VPN Connection

The 7942, 7962, 7945, 7965 and 7975 models and the 8800, 8900 and 9900 series phones can setup a VPN using the AnyConnect protocol which connects via HTTPS and DTLS. To enable the VPN connection set <url1> and <certHash1> in SEPMAC.cnf.xml and then enter your username and password via the settings or applications menu on the phone.

Steps for patching, compiling and installed the modified version of OpenConnect Server are below. You should be familiar with building from source before attempting this.

1. Download a copy of the patch below.

file_download cisco-webvpnlogin-0.11.11.patch (14K) event 21/01/2018 security SHA256:a5d4df9639e87871a832fce5a14aa6a295bd34dc8aee6db82b13c461fa9e0081.

2. Download the version of OpenConnect Server that matches the version number in the name of the patch.

open_in_browser OpenConnect Server Downloads (ftp://ftp.infradead.org/pub/ocserv).

3. Extract the archive and apply the patch.

~$ tar -Jxvf ocserv-0.11.11.tar.xz ~$ cd ocserv-0.11.11 ~/ocserv-0.11.11$ patch -p1 < ../cisco-webvpnlogin-0.11.11.patch
4. Configure and build OpenConnect Server.

~/ocserv-0.11.11$ ./configure --prefix=/usr --sysconfdir=/etc/ocserv ~/ocserv-0.11.11$ make
5. Install the patched version of OpenConnect Server.

~/ocserv-0.11.11$ sudo make install
6. Install the sample configuration file.

~/ocserv-0.11.11$ sudo cp doc/sample.config /etc/ocserv/ocserv.conf


The VPN server requires an RSA key and X509 certificate, if you already have a certificate that can be used instead. Otherwise a new certificate can be generated using gencert.

An archive containing the scripts need to generate and hash X509 certificates files can be downloaded from the URL below.

file_download certutils.tar.bz2 (15K) event 08/03/2018 security SHA256:3eaa9e5f975eea3e315229e8648cf0969d831294d18c0ebc8169d59a81278744.

... # Only username and password authentication is supported for Cisco phones. # The ocpasswd(1) tool can be used to manage the password file. auth = "plain[passwd=/etc/ocserv/passwd]" # The key and the certificates of the server. The certificate must match the # hash set in <certHash1>. server-cert = "/etc/ocserv/vpn.pem" server-key = "/etc/ocserv/vpn.pem" # Force the cipher to AES-128 as the TLS cipher must be the same as the DTLS # cipher otherwise the phone will log an "old session cipher not returned" # error. tls-priorities = "NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+AES-128-CBC:+SIGN-ALL:+COMP-ALL:+CTYPE-ALL:%COMPAT" ...


certhash is used to generate an encoded version of the hash of the VPN server certificate. The hash is then set in <certHash1> in SEPMAC.cnf.xml

~/certutils$ ./certhash vpn.pem s4U4A2DqXtupmzGuEGm2NCjxW/Y