MX 16.16 Always On Anyconnect VPN

ToryDav
Building a reputation

MX 16.16 Always On Anyconnect VPN

Hi,

Client is looking to use Always on and trusted network to enforce VPN to connect when users are from home and when they are in the office they don't want to have them to be prompted.

I followed the instructions provided here https://documentation.meraki.com/MX/Client_VPN/AnyConnect_on_the_MX_Appliance/Client_deployment#AnyC...

But the profile shown uses cisco.com for the dns suffix. My guess is this is because its just an example. But this doesn't work when I test it using customer dns suffix and dns servers.

 
 

ToryDav_2-1663954515412.png


We are using auto-generate certificates and DDNS, is this even possible or do I need custom hostname certificates? 

UPDATE - I did get this working for basic Meraki Authentication, Always on and Trusted Network Detection, but I need it to work with SAML (Azure AD).
 
When on an untrusted network, SAML not be able to reach single sign on web page for Azure AD because Internet access is blocked, so it doesn't allow you to even attempt to authenticate. I will keep at it and update if I find a solution.

 

2 REPLIES 2
Periklis
Conversationalist

Hi @ToryDav ,

 

I experienced the same issue and i was able to find a solution. The reason why this is happening is because all internet traffic is blocked until there is a successful VPN connection.

 

In order to push from your MX a custom DNS suffix to your client devices, please review this

 

Regarding the SSO issue, there is a feature  under preferences part 2 of your screenshot "Allow access to the following hosts.." that allows you to include URLs, which will be accessible before there is an established VPN connection. I run packet captures and filtered the traffic to capture the the URLs used for Azure AD SSO, and i added them to the profile. login.microsoftonline.com works for authentication, login.live.com works for password resets.

 

Please see sample XML below. There is no enforcement of "Always On" policy with this; whenever users connect to an unknown network, the get prompted through the anyconnect SSO popup authenticate and start a VPN connection; they can browse the internet with or without an established VPN connection. Always On can always be enabled, it will work as well, however, the only accessible hosts before a VPN connection gets established, will be the ones under Allowed Hosts.

 

<AutomaticVPNPolicy>true

<TrustedDNSDomains> Connection Specific DNS Suffix</TrustedDNSDomains>

<TrustedNetworkPolicy>Disconnect</TrustedNetworkPolicy>

<UntrustedNetworkPolicy>Connect</UntrustedNetworkPolicy>

<AlwaysOn>false

<ConnectFailurePolicy>Open

<AllowCaptivePortalRemediation>true

<CaptivePortalRemediationTimeout>5</CaptivePortalRemediationTimeout>

</AllowCaptivePortalRemediation>

<ApplyLastVPNLocalResourceRules>false</ApplyLastVPNLocalResourceRules>

</ConnectFailurePolicy>

<AllowVPNDisconnect>true</AllowVPNDisconnect>

<AllowedHosts>login.microsoftonline.com,login.live.com</AllowedHosts>

</AlwaysOn>

</AutomaticVPNPolicy>

That is great work/discovery. Built the profile as you indicated but when the SSO window opens to allow for entry of e-mail address it just greys out like it is doing something but never does.  Did the allowed host list change?

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels