본 제품에 대한 문서 세트는 편견 없는 언어를 사용하기 위해 노력합니다. 본 설명서 세트의 목적상, 편견 없는 언어는 나이, 장애, 성별, 인종 정체성, 민족 정체성, 성적 지향성, 사회 경제적 지위 및 교차성에 기초한 차별을 의미하지 않는 언어로 정의됩니다. 제품 소프트웨어의 사용자 인터페이스에서 하드코딩된 언어, RFP 설명서에 기초한 언어 또는 참조된 서드파티 제품에서 사용하는 언어로 인해 설명서에 예외가 있을 수 있습니다. 시스코에서 어떤 방식으로 포용적인 언어를 사용하고 있는지 자세히 알아보세요.
Cisco는 전 세계 사용자에게 다양한 언어로 지원 콘텐츠를 제공하기 위해 기계 번역 기술과 수작업 번역을 병행하여 이 문서를 번역했습니다. 아무리 품질이 높은 기계 번역이라도 전문 번역가의 번역 결과물만큼 정확하지는 않습니다. Cisco Systems, Inc.는 이 같은 번역에 대해 어떠한 책임도 지지 않으며 항상 원본 영문 문서(링크 제공됨)를 참조할 것을 권장합니다.
이 문서에서는 Cisco ISE(Identity Services Engine)를 RADIUS 서버로 사용하여 FTD(Firepower Threat Defense) 방화벽에서 AnyConnect VPN(Virtual Private Network)을 구성하는 방법을 설명합니다. Windows Server 2012를 루트 CA(Certificate Authority)로 사용하므로 VPN을 통한 통신은 인증서로 보호됩니다. 즉, 직원 PC가 FTD의 인증서를 신뢰합니다. FTD VPN 인증서는 Windows Server 2012 루트 CA에서 서명되었기 때문입니다
네트워크에서 다음 항목이 구축되어 실행 중이어야 합니다.
아래 예에서는 직원이 Windows/Mac PC에서 AnyConnect 클라이언트를 열고 자격 증명을 사용하여 VPN을 통해 FTD의 외부 인터페이스에 안전하게 연결합니다. FTD는 Cisco ISE에 대해 사용자 이름 및 비밀번호를 확인합니다. Windows Server Active Directory를 사용하여 사용자 이름, 비밀번호 및 그룹을 확인합니다. 즉, AD 그룹 'Employees'의 사용자만 회사 네트워크에 VPN을 연결할 수 있습니다.
이 문서의 정보는 다음 소프트웨어 버전을 기반으로 합니다.
이 활용 사례에서는 Anyconnect VPN 클라이언트를 실행하는 직원의 Windows/Mac PC가 FTD 방화벽의 외부 공용 IP 주소에 연결되며, Cisco ISE는 VPN을 통해 연결되면 Active Directory에서 구성원인 AD 그룹에 따라 특정 내부 또는 인터넷 리소스(구성 가능)에 대해 제한 또는 전체 액세스를 동적으로 허용합니다
디바이스 | 호스트 이름/FQDN | 공용 IP 주소 | 개인 IP 주소 | AnyConnect IP 주소 | |
윈도 PC | - | 198.51.100.2 | 10.0.0.1 | 192.168.10.50 | |
FTD | ciscofp3.cisco.com | 203.0.113.2 | 192.168.1.1 | - | |
FMC | - | - | 192.168.1.30 | - | |
Cisco ISE | ciscoise.cisco.com | - | 192.168.1.10 | - | |
Windows Server 2012 | ciscodc.cisco.com | - | 192.168.1.20 | - | |
내부 서버 | - | - | 192.168.1.x | - |
이 문서에서는 Microsoft Windows Server 2012를 인증서의 루트 CA로 사용하겠습니다. 클라이언트 PC는 이 루트 CA를 신뢰하여 VPN을 통해 FTD에 안전하게 연결합니다(아래 단계 참조). 이렇게 하면 인터넷을 통해 FTD에 안전하게 연결하고 집에서 내부 리소스에 액세스할 수 있습니다. 해당 PC는 브라우저 및 AnyConnect 클라이언트의 연결을 신뢰합니다.
http://192.168.1.20/certsrv으로 이동하여 아래 단계에 따라 Windows Server 루트 CA 인증서를 다운로드합니다.
Download a CA certificate, certificate chain 또는 CRL을 클릭합니다
Download Certificate(인증서 다운로드)를 클릭하고 이름을 'RootCAcert3.cer'로 바꿉니다.
방법 1: Windows Server 그룹 정책을 통해 인증서를 푸시하여 모든 직원 PC에 인증서를 설치합니다(10명 이상의 VPN 사용자에게 적합).
Windows Server를 사용하여 그룹 정책을 사용하여 클라이언트 컴퓨터에 인증서를 배포하는 방법
방법 2: 각 PC에 개별적으로 인증서를 설치하여 모든 직원 PC에 인증서를 설치합니다(VPN 사용자 한 명을 테스트하는 데 이상적).
직원의 Windows/Mac PC에서 인증서를 마우스 오른쪽 단추로 클릭하고 인증서 설치를 클릭합니다
'현재 사용자' 선택
Place all certificates in the following store를 선택하고 Trusted Root Certificate Authorities를 선택한 후 Ok, Next, Finish를 차례로 클릭한 후 Finish를 클릭합니다
Objects(개체) > Object Management(개체 관리) > PKI > Cert Enrollment(인증서 등록)로 이동하여 Add(추가)Cert Enrollment(인증서 등록)를 클릭합니다.
Add Cert Enrollment(인증서 등록 추가) 버튼 클릭
Enrollment Type(등록 유형) > Manual(수동)을 선택합니다
아래 이미지에 표시된 것처럼 루트 CA 인증서를 여기에 붙여넣어야 합니다.
다음은 루트 CA 인증서를 다운로드하고 텍스트 형식으로 확인한 다음 위의 상자에 붙여넣는 방법입니다.
http://192.168.1.20/certsrv으로 이동
Download a CA certificate, certificate chain 또는 CRL을 클릭합니다
Base 64 버튼 > Download CA Certificate(CA 인증서 다운로드)를 클릭합니다.
메모장에서 RootCAcertBase64.cer 파일을 엽니다
Windows AD Server에서 .cer 콘텐츠(루트 CA 인증서)를 복사하여 여기에 붙여넣습니다.
Certificate Parameters(인증서 매개변수) 탭 >> 인증서 정보를 입력합니다
참고:
사용자 지정 FQDN 필드는 FTD의 FQDN이어야 합니다.
Common Name 필드는 FTD의 FQDN이어야 합니다.
팁: FTD CLI에서 다음 명령을 입력하여 FTD의 FQDN을 가져올 수 있습니다.
> show network ===============[ System Information ]=============== Hostname : ciscofp3.cisco.com Domains : cisco DNS Servers : 192.168.1.20 Management port : 8305 IPv4 Default route Gateway : 192.168.1.1 ======================[ br1 ]======================= State : Enabled Channels : Management & Events Mode : Non-Autonegotiation MDI/MDIX : Auto/MDIX MTU : 1500 MAC Address : 00:0C:29:4F:AC:71 ----------------------[ IPv4 ]---------------------- Configuration : Manual Address : 192.168.1.2 Netmask : 255.255.255.0
Key(키) 탭을 클릭하고 임의의 키 이름을 입력합니다
Save(저장)를 클릭합니다.
위에서 생성한 FTDVPNServerCert를 선택하고 Add(추가)를 클릭합니다.
팁: FMC + FTD가 루트 CA 인증서를 확인하고 설치할 때까지 10-30초 정도 기다립니다(표시되지 않으면 Refresh(새로 고침) 아이콘 클릭)
ID 버튼을 클릭합니다.
이 CSR을 복사하여 붙여 넣고 Windows Server 루트 CA로 가져옵니다.
http://192.168.1.20/certsrv으로 이동
고급 인증서 요청 클릭
CSR(Certificate Signing Request)을 아래 필드에 붙여넣고 웹 서버를 인증서 템플릿으로 선택합니다
Submit(제출)을 클릭합니다.
Base 64 encoded(Base 64 인코딩) 버튼을 클릭하고 Download certificate(인증서 다운로드)를 클릭합니다
Browse Identity Certificate(ID 인증서 찾아보기)를 클릭하고 방금 다운로드한 인증서를 선택합니다
FTD VPN 서버 인증서(Windows Server 루트 CA에서 서명)가 설치되었습니다.
Cisco AnyConnect 프로파일 편집기 다운로드 및 설치
AnyConnect 프로파일 편집기 열기
Server List(서버 목록)를 클릭하고 > Add...를 클릭합니다.
FTD의 외부 인터페이스 IP 주소의 Display Name과 FQDN을 입력합니다. 서버 목록에 항목이 표시되어야 합니다.
OK(확인) 및 File(파일) > Save as(다른 이름으로 저장)...를 클릭합니다.
여기서 Windows 및 Mac .pkg 이미지 다운로드
Objects(개체) > Object Management(개체 관리) > VPN > AnyConnect File(AnyConnect 파일)로 이동하고 Add AnyConnect File(AnyConnect 파일 추가)을 클릭합니다.
Firepower Management Center에 로그인
System(시스템) > Integration(통합) > Realms(영역) > New Realm(새 영역) >> Directory(디렉토리) 탭 > Add(디렉토리 추가)를 클릭합니다.
Realm Configuration(영역 컨피그레이션) 탭 - 여기서 도메인 컨트롤러의 정보를 구성합니다.
참고: 위 예에서는 Windows AD Server에서 '도메인 관리자' 권한이 있는 AD 사용자 이름이 사용됩니다. FMC가 영역 컨피그레이션을 위해 Active Directory 도메인에 가입할 수 있는 보다 구체적인 최소 권한을 가진 사용자를 구성하려면 여기에서 단계를 확인할 수 있습니다
User Download(사용자 다운로드) 탭을 클릭하여 사용자 다운로드가 성공했는지 확인합니다.
Devices(디바이스) > VPN > Remote Access(원격 액세스) > Add(추가)를 클릭합니다
Name, Description을 입력하고 Add를 클릭하여 Anyconnect VPN을 구성할 FTD 디바이스를 선택합니다
인증 서버에 대해 추가를 클릭하고 RADIUS 서버 그룹을 선택합니다. Cisco Identity Services Engine PSN(Policy Services Node)입니다.
RADIUS 서버의 이름 입력
위에서 구성한 영역을 선택하십시오.
Add를 클릭합니다
Cisco ISE 노드에 대한 다음 정보를 입력 합니다.
IP 주소/호스트 이름: Cisco ISE PSN의 IP 주소(정책 서비스 노드) - 인증 요청이 이동하는 위치입니다.
키: cisco123
확인 키: cisco123
주의: 위의 키는 RADIUS 공유 암호 키입니다. 나중에 이 키를 사용합니다
참고: 최종 사용자가 AnyConnect VPN을 통해 FTD에 연결하려고 시도할 경우, 입력하는 사용자 이름 및 비밀번호가 이 FTD에 대한 인증 요청으로 전송됩니다. FTD는 인증을 위해 Cisco ISE PSN 노드에 요청을 전달합니다 (Cisco ISE는 Windows Active Directory에서 해당 사용자 이름 및 비밀번호를 확인하고 Cisco ISE에 현재 구성된 조건에 따라 액세스 제어/네트워크 액세스를 시행합니다)
Save(저장)를 클릭합니다.
Edit for IPv4 Address Pool을 클릭합니다
Add를 클릭합니다
이름, IPv4 주소 범위 및 서브넷 마스크 입력
IP 주소 풀을 선택하고 확인을 클릭합니다.
Edit Group Policy(그룹 정책 수정)를 클릭합니다
Anyconnect 탭 > Profiles(프로파일) > Add(추가)를 클릭합니다
Name(이름)을 입력하고 Browse...(찾아보기...)를 클릭하고 위의 4단계에서 VPNprofile.xml 파일을 선택합니다.
Save(저장)를 클릭하고 Next(다음)를 클릭합니다.
위의 4단계에서 AnyConnect Windows/Mac 파일의 확인란을 선택합니다
Next(다음)를 클릭합니다.
인터페이스 그룹/보안 영역을 외부로 선택
위의 3단계에서 만든 인증서로 Certificate Enrollment(인증서 등록)를 선택합니다
컨피그레이션을 검토하고 Next(다음)를 클릭합니다.
VPN 트래픽이 NAT를 받지 않도록 고정 NAT 규칙을 만듭니다(FTD는 외부 인터페이스로 올 때 AnyConnect 패킷을 이미 해독하므로 해당 PC가 내부 인터페이스 뒤에 이미 있고 이미 전용 IP 주소를 가지고 있는 것처럼 보입니다. 해당 VPN 트래픽에 대해 NAT-Exempt(No-NAT) 규칙을 구성해야 합니다).
Objects(개체)로 이동하고 Add Network(네트워크 추가)를 클릭한 후 Add Object(개체 추가)를 클릭합니다
또한 사용자 VPN이 삽입된 후 데이터 트래픽이 흐르도록 허용해야 합니다. 두 가지 선택 사항이 있습니다.
a. 허용 또는 거부 규칙을 생성하여 VPN 사용자가 특정 리소스에 액세스하도록 허용 또는 거부
b. '암호 해독된 트래픽에 대한 액세스 제어 정책 우회'를 사용하도록 설정 - VPN을 통해 FTD에 성공적으로 연결할 수 있는 모든 사용자가 액세스 제어 정책에서 허용 또는 거부 규칙을 거치지 않고 FTD 뒤에 있는 모든 항목에 액세스할 수 있습니다.
암호 해독된 트래픽에 대해 Bypass Access Control Policy 활성화: 디바이스 > VPN > 원격 액세스 > VPN 프로파일 > 액세스 인터페이스:
참고: 이 옵션을 활성화하지 않으면 Policies(정책) > Access Control Policy(액세스 제어 정책)로 이동하여 VPN 사용자가 내부 또는 dmz 뒤의 사물에 액세스할 수 있도록 Allow(허용) 규칙을 만들어야 합니다
firepower Management Center 오른쪽 상단에서 Deploying(구축)을 클릭합니다
Cisco Identity Services Engine에 로그인하여 Administration(관리) > Network Devices(네트워크 디바이스) > Add(추가)를 클릭합니다
위 단계에서 Name(이름)을 입력하고 FTD의 IP 주소를 입력한 다음 RADIUS Shared Secret(RADIUS 공유 암호)를 입력합니다
주의: FTD가 Cisco ISE(RADIUS 서버)에 연결할 수 있는 인터페이스/IP 주소, 즉 Cisco ISE가 FTD에 연결할 수 있는 FTD 인터페이스여야 합니다
Policy(정책) > Policy Set(정책 설정) > Policy Set(정책 세트)를 클릭하고 다음 유형의 인증 요청에 대해 정책 세트를 생성합니다.
Radius-NAS-Port-Type EQUALS Virtual
이는 VPN 연결처럼 ISE에 들어오는 RADIUS 요청이 있으면 이 정책 집합에 도달함을 의미합니다
다음은 Cisco ISE에서 해당 조건을 찾을 수 있는 곳입니다.
위에서 생성한 정책 집합을 편집합니다.
기본 차단 규칙 위에 규칙을 추가하여 Active Directory 그룹 'Employees'에 있는 경우에만 사용자에게 '액세스 허용' 권한 부여 프로필을 부여합니다.
다음은 규칙이 완료된 후 표시되는 방식입니다
직원 Windows/Mac PC에서 브라우저를 열고 브라우저에서 FTD 외부 주소로 이동합니다.
Active Directory 사용자 이름 및 비밀번호를 입력합니다
Download(다운로드)를 클릭합니다.
Windows/Mac PC에서 AnyConnect VPN Secure Mobility Client 설치 및 실행
프롬프트가 표시되면 Active Directory 사용자 이름 및 비밀번호를 입력합니다
5단계에서 생성한 IP 주소 풀의 IP 주소와 해당 서브넷의 .1의 기본 게이트웨이가 제공됩니다
명령 표시
FTD에서 최종 사용자가 AnyConnect VPN에 연결되어 있는지 확인합니다.
> show ip System IP Addresses: Interface Name IP address Subnet mask Method GigabitEthernet0/0 inside 192.168.1.1 255.255.255.240 CONFIG GigabitEthernet0/1 outside 203.0.113.2 255.255.255.240 CONFIG Current IP Addresses: Interface Name IP address Subnet mask Method GigabitEthernet0/0 inside 192.168.1.1 255.255.255.240 CONFIG GigabitEthernet0/1 outside 203.0.113.2 255.255.255.240 CONFIG
> show vpn-sessiondb detail anyconnect Session Type: AnyConnect Detailed Username : jsmith Index : 2 Assigned IP : 192.168.10.50 Public IP : 198.51.100.2 Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel License : AnyConnect Premium Encryption : AnyConnect-Parent: (1)none SSL-Tunnel: (1)AES-GCM-256 DTLS-Tunnel: (1)AES256 Hashing : AnyConnect-Parent: (1)none SSL-Tunnel: (1)SHA384 DTLS-Tunnel: (1)SHA1 Bytes Tx : 18458 Bytes Rx : 2706024 Pkts Tx : 12 Pkts Rx : 50799 Pkts Tx Drop : 0 Pkts Rx Drop : 0 Group Policy : DfltGrpPolicy Tunnel Group : FTDAnyConnectVPN Login Time : 15:08:19 UTC Wed Oct 10 2018 Duration : 0h:30m:11s Inactivity : 0h:00m:00s VLAN Mapping : N/A VLAN : none Audt Sess ID : 0ac9d68a000020005bbe15e3 Security Grp : none Tunnel Zone : 0 AnyConnect-Parent Tunnels: 1 SSL-Tunnel Tunnels: 1 DTLS-Tunnel Tunnels: 1 AnyConnect-Parent: Tunnel ID : 2.1 Public IP : 198.51.100.2 Encryption : none Hashing : none TCP Src Port : 53956 TCP Dst Port : 443 Auth Mode : userPassword Idle Time Out: 30 Minutes Idle TO Left : 0 Minutes Client OS : win Client OS Ver: 6.1.7601 Service Pack 1 Client Type : AnyConnect Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049 Bytes Tx : 10572 Bytes Rx : 289 Pkts Tx : 6 Pkts Rx : 0 Pkts Tx Drop : 0 Pkts Rx Drop : 0 SSL-Tunnel: Tunnel ID : 2.2 Assigned IP : 192.168.10.50 Public IP : 198.51.100.2 Encryption : AES-GCM-256 Hashing : SHA384 Ciphersuite : ECDHE-RSA-AES256-GCM-SHA384 Encapsulation: TLSv1.2 TCP Src Port : 54634 TCP Dst Port : 443 Auth Mode : userPassword Idle Time Out: 30 Minutes Idle TO Left : 29 Minutes Client OS : Windows Client Type : SSL VPN Client Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049 Bytes Tx : 7886 Bytes Rx : 2519 Pkts Tx : 6 Pkts Rx : 24 Pkts Tx Drop : 0 Pkts Rx Drop : 0 DTLS-Tunnel: Tunnel ID : 2.3 Assigned IP : 192.168.10.50 Public IP : 198.51.100.2 Encryption : AES256 Hashing : SHA1 Ciphersuite : DHE-RSA-AES256-SHA Encapsulation: DTLSv1.0 UDP Src Port : 61113 UDP Dst Port : 443 Auth Mode : userPassword Idle Time Out: 30 Minutes Idle TO Left : 30 Minutes Client OS : Windows Client Type : DTLS VPN Client Client Ver : Cisco AnyConnect VPN Agent for Windows 4.6.03049 Bytes Tx : 0 Bytes Rx : 2703216 Pkts Tx : 0 Pkts Rx : 50775 Pkts Tx Drop : 0 Pkts Rx Drop : 0
Windows 7 PC에서 Cisco AnyConnect 클라이언트에서 '연결 끊기'를 클릭하면 다음과 같은 혜택을 얻을 수 있습니다.
> show vpn-sessiondb detail anyconnect INFO: There are presently no active sessions
캡처
AnyConnect Client에서 connect를 누를 때 외부 인터페이스에서 작동하는 캡처의 모양
예:
예를 들어, 최종 사용자의 공용 IP는 집에 있는 라우터의 공용 IP가 됩니다
ciscofp3# capture capin interface outside trace detail trace-count 100 match ip any host<now hit Connect on AnyConnect Client from employee PC> ciscofp3# show cap capture capin type raw-data trace detail trace-count 100 interface outside [Buffer Full - 524153 bytes] match ip any host 198.51.100.2
최종 사용자의 PC에서 FTD의 외부 인터페이스로 전송된 패킷을 확인하여 외부 FTD 인터페이스에 도착하는지 확인합니다.
ciscofp3# show cap capin 2375 packets captured 1: 17:05:56.580994 198.51.100.2.55928 > 203.0.113.2.443: S 2933933902:2933933902(0) win 8192 <mss 1460,nop,wscale 8,nop,nop,sackOK> 2: 17:05:56.581375 203.0.113.2.443 > 198.51.100.2.55928: S 430674106:430674106(0) ack 2933933903 win 32768 <mss 1460> 3: 17:05:56.581757 198.51.100.2.55928 > 203.0.113.2.443: . ack 430674107 win 64240 4: 17:05:56.582382 198.51.100.2.55928 > 203.0.113.2.443: P 2933933903:2933934036(133) ack 430674107 win 64240 5: 17:05:56.582458 203.0.113.2.443 > 198.51.100.2.55928: . ack 2933934036 win 32768 6: 17:05:56.582733 203.0.113.2.443 > 198.51.100.2.55928: P 430674107:430675567(1460) ack 2933934036 win 32768 7: 17:05:56.790211 198.51.100.2.55928 > 203.0.113.2.443: . ack 430675567 win 64240 8: 17:05:56.790349 203.0.113.2.443 > 198.51.100.2.55928: P 430675567:430676672(1105) ack 2933934036 win 32768 9: 17:05:56.791691 198.51.100.2.55928 > 203.0.113.2.443: P 2933934036:2933934394(358) ack 430676672 win 63135 10: 17:05:56.794911 203.0.113.2.443 > 198.51.100.2.55928: P 430676672:430676763(91) ack 2933934394 win 32768 11: 17:05:56.797077 198.51.100.2.55928 > 203.0.113.2.443: P 2933934394:2933934703(309) ack 430676763 win 63044 12: 17:05:56.797169 203.0.113.2.443 > 198.51.100.2.55928: . ack 2933934703 win 32768 13: 17:05:56.797199 198.51.100.2.55928 > 203.0.113.2.443: P 2933934703:2933935524(821) ack 430676763 win 63044 14: 17:05:56.797276 203.0.113.2.443 > 198.51.100.2.55928: . ack 2933935524 win 32768 15: 17:05:56.798634 203.0.113.2.443 > 198.51.100.2.55928: P 430676763:430677072(309) ack 2933935524 win 32768 16: 17:05:56.798786 203.0.113.2.443 > 198.51.100.2.55928: P 430677072:430677829(757) ack 2933935524 win 32768 17: 17:05:56.798817 203.0.113.2.443 > 198.51.100.2.55928: P 430677829:430677898(69) ack 2933935524 win 32768 18: 17:05:56.799397 198.51.100.2.55928 > 203.0.113.2.443: . ack 430677898 win 64240 19: 17:05:56.810215 198.51.100.2.55928 > 203.0.113.2.443: P 2933935524:2933935593(69) ack 430677898 win 64240 20: 17:05:56.810398 203.0.113.2.443 > 198.51.100.2.55928: . ack 2933935593 win 32768 21: 17:05:56.810428 198.51.100.2.55928 > 203.0.113.2.443: F 2933935593:2933935593(0) ack 430677898 win 64240 22: 17:05:56.810489 203.0.113.2.443 > 198.51.100.2.55928: . ack 2933935594 win 32768 23: 17:05:56.810627 203.0.113.2.443 > 198.51.100.2.55928: FP 430677898:430677898(0) ack 2933935594 win 32768 24: 17:05:56.811008 198.51.100.2.55928 > 203.0.113.2.443: . ack 430677899 win 64240 25: 17:05:59.250566 198.51.100.2.56228 > 203.0.113.2.443: S 2614357960:2614357960(0) win 8192 <mss 1460,nop,wscale 8,nop,nop,sackOK> 26: 17:05:59.250963 203.0.113.2.443 > 198.51.100.2.56228: S 3940915253:3940915253(0) ack 2614357961 win 32768 <mss 1460> 27: 17:05:59.251406 198.51.100.2.56228 > 203.0.113.2.443: . ack 3940915254 win 64240 28: 17:05:59.252062 198.51.100.2.56228 > 203.0.113.2.443: P 2614357961:2614358126(165) ack 3940915254 win 64240 29: 17:05:59.252138 203.0.113.2.443 > 198.51.100.2.56228: . ack 2614358126 win 32768 30: 17:05:59.252458 203.0.113.2.443 > 198.51.100.2.56228: P 3940915254:3940915431(177) ack 2614358126 win 32768 31: 17:05:59.253450 198.51.100.2.56228 > 203.0.113.2.443: P 2614358126:2614358217(91) ack 3940915431 win 64063 32: 17:05:59.253679 203.0.113.2.443 > 198.51.100.2.56228: . ack 2614358217 win 32768 33: 17:05:59.255235 198.51.100.2.56228 > 203.0.113.2.443: P 2614358217:2614358526(309) ack 3940915431 win 64063 34: 17:05:59.255357 203.0.113.2.443 > 198.51.100.2.56228: . ack 2614358526 win 32768 35: 17:05:59.255388 198.51.100.2.56228 > 203.0.113.2.443: P 2614358526:2614359555(1029) ack 3940915431 win 64063 36: 17:05:59.255495 203.0.113.2.443 > 198.51.100.2.56228: . ack 2614359555 win 32768 37: 17:05:59.400110 203.0.113.2.443 > 198.51.100.2.56228: P 3940915431:3940915740(309) ack 2614359555 win 32768 38: 17:05:59.400186 203.0.113.2.443 > 198.51.100.2.56228: P 3940915740:3940917069(1329) ack 2614359555 win 32768 39: 17:05:59.400675 198.51.100.2.56228 > 203.0.113.2.443: . ack 3940917069 win 64240 40: 17:05:59.400736 203.0.113.2.443 > 198.51.100.2.56228: P 3940917069:3940918529(1460) ack 2614359555 win 32768 41: 17:05:59.400751 203.0.113.2.443 > 198.51.100.2.56228: P 3940918529:3940919979(1450) ack 2614359555 win 32768 42: 17:05:59.401544 198.51.100.2.56228 > 203.0.113.2.443: . ack 3940919979 win 64240 43: 17:05:59.401605 203.0.113.2.443 > 198.51.100.2.56228: P 3940919979:3940921439(1460) ack 2614359555 win 32768 44: 17:05:59.401666 203.0.113.2.443 > 198.51.100.2.56228: P 3940921439:3940922899(1460) ack 2614359555 win 32768 45: 17:05:59.401727 203.0.113.2.443 > 198.51.100.2.56228: P 3940922899:3940923306(407) ack 2614359555 win 32768 46: 17:05:59.401743 203.0.113.2.443 > 198.51.100.2.56228: P 3940923306:3940923375(69) ack 2614359555 win 32768 47: 17:05:59.402185 198.51.100.2.56228 > 203.0.113.2.443: . ack 3940923375 win 64240 48: 17:05:59.402475 198.51.100.2.56228 > 203.0.113.2.443: P 2614359555:2614359624(69) ack 3940923375 win 64240 49: 17:05:59.402597 203.0.113.2.443 > 198.51.100.2.56228: . ack 2614359624 win 32768 50: 17:05:59.402628 198.51.100.2.56228 > 203.0.113.2.443: F 2614359624:2614359624(0) ack 3940923375 win 64240 51: 17:05:59.402673 203.0.113.2.443 > 198.51.100.2.56228: . ack 2614359625 win 32768 52: 17:05:59.402765 203.0.113.2.443 > 198.51.100.2.56228: FP 3940923375:3940923375(0) ack 2614359625 win 32768 53: 17:05:59.413384 198.51.100.2.56228 > 203.0.113.2.443: . ack 3940923376 win 64240 54: 17:05:59.555665 198.51.100.2.56280 > 203.0.113.2.443: S 1903869753:1903869753(0) win 8192 <mss 1460,nop,wscale 8,nop,nop,sackOK> 55: 17:05:59.556154 203.0.113.2.443 > 198.51.100.2.56280: S 2583094766:2583094766(0) ack 1903869754 win 32768 <mss 1460> 56: 17:05:59.556627 198.51.100.2.56280 > 203.0.113.2.443: . ack 2583094767 win 64240 57: 17:05:59.560502 198.51.100.2.56280 > 203.0.113.2.443: P 1903869754:1903869906(152) ack 2583094767 win 64240 58: 17:05:59.560578 203.0.113.2.443 > 198.51.100.2.56280: . ack 1903869906 win 32768 59: 17:05:59.563996 203.0.113.2.443 > 198.51.100.2.56280: P 2583094767:2583096227(1460) ack 1903869906 win 32768 60: 17:05:59.780034 198.51.100.2.56280 > 203.0.113.2.443: . ack 2583096227 win 64240 61: 17:05:59.780141 203.0.113.2.443 > 198.51.100.2.56280: P 2583096227:2583097673(1446) ack 1903869906 win 32768 62: 17:05:59.998376 198.51.100.2.56280 > 203.0.113.2.443: . ack 2583097673 win 62794 63: 17:06:14.809253 198.51.100.2.56280 > 203.0.113.2.443: P 1903869906:1903870032(126) ack 2583097673 win 62794 64: 17:06:14.809970 203.0.113.2.443 > 198.51.100.2.56280: P 2583097673:2583097724(51) ack 1903870032 win 32768 65: 17:06:14.815768 198.51.100.2.56280 > 203.0.113.2.443: P 1903870032:1903870968(936) ack 2583097724 win 64240 66: 17:06:14.815860 203.0.113.2.443 > 198.51.100.2.56280: . ack 1903870968 win 32768 67: 17:06:14.816913 203.0.113.2.443 > 198.51.100.2.56280: P 2583097724:2583099184(1460) ack 1903870968 win 32768 68: 17:06:14.816928 203.0.113.2.443 > 198.51.100.2.56280: P 2583099184:2583099306(122) ack 1903870968 win 32768 69: 17:06:14.816959 203.0.113.2.443 > 198.51.100.2.56280: P 2583099306:2583100766(1460) ack 1903870968 win 32768 70: 17:06:14.816974 203.0.113.2.443 > 198.51.100.2.56280: P 2583100766:2583100888(122) ack 1903870968 win 32768 71: 17:06:14.816989 203.0.113.2.443 > 198.51.100.2.56280: P 2583100888:2583102142(1254) ack 1903870968 win 32768 72: 17:06:14.817554 198.51.100.2.56280 > 203.0.113.2.443: . ack 2583102142 win 64240 73: 17:06:14.817615 203.0.113.2.443 > 198.51.100.2.56280: P 2583102142:2583103602(1460) ack 1903870968 win 32768 74: 17:06:14.817630 203.0.113.2.443 > 198.51.100.2.56280: P 2583103602:2583103930(328) ack 1903870968 win 32768 75: 17:06:14.817630 203.0.113.2.443 > 198.51.100.2.56280: P 2583103930:2583104052(122) ack 1903870968 win 32768 76: 17:06:14.817645 203.0.113.2.443 > 198.51.100.2.56280: P 2583104052:2583105512(1460) ack 1903870968 win 32768 77: 17:06:14.817645 203.0.113.2.443 > 198.51.100.2.56280: P 2583105512:2583105634(122) ack 1903870968 win 32768 78: 17:06:14.817660 203.0.113.2.443 > 198.51.100.2.56280: P 2583105634:2583105738(104) ack 1903870968 win 32768 79: 17:06:14.818088 198.51.100.2.56280 > 203.0.113.2.443: . ack 2583105512 win 64240 80: 17:06:14.818530 198.51.100.2.56280 > 203.0.113.2.443: . ack 2583105738 win 64014 81: 17:06:18.215122 198.51.100.2.58944 > 203.0.113.2.443: udp 99 82: 17:06:18.215610 203.0.113.2.443 > 198.51.100.2.58944: udp 48 83: 17:06:18.215671 198.51.100.2.56280 > 203.0.113.2.443: P 1903870968:1903872025(1057) ack 2583105738 win 64014 84: 17:06:18.215763 203.0.113.2.443 > 198.51.100.2.56280: . ack 1903872025 win 32768 85: 17:06:18.247011 198.51.100.2.58944 > 203.0.113.2.443: udp 119 86: 17:06:18.247728 203.0.113.2.443 > 198.51.100.2.58944: udp 188 87: 17:06:18.249285 198.51.100.2.58944 > 203.0.113.2.443: udp 93 88: 17:06:18.272309 198.51.100.2.58944 > 203.0.113.2.443: udp 93 89: 17:06:18.277680 198.51.100.2.58944 > 203.0.113.2.443: udp 93 90: 17:06:18.334501 198.51.100.2.58944 > 203.0.113.2.443: udp 221 91: 17:06:18.381541 198.51.100.2.58944 > 203.0.113.2.443: udp 109 92: 17:06:18.443565 198.51.100.2.58944 > 203.0.113.2.443: udp 109 93: 17:06:18.786702 198.51.100.2.58944 > 203.0.113.2.443: udp 157 94: 17:06:18.786870 198.51.100.2.58944 > 203.0.113.2.443: udp 157 95: 17:06:18.786931 198.51.100.2.58944 > 203.0.113.2.443: udp 157 96: 17:06:18.952755 198.51.100.2.58944 > 203.0.113.2.443: udp 109 97: 17:06:18.968272 198.51.100.2.58944 > 203.0.113.2.443: udp 109 98: 17:06:18.973902 198.51.100.2.58944 > 203.0.113.2.443: udp 109 99: 17:06:18.973994 198.51.100.2.58944 > 203.0.113.2.443: udp 109 100: 17:06:18.989267 198.51.100.2.58944 > 203.0.113.2.443: udp 109
방화벽 내의 최종 사용자로부터 받은 패킷에 대한 자세한 정보 보기
