Cisco Anyconnect ver 3.1.05152 and Windows 7 64-bit
I have problem with Cisco Anyconnect version 3.1.05152 with 64-bit version of Windows 7. When I try to connect and authenticate with certificate (which I have on my smartcard inserted in smard card reader) Anyconnect client can't find certificate and it says "no valid certificates found for authentication". Other applications, including windows itself, can normally see the certificate from card and it works fine.
On 32-bit version of win 7 everything works great, but on 64-bit it just can't find certificate anywhere on the machine (smartcard, local store...)
As far as I know about this error in Anyconnect 3.1.05152, I believe it is a cosmetic bug i.e. this error pops up but it does not stops user from connecting to the ASA. Please let me know if you are not able to connect to the ASA at all.
I cannot connect to ASA at all, by using certificate authentication. I'm using smartcard reader with Active Client x64 (22.214.171.124) software for smartcard reader. When I try to connect to ASA for the first time from PC it just says: "no valid certificates found for authentication" and offers username/password because that is my default authentication. Then I connect with username/password and I connect successfully and I download client profile. Next time I try to connect, it prompts me for choosing certificate but it doesn't offer smartcard PIN entry and it also says "no valid certificates found for authentication" and prompts username/password.
It seemed that the problem happened only on win7 laptops that belonged to my company (memebers of the company domain) and not on private PCs. Anyway, the problem was solved by upgrading Active Client software, and it seemed that it was not related to Anyconnect but more to OS/smartcard drivers/company domain policy (or some combination).
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :