67-70
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter67 Configuring Connection Profiles, Group Policies, and Users
Supporting a Zone Labs Integrity Server
Configuring Group-Policy Attributes for Clientless SSL VPN Sessions
Clientless SSL VPN lets users establish a secure, remote-access VPN tunnel to the ASA using a web
browser. There is no need for either a software or hardware client. Clientless SSL VPN provides easy
access to a broad range of web resources and web-enabled applications from almost any computer that
can reach HTTPS Internet sites. Clientless SSL VPN uses SSL and its successor, TLS1, to provide a
secure connection between remote users and specific, supported internal resources that you configure at
a central site. The ASA recognizes connections that need to be proxied, and the HTTP server interacts
with the authentication subsystem to authenticate users. By default, clientless SSL VPN is disabled.
You can customize a configuration of clientless SSL VPN for specific internal group policies.
Note The webvpn mode that you enter from global configuration mode lets you configure global settings for
clientless SSL VPN sessions. The webvpn mode described in this section, which you enter from
group-policy configuration mode, lets you customize a configuration of group policies specifically for
clientless SSL VPN sessions.
In group-policy webvpn configuration mode, you can specify whether to inherit or customize the
following parameters, each of which is described in the subsequent sections:
customizations
html-content-filter
homepage
filter
url-list
port-forward
port-forward-name
sso server (single-signon server)
auto-signon
deny message
AnyConnect Secure Mobility Client
keep-alive ignore
HTTP compression
In many instances, you define the webvpn attributes as part of configuring clientless SSL VPN, then you
apply those definitions to specific groups when you configure the group-policy webvpn attributes. Enter
group-policy webvpn configuration mode by using the webvpn command in group-policy configuration
mode. Webvpn commands for group policies define access to files, URLs and TCP applications over
clientless SSL VPN sessions. They also identify ACLs and types of traffic to filter. Clientless SSL VPN
is disabled by default. See the description of Chapter74, “Configuring Clientless SS L VPN” for more
information about configuring the attributes for clientless SSL VPN sessions.
To remove all commands entered in group-policy webvpn configuration mode, enter the no form of this
command. These webvpn commands apply to the username or group policy from which you configure
them.
hostname(config-group-policy)# webvpn
hostname(config-group-policy)# no webvpn