Cisco ASA 5505 User Manual

Page 1497

Advertising
background image

67-71

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 67 Configuring Connection Profiles, Group Policies, and Users

Supporting a Zone Labs Integrity Server

The following example shows how to enter group-policy webvpn configuration mode for the group
policy named FirstGroup:

hostname(config)# group-policy FirstGroup attributes

hostname(config-group-policy)# webvpn

hostname(config-group-webvpn)#

Applying Customization

Customizations determine the appearance of the windows that the user sees upon login. You configure
the customization parameters as part of configuring clientless SSL VPN. To apply a previously defined
web-page customization to change the look-and-feel of the web page that the user sees at login, enter the
customization command in group-policy webvpn configuration mode:

hostname(config-group-webvpn)# customization customization_name

hostname(config-group-webvpn)#

For example, to use the customization named blueborder, enter the following command:

hostname(config-group-webvpn)# customization blueborder

hostname(config-group-webvpn)#

You configure the customization itself by entering the customization command in webvpn mode.

The following example shows a command sequence that first establishes a customization named 123 that
defines a password prompt. The example then defines a group policy named testpolicy and uses the
customization command to specify the use of the customization named 123 for clientless SSL VPN
sessions:

hostname(config)# webvpn

hostname(config-webvpn)# customization 123

hostname(config-webvpn-custom)# password-prompt Enter password

hostname(config-webvpn)# exit

hostname(config)# group-policy testpolicy nopassword

hostname(config)# group-policy testpolicy attributes

hostname(config-group-policy)# webvpn

hostname(config-group-webvpn)# customization value 123

hostname(config-group-webvpn)#

Specifying a “Deny” Message

You can specify the message delivered to a remote user who logs into a clientless SSL VPN session
successfully, but has no VPN privileges, by entering the deny-message command in group-policy
webvpn configuration mode:

hostname(config-group-webvpn)# deny-message value "message"

hostname(config-group-webvpn)# no deny-message value "message"

hostname(config-group-webvpn)# deny-message none

The no deny-message value command removes the message string, so that the remote user does not
receive a message.

The no deny-message none command removes the attribute from the connection profile policy
configuration. The policy inherits the attribute value.

The message can be up to 491 alphanumeric characters long, including special characters, spaces, and
punctuation, but not counting the enclosing quotation marks. The text appears on the remote user’s
browser upon login. When typing the string in the deny-message value command, continue typing even
if the command wraps.

Advertising