74-7
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter74 Configuring Clientless SSL VPN
Using SSL to Access the Central Site
Configuring Clientless SSL VPN and ASDM Ports, page74-7
Configuring Support for Proxy Servers, page74-8
Configuring SSL/TLS Encryption Protocols, page74-10
Using HTTPS for Clientless SSL VPN Sessions
To permit clientless SSL VPN sessions on an interface, perform the following steps:
Prerequisites
In a web browser, users enter the ASA IP address in the format https:// address where address is the IP
address or DNS hostname of the ASA interface.
Restrictions
You must enable clientless SSL VPN sessions on the ASA interface that users connect to.
You must use HTTPS to access the ASA or load balancing cluster.
Configuring Clientless SSL VPN and ASDM Ports
Beginning with Version 8.0(2), the ASA supports both clientless SSL VPN sessions and ASDM
administrative sessions simultaneously on Port 443 of the outside interface. You do, however, have the
option to configure these applications on different interfaces.
Command Purpose
Step1 webvpn Switches to webvpn configuration mode.
Step2 enable (with the name of
interface you want to use
for clientless SSL VPN
sessions)
Example:
hostname(config)# webvpn
hostname(config-webvpn)#
enable outside
Enables clientless SSL VPN sessions on the interface called
outside.