Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

iPad IPSEC Cisco client - Additional route issue

Hi,


I am unsure if this problem has come about in recent iOS releases, or just something thats only become aparent now because someone has tried to use. I've never had any complaints prior to the last month or so.


When connecting to a VPN configuration on a Cisco router (which previously didnt work but has for about a year I guess), the iPad recieves additional routes just fine, as it should, but does not seem to work with them.


For example I have 2 networks


192.168.200.0/24

10.0.10.0/24


In my ACLs on the router I add both networks, and I have confirmed with an app on my ipad that it gets both routes. They have the exact same flags, mtu, and gateway.I can get to the 192.168.200.0/24 network, but not the 10.0.10.0/24 network, even though my network tools software says the correct route is in use. Its almost as if it is not encrypted


If i reverse the ACLs order, so i have the route to the 10.0.10.0/24 network first, then that network will work, and the 192.168.200.0/24 network will NOT, despite the route tables looking EXACTLY the same as the first instance.


If I connect via a PC cisco client, works fine. All routes work.


I've had reports (that I have yet to confirm as I do not have a Mac) that the built in VPN client in MacOS has the same issue, but the Cisco supplied VPN client has no issue.

It seems like its an issue with the apple OS software, but am open to suggestion - Anyone got any ideas?


Leigh

iPad, iOS 4.3.5

Posted on Aug 2, 2011 5:29 PM

Reply
19 replies

Aug 8, 2011 3:33 PM in response to Mark Shykula

Hi Mark,


Cisco AnyConnect is an SSL VPN client. I need to use the IPSEC VPN client. It just bothers me because apart from the additional routes not working, it works absolutely perfectly. We're getting increasing numbers of customers wanting to hook up Apple devices - iPads and Macs in particular - to a corporate VPN, and these devices are small in number, so changing the setup of VPN connectivity which - for AnyConnect - also involves licensing fees payable to Cisco, its a very tough sell when they can see the IPSEC client connects and works.


I just hope someone from Apple, or Cisco, or both will read this and sort the problem out.


Message was edited by: Avatar2000

Aug 8, 2011 4:17 PM in response to jkaufman

I am using a Cisco ISR. I dont have an ASA (I presume thats what you mean, an ATA is an analog telephony adapter for Cisco VoIP).


Originally the Apple VPN software only worked with ASA (or after a dodgy workaround, VPN Concentrator 3000). Since IOS 4 (I think) I noticed that it started (seemingly) working with ISR's too (a **** good idea really - lots of SME's cant afford both, or dont want the expense when the ISR otherwise meets their needs).


Leigh

Aug 12, 2011 12:06 PM in response to Avatar2000

Dear Avatar 2000: Can you share with us the app name and provider information of the network troubleshooting app that you are using to test on the iPad? I have been looking for an app that would do that on the iPad. Unless you meant you used an app that makes use of the current network connectivity proving that the network is indeed working... Many thanks in advance!

Sep 14, 2011 1:54 PM in response to Avatar2000

AnyConnect runs on ISR routers too. For 870, 1800, 2800, 3800 there are free licenses included, and in fact there is no license enforcement though I'm not suggesting anything. For 890, 1900, 2900, and 3900 series there is license enforcement and ranges from $200 to several thousand depending on number of clients. Just Google the part numbers here to get an idea - http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6657/prod_qa s0900aecd80323cba_ps5854_Products_Q_and_A_Item.html


BTW, the license cost for AnyConnect Essentials on the ASA is dirt cheap. $100 to 200 dollars for 250 - 750 licenses max of respective platform.


AnyConnect is a great client, and SSL makes sense over IPsec from a developer perspective. Licensing is all based on concurrent users. Don't assume because it is Cisco it costs a lot. AnyConnect is a great option, and works great on Macs, Win, Linux, and iOS. Sometime in the future I'd guess Apple would stop bundling IPsec with iOS.

Sep 14, 2011 4:24 PM in response to googlebait

I am aware that AnyConnect runs on ISR routers too. I have a router that supports dozens of simultaneous connections over IPSEC, into multiple VRFs, with multiple RADIUS servers authenticating each matching VPN/VRF - without issue. I am not going to change it, just to make a handful of apple devices work - I'd just appreciate if Apple could make the software work like it's supposed to.


As for the license cost - its $390AUD LIST for 10 users on an ISR (Part number FL-SSLVPN10-K9), and its $3917 LIST for 25 users for ASA (Part number ASA5500-SSL-25=). Not all routers include free licenses - usually only 'Security' models. As for Anyconnect Essentials - First you have to pay $127-$341AUD LIST for the VPN license (depending on your ASA Model), then the same again for the mobile license to connect a mobile device. Then of course there's the ASA cost in the first place... just to connect some apple devices because their IPSEC software is broken. I'd rather pay $1000 to apple to just fix the **** thing so I can move on to the next problem.


MrOne - the software is called IT Tools.

Sep 14, 2011 6:29 PM in response to Avatar2000

I know you don't have an ASA, but I just want to be clear about the information you've given so no one is misled. The ASA5500-SSL-25 license is a premium license, and with that one gets:


Robust posture assessment capabilities protect the integrity of the corporate network by restricting VPN access based on an endpoint's security posture. Prior to establishing connectivity, a system may be validated for compliance with various antivirus, personal firewall, or antispyware products, and may undergo additional system checks. An advanced endpoint assessment option is available to automate the process of remediating out-of-compliance endpoint security applications.


