Cisco ASA 5505 User Manual

Page 1496

Advertising
background image

67-70

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 67 Configuring Connection Profiles, Group Policies, and Users

Supporting a Zone Labs Integrity Server

Configuring Group-Policy Attributes for Clientless SSL VPN Sessions

Clientless SSL VPN lets users establish a secure, remote-access VPN tunnel to the ASA using a web
browser. There is no need for either a software or hardware client. Clientless SSL VPN provides easy
access to a broad range of web resources and web-enabled applications from almost any computer that
can reach HTTPS Internet sites. Clientless SSL VPN uses SSL and its successor, TLS1, to provide a
secure connection between remote users and specific, supported internal resources that you configure at
a central site. The ASA recognizes connections that need to be proxied, and the HTTP server interacts
with the authentication subsystem to authenticate users. By default, clientless SSL VPN is disabled.

You can customize a configuration of clientless SSL VPN for specific internal group policies.

Note

The webvpn mode that you enter from global configuration mode lets you configure global settings for
clientless SSL VPN sessions. The webvpn mode described in this section, which you enter from
group-policy configuration mode, lets you customize a configuration of group policies specifically for
clientless SSL VPN sessions.

In group-policy webvpn configuration mode, you can specify whether to inherit or customize the
following parameters, each of which is described in the subsequent sections:

customizations

html-content-filter

homepage

filter

url-list

port-forward

port-forward-name

sso server (single-signon server)

auto-signon

deny message

AnyConnect Secure Mobility Client

keep-alive ignore

HTTP compression

In many instances, you define the webvpn attributes as part of configuring clientless SSL VPN, then you
apply those definitions to specific groups when you configure the group-policy webvpn attributes. Enter
group-policy webvpn configuration mode by using the webvpn command in group-policy configuration
mode. Webvpn commands for group policies define access to files, URLs and TCP applications over
clientless SSL VPN sessions. They also identify ACLs and types of traffic to filter. Clientless SSL VPN
is disabled by default. See the description of

Chapter 74, “Configuring Clientless SSL VPN”

for more

information about configuring the attributes for clientless SSL VPN sessions.

To remove all commands entered in group-policy webvpn configuration mode, enter the no form of this
command. These webvpn commands apply to the username or group policy from which you configure
them.

hostname(config-group-policy)# webvpn

hostname(config-group-policy)# no webvpn

Advertising