30-25
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Configuring Connection Profiles
hostname(config)#
tunnel-group RadiusServer general-attributes
hostname(config-tunnel-general)#
authentication server-group RADIUS
hostname(config-tunnel-general)#
accounting-server-group RADIUS
hostname(config-tunnel-general)#
tunnel-group RadiusServer webvpn-attributes
hostname(config-tunnel-webvpn)#
group-alias “Cisco Remote Access” enable
hostname(config-tunnel-webvpn)#
group-url http://www.cisco.com enable
hostname(config-tunnel-webvpn)#
group-url http://192.168.10.10 enable
hostname(config-tunnel-webvpn)#
For a more extensive example, see
Customizing Login Windows for Users of Clientless SSL VPN
sessions, page 30-26
.
Step 6
To specify the DNS server to use for a connection profile for clientless SSL VPN sessions, enter the
dns-group
command. The default value is DefaultDNS:
hostname(config-tunnel-webvpn)#
dns-group
{
hostname
|
ip_address
}
hostname(config-tunnel-webvpn)#
The dns-group command resolves the hostname to the appropriate DNS server for the connection profile.
For example, to specify the use of the DNS server named server1, enter the following command:
hostname(config)#
name 10.10.10.1 server1
hostname(config-tunnel-webvpn)#
dns-group server1
hostname(config-tunnel-webvpn)#
Step 7
(Optional) To specify a VPN feature policy if you use the Cisco Secure Desktop Manager to set the
Group-Based Policy attribute to “Use Failure Group-Policy” or “Use Success Group-Policy, if criteria
match,” use the
hic-fail-group-policy
command. The default value is DfltGrpPolicy.
hostname(config-tunnel-webvpn)#
hic-fail-group-policy
name
hostname(config-tunnel-webvpn)#
Name
is the name of a group policy created for a connection profile for clientless SSL VPN sessions.
This policy is an alternative group policy to differentiate access rights for the following CSD clients:
•
Clients that match a CSD location entry set to “Use Failure Group-Policy.”
•
Clients that match a CSD location entry set to “Use Success Group-Policy, if criteria match,” and
then fail to match the configured Group-Based Policy criteria. For more information, see the
Cisco
Secure Desktop Configuration Guide for Cisco ASA 5500 Series Administrators
.
The following example specifies an alternative group policy named group2:
hostname(config-tunnel-webvpn)#
hic-fail-group-policy group2
hostname(config-tunnel-webvpn)#
Note
The security appliance does not use this attribute if you set the VPN feature policy to “Always
use Success Group-Policy.”
For more information, see the
Cisco Secure Desktop Configuration Guide for Cisco ASA 5500 Series
Administration Guide
.
Step 8
(Optional) To specify whether to override the group policy or username attributes configuration for
downloading an AnyConnect or SSL VPN client, use the override-svc-download command. This feature
is disabled by default.
The security appliance allows clientless, AnyConnect, or SSL VPN client connections for remote users
based on whether clientless and/or SSL VPN is enabled in the group policy or username attributes with
the
vpn-tunnel-protocol
command. The
svc ask
command further modifies the client user experience
by prompting the user to download the client or return to the WebVPN home page.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......