72-72
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter72 Configuring Clientless SSL VPN
Using Clientless SSL VPN with PDAs
Step5 In the Destination area, select No to ensure your logon page is visible to users before they authenticate.
Step6 Back in the Edit Customization Object window, click General and enable the customization object for
the connection profile and/or group policies you desire.
Using Clientless SSL VPN with PDAs
You can access clientless SSL VPN from your Pocket PC or other certified personal digital assistant
device. Neither the ASA administrator nor the clientless SSL VPN user need do anything special to use
clientless SSL VPN with a certified PDA.
Cisco has certified the following PDA platform:
HP iPaq H4150
Pocket PC 2003
Windows CE 4.20.0, build 14053
Pocket Internet Explorer (PIE)
ROM version 1.10.03ENG
ROM Date: 7/16/2004
Some differences in the PDA version of clientless SSL VPN exist:
A banner web page replaces the popup clientless SSL VPN window.
An icon bar replaces the standard clientless SSL VPN floating toolbar. This bar displays the Go,
Home and Logout buttons.
The Show Toolbar icon is not included on the main clientless SSL VPN portal page.
Upon clientless SSL VPN logout, a warning message provides instructions for closing the PIE
browser properly. If you do not follow these instructions and you close the browser window in the
common way, PIE does not disconnect from clientless SSL VPN or any secure website that uses
HTTPS.
Restrictions
Clientless SSL VPN supports OWA 2000 and OWA 2003 Basic Authentication. If Basic
Authentication is not configured on an OWA server and a clientless SSL VPN user attempts to access
that server, access is denied.
Unsupported clientless SSL VPN features:
Application Access and other Java-dependent features.
HTTP proxy.
The Citrix Metaframe feature (if the PDA does not have the corresponding Citrix ICA client
software).
Using E-Mail over Clientless SSL VPN
Clientless SSL VPN supports several ways to access e-mail. This section includes the following
methods:
Configuring E-mail Proxies