Contents
lviii
Cisco ASA 5500 Series Configuration Guide using ASDM
Configuration Example for Content Rewrite Rules 72-26
Configuring Browser Access to Plug-ins 72-26
Adding a New Environment Variable 72-28
Preparing the Security Appliance for a Plug-in 72-28
Installing Plug-ins Redistributed By Cisco 72-29
Providing Access to Third-Party Plug-ins 72-31
Configuring and Applying the POST URL 72-32
Providing Access to a Citrix Java Presentation Server 72-33
Preparing the Citrix MetraFrame Server for Clientless SSL VPN Access 72-33
Creating and Installing the Citrix Plug-in 72-33
Why a Microsoft Kerberos Constrained Delegation Solution 72-34
Understanding How KCD Works 72-35
Authentication Flow with KCD 72-35
Adding Windows Service Account in Active Directory 72-37
Configuring DNS for KCD 72-37
Configuring the ASA to Join the Active Directory Domain 72-38
Configuring Kerberos Server Groups 72-39
Configuring Bookmarks to Access the Kerberos Authenticated Services 72-41
Configuring Application Access 72-42
Configuring Smart Tunnel Access 72-42
About Smart Tunnels 72-42
Why Smart Tunnels? 72-43
Configuring a Smart Tunnel (Lotus example) 72-45
Simplifying Configuration of Which Applications to Tunnel 72-46
Assigning a Smart Tunnel List 72-49
Configuring and Applying Smart Tunnel Policy 72-49
Specifying Servers for Smart Tunnel Auto Sign-on 72-49
Adding or Editing a Smart Tunnel Auto Sign-on Server Entry 72-50
Enabling and Disabling Smart Tunnel Access 72-51
Logging Off Smart Tunnel 72-51
When Its Parent Process Terminates 72-51
With A Notification Icon 72-52
Configuring Port Forwarding 72-52
Information About Port Forwarding 72-52
Configuring DNS for Port Forwarding 72-54
Adding Applications to Be Eligible for Port Forwarding 72-57
Adding/Editing Port Forwarding Entry 72-57
Assigning a Port Forwarding List 72-57
Enabling and Disabling Port Forwarding 72-58