
regedit
in the Search Programs and Files text box.
Navigate to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Browser\Parameters\
Double-click
MaintainServerList
.
The Edit String window opens.
Enter
No
.
Click
OK
.
Close the Registry Editor window.
The
Cisco
Secure Client
certificate revocation warning popup window opens after authentication if
Secure Client
attempts to verify a server certificate that specifies the distribution point of
an LDAP certificate revocation list (CRL), if the distribution point is only
internally accessible.
If you want to avoid the display of this popup window, do one of the following:
Obtain a certificate without any private CRL requirements.
Disable server certificate revocation checking in Internet Explorer.