I want to do this from linux, so let's see if they make that possible.
Start by using this link
Specify "push" for the method (this expects you to have the "Duo Mobile" app on your phone. Use your usual NetID and password. I select connection option 1 (UASSL Client).Once I authenticate, I get a button that says "Download for Linux". It downloads a 9.3 M "sh" file.
cisco-secure-client-linux64-5.0.03072-core-vpn-webdeploy-k9.shI then do this:
su bash cisco-secure-client-linux64-5.0.03072-core-vpn-webdeploy-k9.shI get:
Installing Cisco Secure Client... Migrating /opt/cisco/anyconnect directory to /opt/cisco/secureclient directory egrep: warning: egrep is obsolescent; using grep -E Extracting installation files to /tmp/vpn.LHULji/vpninst579228886.tgz... Unarchiving installation files to /tmp/vpn.LHULji... Starting Cisco Secure Client Agent... Done! Exiting now.
You can learn about how to use this here:
To launch the client, you do:
gtk-launch com.cisco.secureclient.guiThis brings up a GUI with a place to enter "Connect to:" I have no idea what I should enter here.
Try: vpn.arizona.edu -- This seems to work. It now brings up some new entry fields that ask me for Group, username, password, second password (use "push" for second password). For Group, I go to the bottom and select UASSL-2Factor.
This does something, but I can't say that it has "worked". What is does do is to demolish any ssh connections I have at the time, and make it impossible to launch new ones. It has done a bunch of stuff with my linux network setup.
I adds this new network interface:
ifconfig -a cscotun0: flags=4305mtu 1390 inet 10.139.25.213 netmask 255.255.128.0 destination 10.139.25.213 inet6 fe80::3ce2:6a21:3cf9:8753 prefixlen 64 scopeid 0x20 inet6 fe80::d517:a0ae:41e5:5439 prefixlen 126 scopeid 0x20 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 500 (UNSPEC) RX packets 882 bytes 658603 (643.1 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 859 bytes 88088 (86.0 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
And it does this to my routing table:
route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface default 0.0.0.0 0.0.0.0 U 0 0 0 cscotun0 default agate 0.0.0.0 UG 100 0 0 eno1 10.139.0.0 0.0.0.0 255.255.128.0 U 0 0 0 cscotun0 192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 cscotun0 192.168.0.0 0.0.0.0 255.255.255.0 U 100 0 0 eno1 agate 0.0.0.0 255.255.255.255 UH 0 0 0 eno1 192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 cscotun0 192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0 vpn.arizona.edu agate 255.255.255.255 UGH 0 0 0 eno1I had to reboot to get back to a usable configuration (at least as far as making ssh connections to my desktop at the U or A).
This will require more study and learning. There must be some documentation somewhere. At least the next time I try this, I will be sure not to have an ssh connections active with anything going on in them that I care about.
Tom's home page / tom@mmto.org