Using https for clientless ssl vpn sessions, Configuring clientless ssl vpn and asdm ports – Cisco ASA 5505 User Manual

Page 1593

Advertising
background image

74-7

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 74 Configuring Clientless SSL VPN

Using SSL to Access the Central Site

Configuring Clientless SSL VPN and ASDM Ports, page 74-7

Configuring Support for Proxy Servers, page 74-8

Configuring SSL/TLS Encryption Protocols, page 74-10

Using HTTPS for Clientless SSL VPN Sessions

To permit clientless SSL VPN sessions on an interface, perform the following steps:

Prerequisites

In a web browser, users enter the ASA IP address in the format https:// address where address is the IP
address or DNS hostname of the ASA interface.

Restrictions

You must enable clientless SSL VPN sessions on the ASA interface that users connect to.

You must use HTTPS to access the ASA or load balancing cluster.

Configuring Clientless SSL VPN and ASDM Ports

Beginning with Version 8.0(2), the ASA supports both clientless SSL VPN sessions and ASDM
administrative sessions simultaneously on Port 443 of the outside interface. You do, however, have the
option to configure these applications on different interfaces.

Command

Purpose

Step 1

webvpn

Switches to webvpn configuration mode.

Step 2

enable

(with the name of

interface you want to use

for clientless SSL VPN

sessions)

Example:

hostname(config)# webvpn

hostname(config-webvpn)#

enable outside

Enables clientless SSL VPN sessions on the interface called
outside.

Advertising