ciscofp3# show cap capin packet-number 1 trace detail 2943 packets captured 1: 17:05:56.580994 006b.f1e7.6c5e 000c.294f.ac84 0x0800 Length: 66 198.51.100.2.55928 > 203.0.113.2.443: S [tcp sum ok] 2933933902:2933933902(0) win 8192 <mss 1460,nop,wscale 8,nop,nop,sackOK> (DF) (ttl 127, id 31008) Phase: 1 Type: CAPTURE Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace13beec90, priority=13, domain=capture, deny=false hits=2737, user_data=0x2ace1232af40, cs_id=0x0, l3_type=0x0 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0000.0000.0000 input_ifc=outside, output_ifc=any Phase: 2 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: Forward Flow based lookup yields rule: in id=0x2ace107c8480, priority=1, domain=permit, deny=false hits=183698, user_data=0x0, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=outside, output_ifc=any Phase: 3 Type: ROUTE-LOOKUP Subtype: Resolve Egress Interface Result: ALLOW Config: Additional Information: found next-hop 203.0.113.2 using egress ifc identity Phase: 4 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: Forward Flow based lookup yields rule: in id=0x2ace1199f680, priority=119, domain=permit, deny=false hits=68, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=443, tag=any, dscp=0x0 input_ifc=outside, output_ifc=identity Phase: 5 Type: CONN-SETTINGS Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace1199efd0, priority=8, domain=conn-set, deny=false hits=68, user_data=0x2ace1199e5d0, cs_id=0x0, reverse, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=443, tag=any, dscp=0x0 input_ifc=outside, output_ifc=identity Phase: 6 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace0fa81330, priority=0, domain=nat-per-session, deny=false hits=178978, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=any Phase: 7 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace107cdb00, priority=0, domain=inspect-ip-options, deny=true hits=174376, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 8 Type: CLUSTER-REDIRECT Subtype: cluster-redirect Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace107c90c0, priority=208, domain=cluster-redirect, deny=false hits=78, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=identity Phase: 9 Type: TCP-MODULE Subtype: webvpn Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace1199df20, priority=13, domain=soft-np-tcp-module, deny=false hits=58, user_data=0x2ace061efb00, cs_id=0x0, reverse, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=443, tag=any, dscp=0x0 input_ifc=outside, output_ifc=identity Phase: 10 Type: VPN Subtype: ipsec-tunnel-flow Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace11d455e0, priority=13, domain=ipsec-tunnel-flow, deny=true hits=87214, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 11 Type: CAPTURE Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace11da7000, priority=13, domain=capture, deny=false hits=635, user_data=0x2ace1232af40, cs_id=0x2ace11f21620, reverse, flags=0x0, protocol=0 src ip/id=198.51.100.2, mask=255.255.255.255, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 12 Type: CAPTURE Subtype: Result: ALLOW Config: Additional Information: Reverse Flow based lookup yields rule: out id=0x2ace10691780, priority=13, domain=capture, deny=false hits=9, user_data=0x2ace1232af40, cs_id=0x2ace11f21620, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=198.51.100.2, mask=255.255.255.255, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=outside Phase: 13 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 87237, packet dispatched to next module Module information for forward flow ... snp_fp_inspect_ip_options snp_fp_tcp_normalizer snp_fp_tcp_mod snp_fp_adjacency snp_fp_fragment snp_fp_drop Module information for reverse flow ... snp_fp_inspect_ip_options snp_fp_tcp_normalizer snp_fp_adjacency snp_fp_fragment snp_ifc_stat Result: input-interface: outside input-status: up input-line-status: up output-interface: NP Identity Ifc Action: allow 1 packet shown ciscofp3#
FTD의 disk0:에 캡처를 복사합니다. 그런 다음 SCP, FTP 또는 TFTP를 통해 다운로드할 수 있습니다
(또는 Firepower Management Center Web UI에서 >> System >> Health >> Health Monitor >> Advanced Troubleshooting >> Download File 탭을 클릭합니다.)
ciscofp3# copy /pcap capture:capin disk0:/capin.pcap Source capture name [capin]? <hit Enter> Destination filename [capin.pcap]? <hit Enter> !!!!!!!!!!!!!!! 207 packets copied in 0.0 secs ciscofp3# dir Directory of disk0:/ 122 -rwx 198 05:13:44 Apr 01 2018 lina_phase1.log 49 drwx 4096 21:42:20 Jun 30 2018 log 53 drwx 4096 21:42:36 Jun 30 2018 coredumpinfo 110 drwx 4096 14:59:51 Oct 10 2018 csm 123 -rwx 21074 01:26:44 Oct 10 2018 backup-config.cfg 124 -rwx 21074 01:26:44 Oct 10 2018 startup-config 125 -rwx 20354 01:26:44 Oct 10 2018 modified-config.cfg 160 -rwx 60124 17:06:22 Oct 10 2018 capin.pcap
ciscofp3# copy disk0:/capin.pcap tftp:/
Source filename [capin.pcap]? <hit Enter>
Address or name of remote host []? 192.168.1.25 (your TFTP server IP address (your PC if using tftpd32 or Solarwinds TFTP Server))
Destination filename [capin.pcap]? <hit Enter>
113645 bytes copied in 21.800 secs (5411 bytes/sec)
ciscofp3#
(or from FirePOWER Management Center Web GUI >> System >> Health >> Health Monitor >> click Advanced Troubleshooting >> click Download File tab)
NAT 규칙이 올바르게 구성되었는지 확인합니다.
ciscofp3# packet-tracer input outside tcp 192.168.10.50 1234 192.168.1.30 443 detailed Phase: 1 Type: CAPTURE Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace0fa90e70, priority=13, domain=capture, deny=false hits=11145169, user_data=0x2ace120c4910, cs_id=0x0, l3_type=0x0 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0000.0000.0000 input_ifc=outside, output_ifc=any Phase: 2 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: Forward Flow based lookup yields rule: in id=0x2ace107c8480, priority=1, domain=permit, deny=false hits=6866095, user_data=0x0, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=outside, output_ifc=any Phase: 3 Type: ROUTE-LOOKUP Subtype: Resolve Egress Interface Result: ALLOW Config: Additional Information: found next-hop 192.168.1.30 using egress ifc inside Phase: 4 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (inside,outside) source static inside-subnet inside-subnet destination static outside-subnet-anyconnect-po ol outside-subnet-anyconnect-pool no-proxy-arp route-lookup Additional Information: NAT divert to egress interface inside Untranslate 192.168.1.30/443 to 192.168.1.30/443 Phase: 5 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group CSM_FW_ACL_ global access-list CSM_FW_ACL_ advanced trust ip ifc outside any any rule-id 268436481 event-log flow-end access-list CSM_FW_ACL_ remark rule-id 268436481: PREFILTER POLICY: Example_Company_Prefilter_Policy access-list CSM_FW_ACL_ remark rule-id 268436481: RULE: AllowtoVPNOutsideinterface Additional Information: Forward Flow based lookup yields rule: in id=0x2ace0fa8f4e0, priority=12, domain=permit, trust hits=318637, user_data=0x2ace057b9a80, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=outside dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0 input_ifc=any, output_ifc=any ... Phase: 7 Type: NAT Subtype: Result: ALLOW Config: nat (inside,outside) source static inside-subnet inside-subnet destination static outside-subnet-anyconnect-po ol outside-subnet-anyconnect-pool no-proxy-arp route-lookup Additional Information: Static translate 192.168.10.50/1234 to 192.168.10.50/1234 Forward Flow based lookup yields rule: in id=0x2ace11975cb0, priority=6, domain=nat, deny=false hits=120, user_data=0x2ace0f29c4a0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=192.168.10.0, mask=255.255.255.0, port=0, tag=any dst ip/id=10.201.214.128, mask=255.255.255.240, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=inside ...
Phase: 10 Type: VPN Subtype: ipsec-tunnel-flow Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2ace11d455e0, priority=13, domain=ipsec-tunnel-flow, deny=true hits=3276174, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 11 Type: NAT Subtype: rpf-check Result: ALLOW Config: nat (inside,outside) source static inside-subnet inside-subnet destination static outside-subnet-anyconnect-po ol outside-subnet-anyconnect-pool no-proxy-arp route-lookup Additional Information: Forward Flow based lookup yields rule: out id=0x2ace0d5a9800, priority=6, domain=nat-reverse, deny=false hits=121, user_data=0x2ace1232a4c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=192.168.10.0, mask=255.255.255.0, port=0, tag=any dst ip/id=10.201.214.128, mask=255.255.255.240, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=inside ... Phase: 14 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 3279248, packet dispatched to next module Module information for reverse flow ... ... Phase: 15 Type: ROUTE-LOOKUP Subtype: Resolve Egress Interface Result: ALLOW Config: Additional Information: found next-hop 192.168.1.30 using egress ifc inside Result: input-interface: outside input-status: up input-line-status: up output-interface: inside output-status: up output-line-status: up Action: allow ciscofp3#
AnyConnect VPN을 통해 FTD에 성공적으로 연결하는 PC의 직원 PC에서 캡처한 내용
이 캡처의 뒷부분에서 DTLS 터널이 형성되는 것을 볼 수도 있습니다
AnyConnect PC가 VPN에 성공적으로 연결되는 것을 보여주는 FTD의 외부 인터페이스에서 캡처합니다.
참고: VPN을 통해 FTD의 외부 인터페이스에 연결할 때 'Server Hello' 패킷에서 FTD VPN Server 인증서를 볼 수 있습니다. 직원 PC에 루트 CA 인증서가 있고 FTD VPN 서버 인증서가 동일한 루트 CA에 의해 서명되었기 때문에 직원 PC는 이 인증서를 신뢰합니다.
사용자 이름 + 비밀번호가 올바른 경우 RADIUS 서버에 요청하는 FTD의 FTD에서 캡처(Cisco ISE)
위에서 볼 수 있듯이, VPN 연결은 Access-Accept를 받고 AnyConnect VPN 클라이언트는 VPN을 통해 FTD에 성공적으로 연결됩니다
사용자 이름 + 암호가 유효한지 Cisco ISE에 묻는 FTD의 캡처(CLI)(예: RADIUS 요청이 FTD와 ISE 간에 성공적으로 진행되고 있는지 확인하고 어떤 인터페이스에서 나가는지 확인)
ciscofp3# capture capout interface inside trace detail trace-count 100 [Capturing - 35607 bytes] ciscofp3# show cap ciscofp3# show cap capout | i 192.168.1.10 37: 01:23:52.264512 192.168.1.1.3238 > 192.168.1.10.1812: udp 659 38: 01:23:52.310210 192.168.1.10.1812 > 192.168.1.1.3238: udp 159 39: 01:23:52.311064 192.168.1.1.3238 > 192.168.1.10.1812: udp 659 40: 01:23:52.326734 192.168.1.10.1812 > 192.168.1.1.3238: udp 20 82: 01:23:52.737663 192.168.1.1.19500 > 192.168.1.10.1813: udp 714 85: 01:23:52.744483 192.168.1.10.1813 > 192.168.1.1.19500: udp 20
Cisco ISE RADIUS 서버 아래에 인증 이 성공 적으로 표시 됩니다. 성공적인 인증에 대한 세부 정보를 보려면 돋보기를 클릭합니다
HTTPS를 통해 내부 웹 사이트로 이동하는 직원 PC의 직원 PC의 AnyConnect 어댑터에서 캡처합니다(예: 성공적으로 VPN을 사용하는 동안).
디버그
모두 RADIUS 디버그
webvpn anyconnect 255 디버그
FTD 진단 CLI(>system support diagnostic-cli)에서 'debug radius all' 명령을 실행하고 Cisco Anyconnect Client의 Windows/Mac PC에서 'Connect'를 누르십시오.
> system support diagnostic-cli Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach. ciscofp3> enable Password: <hit enter> ciscofp3# terminal monitor ciscofp3# debug radius all <hit Connect on Anyconnect client on PC> radius mkreq: 0x15 alloc_rip 0x00002ace10875428 new request 0x15 --> 16 (0x00002ace10875428) got user 'jsmith' got password add_req 0x00002ace10875428 session 0x15 id 16 RADIUS_REQUEST radius.c: rad_mkpkt rad_mkpkt: ip:source-ip=198.51.100.2 RADIUS packet decode (authentication request) -------------------------------------- Raw packet data (length = 659)..... 01 10 02 93 fb 19 19 df f6 b1 c7 3e 34 fc 88 ce | ...........>4... 75 38 2d 55 01 08 6a 73 6d 69 74 68 02 12 a0 83 | u8-U..jsmith.... c9 bd ad 72 07 d1 bc 24 34 9e 63 a1 f5 93 05 06 | ...r...$4.c..... 00 00 50 00 1e 10 31 30 2e 32 30 31 2e 32 31 34 | ..P...198.51.100.2 2e 31 35 31 1f 10 31 30 2e 32 30 31 2e 32 31 34 | .151..198.51.100.2 2e 32 35 31 3d 06 00 00 00 05 42 10 31 30 2e 32 | .4=.....B.198. 30 31 2e 32 31 34 2e 32 35 31 1a 23 00 00 00 09 | 51.100.2#.... 01 1d 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 | ..mdm-tlv=device 2d 70 6c 61 74 66 6f 72 6d 3d 77 69 6e 1a 2c 00 | -platform=win.,. 00 00 09 01 26 6d 64 6d 2d 74 6c 76 3d 64 65 76 | ....&mdm-tlv=dev 69 63 65 2d 6d 61 63 3d 30 30 2d 30 63 2d 32 39 | ice-mac=00-0c-29 2d 33 37 2d 65 66 2d 62 66 1a 33 00 00 00 09 01 | -37-ef-bf.3..... 2d 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d | -mdm-tlv=device- 70 75 62 6c 69 63 2d 6d 61 63 3d 30 30 2d 30 63 | public-mac=00-0c 2d 32 39 2d 33 37 2d 65 66 2d 62 66 1a 3a 00 00 | -29-37-ef-bf.:.. 00 09 01 34 6d 64 6d 2d 74 6c 76 3d 61 63 2d 75 | ...4mdm-tlv=ac-u 73 65 72 2d 61 67 65 6e 74 3d 41 6e 79 43 6f 6e | ser-agent=AnyCon 6e 65 63 74 20 57 69 6e 64 6f 77 73 20 34 2e 36 | nect Windows 4.6 2e 30 33 30 34 39 1a 3f 00 00 00 09 01 39 6d 64 | .03049.?.....9md 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 6c 61 | m-tlv=device-pla 74 66 6f 72 6d 2d 76 65 72 73 69 6f 6e 3d 36 2e | tform-version=6. 31 2e 37 36 30 31 20 53 65 72 76 69 63 65 20 50 | 1.7601 Service P 61 63 6b 20 31 1a 40 00 00 00 09 01 3a 6d 64 6d | ack 1.@.....:mdm 2d 74 6c 76 3d 64 65 76 69 63 65 2d 74 79 70 65 | -tlv=device-type 3d 56 4d 77 61 72 65 2c 20 49 6e 63 2e 20 56 4d | =VMware, Inc. VM 77 61 72 65 20 56 69 72 74 75 61 6c 20 50 6c 61 | ware Virtual Pla 74 66 6f 72 6d 1a 5b 00 00 00 09 01 55 6d 64 6d | tform.[.....Umdm 2d 74 6c 76 3d 64 65 76 69 63 65 2d 75 69 64 3d | -tlv=device-uid= 33 36 39 33 43 36 34 30 37 43 39 32 35 32 35 31 | 3693C6407C925251 46 46 37 32 42 36 34 39 33 42 44 44 38 37 33 31 | FF72B6493BDD8731 38 41 42 46 43 39 30 43 36 32 31 35 34 32 43 33 | 8ABFC90C621542C3 38 46 41 46 38 37 38 45 46 34 39 36 31 34 41 31 | 8FAF878EF49614A1 04 06 00 00 00 00 1a 31 00 00 00 09 01 2b 61 75 | .......1.....+au 64 69 74 2d 73 65 73 73 69 6f 6e 2d 69 64 3d 30 | dit-session-id=0 61 63 39 64 36 38 61 30 30 30 30 35 30 30 30 35 | ac9d68a000050005 62 62 65 31 66 39 31 1a 23 00 00 00 09 01 1d 69 | bbe1f91.#......i 70 3a 73 6f 75 72 63 65 2d 69 70 3d 31 30 2e 32 | p:source-ip=192.1 30 31 2e 32 31 34 2e 32 35 31 1a 18 00 00 0c 04 | 68.10.50........ 92 12 46 54 44 41 6e 79 43 6f 6e 6e 65 63 74 56 | ..FTDAnyConnectV 50 4e 1a 0c 00 00 0c 04 96 06 00 00 00 02 1a 15 | PN.............. 00 00 00 09 01 0f 63 6f 61 2d 70 75 73 68 3d 74 | ......coa-push=t 72 75 65 | rue Parsed packet data..... Radius: Code = 1 (0x01) Radius: Identifier = 16 (0x10) Radius: Length = 659 (0x0293) Radius: Vector: FB1919DFF6B1C73E34FC88CE75382D55 Radius: Type = 1 (0x01) User-Name Radius: Length = 8 (0x08) Radius: Value (String) = 6a 73 6d 69 74 68 | jsmith Radius: Type = 2 (0x02) User-Password Radius: Length = 18 (0x12) Radius: Value (String) = a0 83 c9 bd ad 72 07 d1 bc 24 34 9e 63 a1 f5 93 | .....r...$4.c... Radius: Type = 5 (0x05) NAS-Port Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x5000 Radius: Type = 30 (0x1E) Called-Station-Id Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 31 35 31 | 203.0.113.2 Radius: Type = 31 (0x1F) Calling-Station-Id Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 31 | 198.51.100.2 Radius: Type = 61 (0x3D) NAS-Port-Type Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x5 Radius: Type = 66 (0x42) Tunnel-Client-Endpoint Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 31 | 198.51.100.2 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 35 (0x23) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 29 (0x1D) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 6c 61 74 66 6f 72 6d 3d 77 69 6e | latform=win Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 44 (0x2C) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 38 (0x26) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 6d | mdm-tlv=device-m 61 63 3d 30 30 2d 30 63 2d 32 39 2d 33 37 2d 65 | ac=00-0c-29-37-e 66 2d 62 66 | f-bf Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 51 (0x33) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 45 (0x2D) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 75 62 6c 69 63 2d 6d 61 63 3d 30 30 2d 30 63 2d | ublic-mac=00-0c- 32 39 2d 33 37 2d 65 66 2d 62 66 | 29-37-ef-bf Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 58 (0x3A) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 52 (0x34) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 61 63 2d 75 73 65 72 2d | mdm-tlv=ac-user- 61 67 65 6e 74 3d 41 6e 79 43 6f 6e 6e 65 63 74 | agent=AnyConnect 20 57 69 6e 64 6f 77 73 20 34 2e 36 2e 30 33 30 | Windows 4.6.030 34 39 | 49 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 63 (0x3F) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 57 (0x39) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 6c 61 74 66 6f 72 6d 2d 76 65 72 73 69 6f 6e 3d | latform-version= 36 2e 31 2e 37 36 30 31 20 53 65 72 76 69 63 65 | 6.1.7601 Service 20 50 61 63 6b 20 31 | Pack 1 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 64 (0x40) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 58 (0x3A) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 74 | mdm-tlv=device-t 79 70 65 3d 56 4d 77 61 72 65 2c 20 49 6e 63 2e | ype=VMware, Inc. 20 56 4d 77 61 72 65 20 56 69 72 74 75 61 6c 20 | VMware Virtual 50 6c 61 74 66 6f 72 6d | Platform Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 91 (0x5B) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 85 (0x55) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 75 | mdm-tlv=device-u 69 64 3d 33 36 39 33 43 36 34 30 37 43 39 32 35 | id=3693C6407C925 32 35 31 46 46 37 32 42 36 34 39 33 42 44 44 38 | 251FF72B6493BDD8 37 33 31 38 41 42 46 43 39 30 43 36 32 31 35 34 | 7318ABFC90C62154 32 43 33 38 46 41 46 38 37 38 45 46 34 39 36 31 | 2C38FAF878EF4961 34 41 31 | 4A1 Radius: Type = 4 (0x04) NAS-IP-Address Radius: Length = 6 (0x06) Radius: Value (IP Address) = 0.0.0.0 (0x00000000) Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 49 (0x31) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 43 (0x2B) Radius: Value (String) = 61 75 64 69 74 2d 73 65 73 73 69 6f 6e 2d 69 64 | audit-session-id 3d 30 61 63 39 64 36 38 61 30 30 30 30 35 30 30 | =0ac9d68a0000500 30 35 62 62 65 31 66 39 31 | 05bbe1f91 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 35 (0x23) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 29 (0x1D) Radius: Value (String) = 69 70 3a 73 6f 75 72 63 65 2d 69 70 3d 31 30 2e | ip:source-ip=192. 32 30 31 2e 32 31 34 2e 32 35 31 | 168.10.50 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 24 (0x18) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 146 (0x92) Tunnel-Group-Name Radius: Length = 18 (0x12) Radius: Value (String) = 46 54 44 41 6e 79 43 6f 6e 6e 65 63 74 56 50 4e | FTDAnyConnectVPN Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 12 (0x0C) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 150 (0x96) Client-Type Radius: Length = 6 (0x06) Radius: Value (Integer) = 2 (0x0002) Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 21 (0x15) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 15 (0x0F) Radius: Value (String) = 63 6f 61 2d 70 75 73 68 3d 74 72 75 65 | coa-push=true send pkt 192.168.1.10/1812 rip 0x00002ace10875428 state 7 id 16 rad_vrfy() : response message verified rip 0x00002ace10875428 : chall_state '' : state 0x7 : reqauth: fb 19 19 df f6 b1 c7 3e 34 fc 88 ce 75 38 2d 55 : info 0x00002ace10875568 session_id 0x15 request_id 0x10 user 'jsmith' response '***' app 0 reason 0 skey 'cisco123' sip 192.168.1.10 type 1 RADIUS packet decode (response) -------------------------------------- Raw packet data (length = 159)..... 02 10 00 9f 39 45 43 cf 05 be df 2f 24 d5 d7 05 | ....9EC..../$... 47 67 b4 fd 01 08 6a 73 6d 69 74 68 18 28 52 65 | Gg....jsmith.(Re 61 75 74 68 53 65 73 73 69 6f 6e 3a 30 61 63 39 | authSession:0ac9 64 36 38 61 30 30 30 30 35 30 30 30 35 62 62 65 | d68a000050005bbe 31 66 39 31 19 3b 43 41 43 53 3a 30 61 63 39 64 | 1f91.;CACS:0ac9d 36 38 61 30 30 30 30 35 30 30 30 35 62 62 65 31 | 68a000050005bbe1 66 39 31 3a 63 6f 72 62 69 6e 69 73 65 2f 33 32 | f91:corbinise/32 32 33 34 34 30 38 34 2f 31 39 33 31 36 38 32 1a | 2344084/1931682. 