I've been beating my head against this problem and doesn't seem the obvious reason why it doesn't work.
1841 router running C1841-ADVSECURITYK9-M), Version 12.4(24)T is configured for SSL VPN. My web portal seems to be entirely OK but when I click on launching SVC it starts, but no prompt for username/password is seen. In the status line of AnyConnect Client I see "Unable to process response from x.x.x.x"
This is the portion of the config responsible for clientless and client based VPN access:
webvpn gateway WEBVPN hostname GIBSGW ip address x.x.x.x port 8080 ssl trustpoint TP-self-signed-2993568318 inservice ! webvpn install svc flash:/webvpn/anyconnect-win-2.4.0202-k9.pkg sequence 1 ! webvpn install csd flash:/webvpn/sdesktop.pkg ! webvpn context WEBVPN_CNTXT title "Bla-bla-bla" logo file flash:/webvpn/logo_for_portal.jpg secondary-color steelblue title-color peru text-color black ssl authenticate verify all ! nbns-list "GENERAL" nbns-server 192.168.1.11 nbns-server 192.168.1.10 master login-message "Welcome to our web portal" ! cifs-url-list "LIST1" url-text "General on Arthur" url-value "//Arthur/General" ! policy group WEBVPN_POL cifs-url-list "LIST1" nbns-list "GENERAL" functions file-access functions file-browse functions file-entry functions svc-enabled banner "There's no expectation of privacy. All access is closely monitored" hide-url-bar timeout idle 1800 timeout session 36000 svc address-pool "SSLVPN_POOL" svc keep-client-installed svc dpd-interval gateway 30 svc rekey method new-tunnel svc dns-server primary 192.168.1.10 default-group-policy WEBVPN_POL aaa authentication list VPNUSERAUTHEN gateway WEBVPN max-users 20 inservice
aaa authentication login VPNUSERAUTHEN group radius
ip local pool SSLVPN_POOL 192.168.11.1 192.168.11.10
I tried aaa authentication both radius and local but to no avail.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :