69-13
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter69 General VPN Setup
Group Policies
Configuring Customization for a Group Policy
To configure customization for a group policy, select a preconfigured portal customization object, or
accept the customization provided in the default group policy. You can also configure a URL to display
Fields
Portal Customization—Configure a customization object for the end user portal.
Inherit—To inherit a portal customization from the default group policy, check Inherit. To
specify a previously configured customization object, uncheck Inherit and choose the
customization object from the drop-down list.
Manage—Click to import a new customization object.
Homepage URL (optional)—To specify a homepage URL for users associated with the group policy,
enter it in this field. The string must begin with either http:// or https://. To inherit a home page from
the default group policy, click Inherit. Clientless users are immediately brought to this page after
successful authentication. AnyConnect launches the default web browser to this URL upon
successful establishment of the VPN connection. On Linux platforms, AnyConnect does not
currently support this field and ignores it.
Access Deny Message—To create a message to users for whom access is denied, enter it in this field.
To accept the message in the default group policy, click Inherit.
Modes
The following table shows the modes in which this feature is available:
Adding or Editing a Site-to-Site Internal Group Policy
The Add or Edit Group Policy dialog box lets you specify tunneling protocols, filters, connection
settings, and servers for the group policy being added or modified. For each of the fields in this dialog
box, checking the Inherit check box lets the corresponding setting take its value from the default group
policy. Inherit is the default value for all of the attributes on this dialog box.
Fields
The following attributes appear in the Add Internal Group Policy > General dialog box. They apply to
SSL VPN and IPsec sessions, or clientless SSL VPN sessions. Thus, several are present for one type of
session, but not the other.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——