20 00 00 00 09 01 1a 70 72 6f 66 69 6c 65 2d 6e | ......profile-n 61 6d 65 3d 57 6f 72 6b 73 74 61 74 69 6f 6e | ame=Workstation Parsed packet data..... Radius: Code = 2 (0x02) Radius: Identifier = 16 (0x10) Radius: Length = 159 (0x009F) Radius: Vector: 394543CF05BEDF2F24D5D7054767B4FD Radius: Type = 1 (0x01) User-Name Radius: Length = 8 (0x08) Radius: Value (String) = 6a 73 6d 69 74 68 | jsmith Radius: Type = 24 (0x18) State Radius: Length = 40 (0x28) Radius: Value (String) = 52 65 61 75 74 68 53 65 73 73 69 6f 6e 3a 30 61 | ReauthSession:0a 63 39 64 36 38 61 30 30 30 30 35 30 30 30 35 62 | c9d68a000050005b 62 65 31 66 39 31 | be1f91 Radius: Type = 25 (0x19) Class Radius: Length = 59 (0x3B) Radius: Value (String) = 43 41 43 53 3a 30 61 63 39 64 36 38 61 30 30 30 | CACS:0ac9d68a000 30 35 30 30 30 35 62 62 65 31 66 39 31 3a 63 6f | 050005bbe1f91:co 72 62 69 6e 69 73 65 2f 33 32 32 33 34 34 30 38 | rbinise/32234408 34 2f 31 39 33 31 36 38 32 | 4/1931682 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 32 (0x20) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 26 (0x1A) Radius: Value (String) = 70 72 6f 66 69 6c 65 2d 6e 61 6d 65 3d 57 6f 72 | profile-name=Wor 6b 73 74 61 74 69 6f 6e | kstation rad_procpkt: ACCEPT Got AV-Pair with value profile-name=Workstation RADIUS_ACCESS_ACCEPT: normal termination radius mkreq: 0x16 alloc_rip 0x00002ace10874b80 new request 0x16 --> 17 (0x00002ace10874b80) got user 'jsmith' got password add_req 0x00002ace10874b80 session 0x16 id 17 RADIUS_DELETE remove_req 0x00002ace10875428 session 0x15 id 16 free_rip 0x00002ace10875428 RADIUS_REQUEST radius.c: rad_mkpkt rad_mkpkt: ip:source-ip=198.51.100.2 RADIUS packet decode (authentication request) -------------------------------------- Raw packet data (length = 659)..... 01 11 02 93 c6 fc 11 c1 0e c4 81 ac 09 a7 85 a8 | ................ 83 c1 e4 88 01 08 6a 73 6d 69 74 68 02 12 79 41 | ......jsmith..yA 0e 71 13 38 ae 9f 49 be 3c a9 e4 81 65 93 05 06 | .q.8..I.<...e... 00 00 50 00 1e 10 31 30 2e 32 30 31 2e 32 31 34 | ..P...203.0.113 2e 31 35 31 1f 10 31 30 2e 32 30 31 2e 32 31 34 | .2..203.0.113 2e 32 35 31 3d 06 00 00 00 05 42 10 31 30 2e 32 | .2=.....<ip addr 30 31 2e 32 31 34 2e 32 35 31 1a 23 00 00 00 09 | ess>.#.... 01 1d 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 | ..mdm-tlv=device 2d 70 6c 61 74 66 6f 72 6d 3d 77 69 6e 1a 2c 00 | -platform=win.,. 00 00 09 01 26 6d 64 6d 2d 74 6c 76 3d 64 65 76 | ....&mdm-tlv=dev 69 63 65 2d 6d 61 63 3d 30 30 2d 30 63 2d 32 39 | ice-mac=00-0c-29 2d 33 37 2d 65 66 2d 62 66 1a 33 00 00 00 09 01 | -37-ef-bf.3..... 2d 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d | -mdm-tlv=device- 70 75 62 6c 69 63 2d 6d 61 63 3d 30 30 2d 30 63 | public-mac=00-0c 2d 32 39 2d 33 37 2d 65 66 2d 62 66 1a 3a 00 00 | -29-37-ef-bf.:.. 00 09 01 34 6d 64 6d 2d 74 6c 76 3d 61 63 2d 75 | ...4mdm-tlv=ac-u 73 65 72 2d 61 67 65 6e 74 3d 41 6e 79 43 6f 6e | ser-agent=AnyCon 6e 65 63 74 20 57 69 6e 64 6f 77 73 20 34 2e 36 | nect Windows 4.6 2e 30 33 30 34 39 1a 3f 00 00 00 09 01 39 6d 64 | .03049.?.....9md 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 6c 61 | m-tlv=device-pla 74 66 6f 72 6d 2d 76 65 72 73 69 6f 6e 3d 36 2e | tform-version=6. 31 2e 37 36 30 31 20 53 65 72 76 69 63 65 20 50 | 1.7601 Service P 61 63 6b 20 31 1a 40 00 00 00 09 01 3a 6d 64 6d | ack 1.@.....:mdm 2d 74 6c 76 3d 64 65 76 69 63 65 2d 74 79 70 65 | -tlv=device-type 3d 56 4d 77 61 72 65 2c 20 49 6e 63 2e 20 56 4d | =VMware, Inc. VM 77 61 72 65 20 56 69 72 74 75 61 6c 20 50 6c 61 | ware Virtual Pla 74 66 6f 72 6d 1a 5b 00 00 00 09 01 55 6d 64 6d | tform.[.....Umdm 2d 74 6c 76 3d 64 65 76 69 63 65 2d 75 69 64 3d | -tlv=device-uid= 33 36 39 33 43 36 34 30 37 43 39 32 35 32 35 31 | 3693C6407C925251 46 46 37 32 42 36 34 39 33 42 44 44 38 37 33 31 | FF72B6493BDD8731 38 41 42 46 43 39 30 43 36 32 31 35 34 32 43 33 | 8ABFC90C621542C3 38 46 41 46 38 37 38 45 46 34 39 36 31 34 41 31 | 8FAF878EF49614A1 04 06 00 00 00 00 1a 31 00 00 00 09 01 2b 61 75 | .......1.....+au 64 69 74 2d 73 65 73 73 69 6f 6e 2d 69 64 3d 30 | dit-session-id=0 61 63 39 64 36 38 61 30 30 30 30 35 30 30 30 35 | ac9d68a000050005 62 62 65 31 66 39 31 1a 23 00 00 00 09 01 1d 69 | bbe1f91.#......i 70 3a 73 6f 75 72 63 65 2d 69 70 3d 31 30 2e 32 | p:source-ip=192.1 30 31 2e 32 31 34 2e 32 35 31 1a 18 00 00 0c 04 | 68.10.50...... 92 12 46 54 44 41 6e 79 43 6f 6e 6e 65 63 74 56 | ..FTDAnyConnectV 50 4e 1a 0c 00 00 0c 04 96 06 00 00 00 02 1a 15 | PN.............. 00 00 00 09 01 0f 63 6f 61 2d 70 75 73 68 3d 74 | ......coa-push=t 72 75 65 | rue Parsed packet data..... Radius: Code = 1 (0x01) Radius: Identifier = 17 (0x11) Radius: Length = 659 (0x0293) Radius: Vector: C6FC11C10EC481AC09A785A883C1E488 Radius: Type = 1 (0x01) User-Name Radius: Length = 8 (0x08) Radius: Value (String) = 6a 73 6d 69 74 68 | jsmith Radius: Type = 2 (0x02) User-Password Radius: Length = 18 (0x12) Radius: Value (String) = 79 41 0e 71 13 38 ae 9f 49 be 3c a9 e4 81 65 93 | yA.q.8..I.<...e. Radius: Type = 5 (0x05) NAS-Port Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x5000 Radius: Type = 30 (0x1E) Called-Station-Id Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 31 35 31 | 203.0.113.2 Radius: Type = 31 (0x1F) Calling-Station-Id Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 31 | 198.51.100.2 Radius: Type = 61 (0x3D) NAS-Port-Type Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x5 Radius: Type = 66 (0x42) Tunnel-Client-Endpoint Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 31 | 198.51.100.2 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 35 (0x23) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 29 (0x1D) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 6c 61 74 66 6f 72 6d 3d 77 69 6e | latform=win Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 44 (0x2C) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 38 (0x26) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 6d | mdm-tlv=device-m 61 63 3d 30 30 2d 30 63 2d 32 39 2d 33 37 2d 65 | ac=00-0c-29-37-e 66 2d 62 66 | f-bf Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 51 (0x33) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 45 (0x2D) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 75 62 6c 69 63 2d 6d 61 63 3d 30 30 2d 30 63 2d | ublic-mac=00-0c- 32 39 2d 33 37 2d 65 66 2d 62 66 | 29-37-ef-bf Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 58 (0x3A) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 52 (0x34) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 61 63 2d 75 73 65 72 2d | mdm-tlv=ac-user- 61 67 65 6e 74 3d 41 6e 79 43 6f 6e 6e 65 63 74 | agent=AnyConnect 20 57 69 6e 64 6f 77 73 20 34 2e 36 2e 30 33 30 | Windows 4.6.030 34 39 | 49 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 63 (0x3F) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 57 (0x39) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 6c 61 74 66 6f 72 6d 2d 76 65 72 73 69 6f 6e 3d | latform-version= 36 2e 31 2e 37 36 30 31 20 53 65 72 76 69 63 65 | 6.1.7601 Service 20 50 61 63 6b 20 31 | Pack 1 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 64 (0x40) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 58 (0x3A) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 74 | mdm-tlv=device-t 79 70 65 3d 56 4d 77 61 72 65 2c 20 49 6e 63 2e | ype=VMware, Inc. 20 56 4d 77 61 72 65 20 56 69 72 74 75 61 6c 20 | VMware Virtual 50 6c 61 74 66 6f 72 6d | Platform Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 91 (0x5B) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 85 (0x55) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 75 | mdm-tlv=device-u 69 64 3d 33 36 39 33 43 36 34 30 37 43 39 32 35 | id=3693C6407C925 32 35 31 46 46 37 32 42 36 34 39 33 42 44 44 38 | 251FF72B6493BDD8 37 33 31 38 41 42 46 43 39 30 43 36 32 31 35 34 | 7318ABFC90C62154 32 43 33 38 46 41 46 38 37 38 45 46 34 39 36 31 | 2C38FAF878EF4961 34 41 31 | 4A1 Radius: Type = 4 (0x04) NAS-IP-Address Radius: Length = 6 (0x06) Radius: Value (IP Address) = 0.0.0.0 (0x00000000) Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 49 (0x31) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 43 (0x2B) Radius: Value (String) = 61 75 64 69 74 2d 73 65 73 73 69 6f 6e 2d 69 64 | audit-session-id 3d 30 61 63 39 64 36 38 61 30 30 30 30 35 30 30 | =0ac9d68a0000500 30 35 62 62 65 31 66 39 31 | 05bbe1f91 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 35 (0x23) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 29 (0x1D) Radius: Value (String) = 69 70 3a 73 6f 75 72 63 65 2d 69 70 3d 31 30 2e | ip:source-ip=192. 32 30 31 2e 32 31 34 2e 32 35 31 | 168.10.50 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 24 (0x18) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 146 (0x92) Tunnel-Group-Name Radius: Length = 18 (0x12) Radius: Value (String) = 46 54 44 41 6e 79 43 6f 6e 6e 65 63 74 56 50 4e | FTDAnyConnectVPN Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 12 (0x0C) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 150 (0x96) Client-Type Radius: Length = 6 (0x06) Radius: Value (Integer) = 2 (0x0002) Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 21 (0x15) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 15 (0x0F) Radius: Value (String) = 63 6f 61 2d 70 75 73 68 3d 74 72 75 65 | coa-push=true send pkt 192.168.1.10/1812 rip 0x00002ace10874b80 state 7 id 17 rad_vrfy() : response message verified rip 0x00002ace10874b80 : chall_state '' : state 0x7 : reqauth: c6 fc 11 c1 0e c4 81 ac 09 a7 85 a8 83 c1 e4 88 : info 0x00002ace10874cc0 session_id 0x16 request_id 0x11 user 'jsmith' response '***' app 0 reason 0 skey 'cisco123' sip 192.168.1.10 type 1 RADIUS packet decode (response) -------------------------------------- Raw packet data (length = 20)..... 03 11 00 14 15 c3 44 44 7d a6 07 0d 7b 92 f2 3b | ......DD}...{..; 0b 06 ba 74 | ...t Parsed packet data..... Radius: Code = 3 (0x03) Radius: Identifier = 17 (0x11) Radius: Length = 20 (0x0014) Radius: Vector: 15C344447DA6070D7B92F23B0B06BA74 rad_procpkt: REJECT RADIUS_DELETE remove_req 0x00002ace10874b80 session 0x16 id 17 free_rip 0x00002ace10874b80 radius: send queue empty radius mkreq: 0x18 alloc_rip 0x00002ace10874b80 new request 0x18 --> 18 (0x00002ace10874b80) add_req 0x00002ace10874b80 session 0x18 id 18 ACCT_REQUEST radius.c: rad_mkpkt RADIUS packet decode (accounting request) -------------------------------------- Raw packet data (length = 714)..... 