If one didn't want all that then one wouldn't it, and I didn't. I bought an unlimited anyconnect essentials license and mobile option for my 5520 for no more than $250 USD for both, and unlimited on a 5520 means 250 users since that is the max it can handle. On the Cisco ISR G2 routers, they're quite expensive units and I think licensing is higher.


But as far as the main point of discussion here, the real issue is that though IPsec will be around for years to come in site-to-site and dmvpn scenarios, on clients it is another story especially mobile. Apple collaborated with Cisco on the IPsec client for iOS because of the complexity of IPsec clients and that it had to work to drive iOS acceptance. That it took Now that SSL VPN client software has matured, it is only a matter of time before Apple yanks IPsec VPN from iOS altogether, and I wouldn't be surprised if they aren't as speedy about fixing bugs in the iOS built-in client as they once may have been. SSL VPNs are lighter and easier to install on mobile clients and it is not in Apple or Cisco's interest to support IPsec on the client on all platforms indefinitely (Cisco only grudgingly added Win64 support somewhat recently). It isn't perfect, but installing the client is much easier for our users to do, doesn't require a reboot on Windows or pre-10.6 Macs, and it unifies the experience across all platforms. I'm not even one to jump on the "latest thing" bandwagon normally, but even at the higher ISR router cost to get SSL VPN I'd have done it just from a user support perspective alone. If you can eliminate client support costs then there is a cost savings to me and my users that I factor in.

Sep 14, 2011 6:49 PM in response to googlebait

I thought the main point of discussion was they have an IPSEC client, and it doesnt work 100%. They provide support, so they should fix it, not tell you to go spend thousands on new technology. If they didnt want to support it, they shouldn't have included it, begrudgingly or not.


As far as 'user support' goes, They enter 3 pieces of information relating specifically to the VPN - 4 if you count a description. The hostname, the group username and group password. Other than that, there is just their own username and password, which is their windows account. Whether or not they have to reboot on install or not is fairly irrelevant, as my clients have SOEs that are installed and maintained by IT staff. With the exception of this apple related issue, I've never really had to touch it.


So, from my perspective, I have to approach clients to say that I must disrupt their current systems to install a new system that will cost them more in licensing (and possibly hardware) costs, to replace a system that worked perfectly on PCs, and pre-Lion Mac's, on the basis that it will save them money on their almost zero support costs relating to VPN connectivity?

Sep 14, 2011 8:17 PM in response to Avatar2000

This is a public discussion, and so it encompasses more than your perspective. But as to your perspective thtat every feature get supported "100%", that isn't a widely shared perspective because it is impossible. If that were true for anything no feature would be more important than any other, not exactly a desirable situation. You've already spent "thousands of dollars" on Cisco gear when you could have had cheaper alternatives, so how you'll explain to your users why you won't now follow the manufacturers upgrade path that also happens to fix their problem because you personally don't benefit from said upgrade and are instead waiting for an undetermined amount of time for a fix that pleases you would be interesting.

Sep 14, 2011 8:42 PM in response to googlebait

So - basically - on the basis its a 'public discussion' its ok for you to summarise the 'main point' of the discussion based on your contribution, which doesnt directly resolve the issue, rather than the opening topic of the discussion in the first place? But I digress.


I could have had cheaper alternatives, to Cisco - sure. I buy gear that works, and arguably best-in-class. I think its fairly safe to say that Cisco sets the standard that most enterprise network vendors hope to at least meet, if not exceed. In this particular case, apple neither meets it, nor exceeds it.


Why I won't follow the manufacturers upgrade path now? Well, everything I support, works, now. I write here about this issue to not only assist the client, as I have the best knowledge on the subject, but collaborate with others to obtain a fix or workaround to the problem (in turn helping them), that does not require a complete hardware, software or operational change. I don't personally benefit from seeking this help/advice either, but I do it anyway in the name of customer service- I do what I can.


We don't officially support apple devices (and every day this goes on, it just reinforces that policy), so I am under no commercial obligation to the client or anyone else to change anything. and they know that. If they want it so badly, they can pay for it.... but that doesnt mean they're gonna like it.

Sep 14, 2011 10:13 PM in response to Avatar2000

I didn't summarize the main point. You're the one trying to do that. Among other things, you claimed anyconnect for ASA cost ~4000 AUD, but I know it is less just for SSL VPN because I bought an unlimited license for that for my ASA for less than $250 even including the mobile add-on needed for iOS. I don't really care if you support iOS or not. I just did it with ease, no disruption, and $250 because I decided a couple of years ago it was better to offload my vpn services onto a separate box to make sure their would be no disruption no matter what I wished to do. I added SSL VPN support while it was being used for IPsec VPN. I didn't buy a 5520, it is overkill for our VPN but I had a used one left over after we upgraded our main firewall so it could handle a larger internet pipe. If I'd had to buy an ASA for VPN, I'd have used a smaller and cheaper ASA (since I've never seen more than 10 concurrent vpn users) and those are surprisingly cheap from Cisco. Have you seen what an ASA 5505 costs? Have your clients told you they aren't willing to pay anything to SSL VPN, or are you making that decision for them since you don't wish to support iOS anyway? And I still don't see what is so great or desirable about a combined user-VPN termination point combined with routing to begin with.


Well, if you're lucky Apple will fix the problem sometime before they pull IPsec support entirely. For the sake of Apple's OS platform, given the future of IPsec mobile (and other) clents, and the leading network vendor's stance on it, I hope that bug isn't anywhere near the top of their list to fix.

iPad IPSEC Cisco client - Additional route issue

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.