04 12 02 ca be a0 6e 46 71 af 5c 65 82 77 c7 b5 | ......nFq.\e.w.. 50 78 61 d7 01 08 6a 73 6d 69 74 68 05 06 00 00 | Pxa...jsmith.... 50 00 06 06 00 00 00 02 07 06 00 00 00 01 08 06 | P............... c0 a8 0a 32 19 3b 43 41 43 53 3a 30 61 63 39 64 | ...2.;CACS:0ac9d 36 38 61 30 30 30 30 35 30 30 30 35 62 62 65 31 | 68a000050005bbe1 66 39 31 3a 63 6f 72 62 69 6e 69 73 65 2f 33 32 | f91:corbinise/32 32 33 34 34 30 38 34 2f 31 39 33 31 36 38 32 1e | 2344084/1931682. 10 31 30 2e 32 30 31 2e 32 31 34 2e 31 35 31 1f | .203.0.113.2. 10 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 31 28 | .198.51.100.2( 06 00 00 00 01 29 06 00 00 00 00 2c 0a 43 31 46 | .....).....,.C1F 30 30 30 30 35 2d 06 00 00 00 01 3d 06 00 00 00 | 00005-.....=.... 05 42 10 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 | .B.203.0.113.2 31 1a 18 00 00 0c 04 92 12 46 54 44 41 6e 79 43 | ........FTDAnyC 6f 6e 6e 65 63 74 56 50 4e 1a 0c 00 00 0c 04 96 | onnectVPN....... 06 00 00 00 02 1a 0c 00 00 0c 04 97 06 00 00 00 | ................ 01 1a 0c 00 00 0c 04 98 06 00 00 00 03 1a 23 00 | ..............#. 00 00 09 01 1d 6d 64 6d 2d 74 6c 76 3d 64 65 76 | .....mdm-tlv=dev 69 63 65 2d 70 6c 61 74 66 6f 72 6d 3d 77 69 6e | ice-platform=win 1a 2c 00 00 00 09 01 26 6d 64 6d 2d 74 6c 76 3d | .,.....&mdm-tlv= 64 65 76 69 63 65 2d 6d 61 63 3d 30 30 2d 30 63 | device-mac=00-0c 2d 32 39 2d 33 37 2d 65 66 2d 62 66 1a 31 00 00 | -29-37-ef-bf.1.. 00 09 01 2b 61 75 64 69 74 2d 73 65 73 73 69 6f | ...+audit-sessio 6e 2d 69 64 3d 30 61 63 39 64 36 38 61 30 30 30 | n-id=0ac9d68a000 30 35 30 30 30 35 62 62 65 31 66 39 31 1a 33 00 | 050005bbe1f91.3. 00 00 09 01 2d 6d 64 6d 2d 74 6c 76 3d 64 65 76 | ....-mdm-tlv=dev 69 63 65 2d 70 75 62 6c 69 63 2d 6d 61 63 3d 30 | ice-public-mac=0 30 2d 30 63 2d 32 39 2d 33 37 2d 65 66 2d 62 66 | 0-0c-29-37-ef-bf 1a 3a 00 00 00 09 01 34 6d 64 6d 2d 74 6c 76 3d | .:.....4mdm-tlv= 61 63 2d 75 73 65 72 2d 61 67 65 6e 74 3d 41 6e | ac-user-agent=An 79 43 6f 6e 6e 65 63 74 20 57 69 6e 64 6f 77 73 | yConnect Windows 20 34 2e 36 2e 30 33 30 34 39 1a 3f 00 00 00 09 | 4.6.03049.?.... 01 39 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 | .9mdm-tlv=device 2d 70 6c 61 74 66 6f 72 6d 2d 76 65 72 73 69 6f | -platform-versio 6e 3d 36 2e 31 2e 37 36 30 31 20 53 65 72 76 69 | n=6.1.7601 Servi 63 65 20 50 61 63 6b 20 31 1a 40 00 00 00 09 01 | ce Pack 1.@..... 3a 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d | :mdm-tlv=device- 74 79 70 65 3d 56 4d 77 61 72 65 2c 20 49 6e 63 | type=VMware, Inc 2e 20 56 4d 77 61 72 65 20 56 69 72 74 75 61 6c | . VMware Virtual 20 50 6c 61 74 66 6f 72 6d 1a 5b 00 00 00 09 01 | Platform.[..... 55 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d | Umdm-tlv=device- 75 69 64 3d 33 36 39 33 43 36 34 30 37 43 39 32 | uid=3693C6407C92 35 32 35 31 46 46 37 32 42 36 34 39 33 42 44 44 | 5251FF72B6493BDD 38 37 33 31 38 41 42 46 43 39 30 43 36 32 31 35 | 87318ABFC90C6215 34 32 43 33 38 46 41 46 38 37 38 45 46 34 39 36 | 42C38FAF878EF496 31 34 41 31 04 06 00 00 00 00 | 14A1...... Parsed packet data..... Radius: Code = 4 (0x04) Radius: Identifier = 18 (0x12) Radius: Length = 714 (0x02CA) Radius: Vector: BEA06E4671AF5C658277C7B5507861D7 Radius: Type = 1 (0x01) User-Name Radius: Length = 8 (0x08) Radius: Value (String) = 6a 73 6d 69 74 68 | jsmith Radius: Type = 5 (0x05) NAS-Port Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x5000 Radius: Type = 6 (0x06) Service-Type Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x2 Radius: Type = 7 (0x07) Framed-Protocol Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x1 Radius: Type = 8 (0x08) Framed-IP-Address Radius: Length = 6 (0x06) Radius: Value (IP Address) = 192.168.10.50 (0xC0A80A32) Radius: Type = 25 (0x19) Class Radius: Length = 59 (0x3B) Radius: Value (String) = 43 41 43 53 3a 30 61 63 39 64 36 38 61 30 30 30 | CACS:0ac9d68a000 30 35 30 30 30 35 62 62 65 31 66 39 31 3a 63 6f | 050005bbe1f91:co 72 62 69 6e 69 73 65 2f 33 32 32 33 34 34 30 38 | rbinise/32234408 34 2f 31 39 33 31 36 38 32 | 4/1931682 Radius: Type = 30 (0x1E) Called-Station-Id Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 31 35 31 | 203.0.113.2 Radius: Type = 31 (0x1F) Calling-Station-Id Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 31 | 198.51.100.2 Radius: Type = 40 (0x28) Acct-Status-Type Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x1 Radius: Type = 41 (0x29) Acct-Delay-Time Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x0 Radius: Type = 44 (0x2C) Acct-Session-Id Radius: Length = 10 (0x0A) Radius: Value (String) = 43 31 46 30 30 30 30 35 | C1F00005 Radius: Type = 45 (0x2D) Acct-Authentic Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x1 Radius: Type = 61 (0x3D) NAS-Port-Type Radius: Length = 6 (0x06) Radius: Value (Hex) = 0x5 Radius: Type = 66 (0x42) Tunnel-Client-Endpoint Radius: Length = 16 (0x10) Radius: Value (String) = 31 30 2e 32 30 31 2e 32 31 34 2e 32 35 31 | 198.51.100.2 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 24 (0x18) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 146 (0x92) Tunnel-Group-Name Radius: Length = 18 (0x12) Radius: Value (String) = 46 54 44 41 6e 79 43 6f 6e 6e 65 63 74 56 50 4e | FTDAnyConnectVPN Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 12 (0x0C) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 150 (0x96) Client-Type Radius: Length = 6 (0x06) Radius: Value (Integer) = 2 (0x0002) Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 12 (0x0C) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 151 (0x97) VPN-Session-Type Radius: Length = 6 (0x06) Radius: Value (Integer) = 1 (0x0001) Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 12 (0x0C) Radius: Vendor ID = 3076 (0x00000C04) Radius: Type = 152 (0x98) VPN-Session-Subtype Radius: Length = 6 (0x06) Radius: Value (Integer) = 3 (0x0003) Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 35 (0x23) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 29 (0x1D) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 6c 61 74 66 6f 72 6d 3d 77 69 6e | latform=win Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 44 (0x2C) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 38 (0x26) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 6d | mdm-tlv=device-m 61 63 3d 30 30 2d 30 63 2d 32 39 2d 33 37 2d 65 | ac=00-0c-29-37-e 66 2d 62 66 | f-bf Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 49 (0x31) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 43 (0x2B) Radius: Value (String) = 61 75 64 69 74 2d 73 65 73 73 69 6f 6e 2d 69 64 | audit-session-id 3d 30 61 63 39 64 36 38 61 30 30 30 30 35 30 30 | =0ac9d68a0000500 30 35 62 62 65 31 66 39 31 | 05bbe1f91 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 51 (0x33) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 45 (0x2D) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 75 62 6c 69 63 2d 6d 61 63 3d 30 30 2d 30 63 2d | ublic-mac=00-0c- 32 39 2d 33 37 2d 65 66 2d 62 66 | 29-37-ef-bf Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 58 (0x3A) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 52 (0x34) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 61 63 2d 75 73 65 72 2d | mdm-tlv=ac-user- 61 67 65 6e 74 3d 41 6e 79 43 6f 6e 6e 65 63 74 | agent=AnyConnect 20 57 69 6e 64 6f 77 73 20 34 2e 36 2e 30 33 30 | Windows 4.6.030 34 39 | 49 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 63 (0x3F) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 57 (0x39) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 70 | mdm-tlv=device-p 6c 61 74 66 6f 72 6d 2d 76 65 72 73 69 6f 6e 3d | latform-version= 36 2e 31 2e 37 36 30 31 20 53 65 72 76 69 63 65 | 6.1.7601 Service 20 50 61 63 6b 20 31 | Pack 1 Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 64 (0x40) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 58 (0x3A) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 74 | mdm-tlv=device-t 79 70 65 3d 56 4d 77 61 72 65 2c 20 49 6e 63 2e | ype=VMware, Inc. 20 56 4d 77 61 72 65 20 56 69 72 74 75 61 6c 20 | VMware Virtual 50 6c 61 74 66 6f 72 6d | Platform Radius: Type = 26 (0x1A) Vendor-Specific Radius: Length = 91 (0x5B) Radius: Vendor ID = 9 (0x00000009) Radius: Type = 1 (0x01) Cisco-AV-pair Radius: Length = 85 (0x55) Radius: Value (String) = 6d 64 6d 2d 74 6c 76 3d 64 65 76 69 63 65 2d 75 | mdm-tlv=device-u 69 64 3d 33 36 39 33 43 36 34 30 37 43 39 32 35 | id=3693C6407C925 32 35 31 46 46 37 32 42 36 34 39 33 42 44 44 38 | 251FF72B6493BDD8 37 33 31 38 41 42 46 43 39 30 43 36 32 31 35 34 | 7318ABFC90C62154 32 43 33 38 46 41 46 38 37 38 45 46 34 39 36 31 | 2C38FAF878EF4961 34 41 31 | 4A1 Radius: Type = 4 (0x04) NAS-IP-Address Radius: Length = 6 (0x06) Radius: Value (IP Address) = 0.0.0.0 (0x00000000) send pkt 192.168.1.10/1813 rip 0x00002ace10874b80 state 6 id 18 rad_vrfy() : response message verified rip 0x00002ace10874b80 : chall_state '' : state 0x6 : reqauth: be a0 6e 46 71 af 5c 65 82 77 c7 b5 50 78 61 d7 : info 0x00002ace10874cc0 session_id 0x18 request_id 0x12 user 'jsmith' response '***' app 0 reason 0 skey 'cisco123' sip 192.168.1.10 type 3 RADIUS packet decode (response) -------------------------------------- Raw packet data (length = 20)..... 05 12 00 14 e5 fd b1 6d fb ee 58 f0 89 79 73 8e | .......m..X..ys. 90 dc a7 20 | ... Parsed packet data..... Radius: Code = 5 (0x05) Radius: Identifier = 18 (0x12) Radius: Length = 20 (0x0014) Radius: Vector: E5FDB16DFBEE58F08979738E90DCA720 rad_procpkt: ACCOUNTING_RESPONSE RADIUS_DELETE remove_req 0x00002ace10874b80 session 0x18 id 18 free_rip 0x00002ace10874b80 radius: send queue empty ciscofp3#
FTD 진단 CLI(>system support diagnostic-cli)에서 'debug webvpn anyconnect 255' 명령을 실행하고 Cisco Anyconnect Client의 Windows/Mac PC에서 'Connect'를 누르십시오.
> system support diagnostic-cli Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach. ciscofp3> enable Password: <hit enter> ciscofp3# terminal monitor ciscofp3# debug webvpn anyconnect 255 <hit Connect on Anyconnect client on PC> http_parse_cstp_method() ...input: 'CONNECT /CSCOSSLC/tunnel HTTP/1.1' webvpn_cstp_parse_request_field() ...input: 'Host: ciscofp3.cisco.com' Processing CSTP header line: 'Host: ciscofp3.cisco.com' webvpn_cstp_parse_request_field() ...input: 'User-Agent: Cisco AnyConnect VPN Agent for Windows 4.6.03049' Processing CSTP header line: 'User-Agent: Cisco AnyConnect VPN Agent for Windows 4.6.03049' Setting user-agent to: 'Cisco AnyConnect VPN Agent for Windows 4.6.03049' webvpn_cstp_parse_request_field() ...input: 'Cookie: webvpn=2B0E85@28672@6501@2FF4AE4D1F69B98F26E8CAD62D5496E5E6AE5282' Processing CSTP header line: 'Cookie: webvpn=2B0E85@28672@6501@2FF4AE4D1F69B98F26E8CAD62D5496E5E6AE5282' Found WebVPN cookie: 'webvpn=2B0E85@28672@6501@2FF4AE4D1F69B98F26E8CAD62D5496E5E6AE5282' WebVPN Cookie: 'webvpn=2B0E85@28672@6501@2FF4AE4D1F69B98F26E8CAD62D5496E5E6AE5282' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Version: 1' Processing CSTP header line: 'X-CSTP-Version: 1' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Hostname: jsmith-PC' Processing CSTP header line: 'X-CSTP-Hostname: jsmith-PC' Setting hostname to: 'jsmith-PC' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-MTU: 1399' Processing CSTP header line: 'X-CSTP-MTU: 1399' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Address-Type: IPv6,IPv4' Processing CSTP header line: 'X-CSTP-Address-Type: IPv6,IPv4' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Local-Address-IP4: 198.51.100.2' Processing CSTP header line: 'X-CSTP-Local-Address-IP4: 198.51.100.2' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Base-MTU: 1500' Processing CSTP header line: 'X-CSTP-Base-MTU: 1500' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Remote-Address-IP4: 203.0.113.2' Processing CSTP header line: 'X-CSTP-Remote-Address-IP4: 203.0.113.2' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Full-IPv6-Capability: true' Processing CSTP header line: 'X-CSTP-Full-IPv6-Capability: true' webvpn_cstp_parse_request_field() ...input: 'X-DTLS-Master-Secret: 1FA92A96D5E82C13CB3A5758F11371EE6B54C6F36F0A8DCE8F4DECB73A034EEF4FE95DA614A5872E1EE5557C3BF4765A' Processing CSTP header line: 'X-DTLS-Master-Secret: 1FA92A96D5E82C13CB3A5758F11371EE6B54C6F36F0A8DCE8F4DECB73A034EEF4FE95DA614A5872E1EE5557C3BF4765A' webvpn_cstp_parse_request_field() ...input: 'X-DTLS-CipherSuite: DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:AES256-SHA:AES128-SHA:DES-CBC3-SHA' Processing CSTP header line: 'X-DTLS-CipherSuite: DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:AES256-SHA:AES128-SHA:DES-CBC3-SHA' webvpn_cstp_parse_request_field() ...input: 'X-DTLS-Accept-Encoding: lzs' Processing CSTL header line: 'X-DTLS-Accept-Encoding: lzs' webvpn_cstp_parse_request_field() ...input: 'X-DTLS-Header-Pad-Length: 0' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Accept-Encoding: lzs,deflate' Processing CSTP header line: 'X-CSTP-Accept-Encoding: lzs,deflate' webvpn_cstp_parse_request_field() ...input: 'X-CSTP-Protocol: Copyright (c) 2004 Cisco Systems, Inc.' Processing CSTP header line: 'X-CSTP-Protocol: Copyright (c) 2004 Cisco Systems, Inc.' cstp_util_address_ipv4_accept: address asigned: 192.168.10.50 cstp_util_address_ipv6_accept: No IPv6 Address np_svc_create_session(0x7000, 0x00002acdff1d6440, TRUE) webvpn_svc_np_setup SVC ACL Name: NULL SVC ACL ID: -1 vpn_put_uauth success for ip 192.168.10.50! No SVC ACL Iphdr=20 base-mtu=1500 def-mtu=1500 conf-mtu=1406 tcp-mss = 1460 path-mtu = 1460(mss) TLS Block size = 16, version = 0x303 mtu = 1460(path-mtu) - 0(opts) - 5(ssl) - 16(iv) = 1439 mod-mtu = 1439(mtu) & 0xfff0(complement) = 1424 tls-mtu = 1424(mod-mtu) - 8(cstp) - 48(mac) - 1(pad) = 1367 DTLS Block size = 16 mtu = 1500(base-mtu) - 20(ip) - 8(udp) - 13(dtlshdr) - 16(dtlsiv) = 1443 mod-mtu = 1443(mtu) & 0xfff0(complement) = 1440 dtls-mtu = 1440(mod-mtu) - 1(cdtp) - 20(mac) - 1(pad) = 1418 computed tls-mtu=1367 dtls-mtu=1418 conf-mtu=1406 DTLS enabled for intf=3 (outside) overide computed dtls-mtu=1418 with conf-mtu=1406 tls-mtu=1367 dtls-mtu=1406 SVC: adding to sessmgmt Sending X-CSTP-MTU: 1367 Sending X-DTLS-MTU: 1406 Sending X-CSTP-FW-RULE msgs: Start Sending X-CSTP-FW-RULE msgs: Done Sending X-CSTP-Quarantine: false Sending X-CSTP-Disable-Always-On-VPN: false Sending X-CSTP-Client-Bypass-Protocol: false
Cisco ISE > 운영 > RADIUS > 라이브 로그 > 각 인증의 세부 정보를 클릭 합니다
Cisco ISE에서 VPN 로그인을 확인하고 ACL 결과 'PermitAccess'가 주어집니다.
라이브 로그에는 VPN을 통해 FTD에 인증된 jsmith가 표시됩니다.
DART 번들
Cisco ISE, FTD, Windows Server 2012 및 Windows/Mac PC가 모두 정방향 및 역방향으로 확인할 수 있는지 확인합니다(모든 디바이스에서 DNS 확인).
윈도 PC
명령 프롬프트를 시작하고 FTD의 호스트 이름에 대해 'nslookup'을 수행할 수 있는지 확인합니다.
FTD CLI
>show network
> nslookup 192.168.1.10 Server: 192.168.1.10 Address: 192.168.1.10#53 10.1.168.192.in-addr.arpa name = ciscoise.cisco.com
ISE CLI:
ciscoise/admin# nslookup 192.168.1.20 Trying "20.1.168.192.in-addr.arpa" ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56529 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;20.1.168.192.in-addr.arpa. IN PTR ;; ANSWER SECTION: 20.1.168.192.in-addr.arpa. 1200 IN PTR ciscodc.cisco.com
Windows Server 2012
명령 프롬프트를 시작하고 FTD의 호스트 이름/FQDN에서 'nslookup'을 수행할 수 있는지 확인합니다.
Windows Server 2012가 인증서를 SHA256 이상으로 서명하는지 확인합니다. Windows에서 루트 CA 인증서를 두 번 클릭하고 '서명 알고리즘' 필드를 확인합니다.
SHA1인 경우 대부분의 브라우저에는 해당 인증서에 대한 브라우저 경고가 표시됩니다. 변경하려면 다음을 확인할 수 있습니다.
Windows Server 인증 기관을 SHA256으로 업그레이드하는 방법
브라우저에서 FTD에 연결할 때 FTD VPN 서버 인증서에 다음 필드가 올바른지 확인합니다
공용 이름 = <FTDFQDN>
주체 대체 이름(SAN) = <FTDFQDN>
예:
일반 이름: ciscofp3.cisco.com
주체 대체 이름(SAN): DNS 이름=cicscofp3.cisco.com
FTD CLI에서 캡처를 사용하여 확인하고 Wireshark를 사용하여 직원 PC에서 캡처하여 패킷이 TCP+UDP 443을 통해 FTD의 외부 IP로 전송되는지 확인합니다. 해당 패킷이 직원의 홈 라우터의 공용 IP 주소에서 소싱되는지 확인합니다
ciscofp3# capture capin interface outside trace detail trace-count 100 match ip any host<now hit Connect on AnyConnect Client from employee PC>
ciscofp3# show cap capture capin type raw-data trace detail trace-count 100 interface outside [Buffer Full - 524153 bytes] match ip any host 198.51.100.2
ciscofp3# show cap capin
2375 packets captured
1: 17:05:56.580994 198.51.100.2.55928 > 203.0.113.2.443: S 2933933902:2933933902(0) win 8192
2: 17:05:56.581375 203.0.113.2.443 > 198.51.100.2.55928: S 430674106:430674106(0) ack 2933933903 win 32768
3: 17:05:56.581757 198.51.100.2.55928 > 203.0.113.2.443: . ack 430674107 win 64240
...
개정 | 게시 날짜 | 의견 |
---|---|---|
1.0 |
14-Nov-2018 |
최초 릴리스 |