37-6
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 37 Configuring Clientless SSL VPN
Getting Started
•
TCP Port Forwarding requires Sun Microsystems Java Runtime Environment (JRE) version 1.4.x
and 1.5.x. Port forwarding does not work when a user of clientless SSL VPN connects with some
SSL versions, as follows:
Authenticating with Digital Certificates
SSL uses digital certificates for authentication. The security appliance creates a self-signed SSL server
certificate when it boots; or you can install in the security appliance an SSL certificate that has been
issued in a PKI context. For HTTPS, this certificate must then be installed on the client. You need to
install the certificate from a given security appliance only once.
Restrictions for authenticating users with digital certificates include the following:
•
Application Access does not work for users of clientless SSL VPN who authenticate using digital
certificates. JRE does not have the ability to access the web browser keystore. Therefore JAVA
cannot use a certificate that the browser uses to authenticate a user, so it cannot start.
•
E-mail proxy supports certificate authentication with Netscape 7.x e-mail clients only. Other e-mail
clients such as MS Outlook, MS Outlook Express, and Eudora lack the ability to access the
certificate store.
For more information on authentication and authorization using digital certificates, see “
Using
Certificates and User Login Credentials
” in the “
Configuring AAA Servers and the Local Database
”
chapter.
Enabling Cookies on Browsers for Clientless SSL VPN
Browser cookies are required for the proper operation of clientless SSL VPN. When cookies are disabled
on the web browser, the links from the web portal home page open a new window prompting the user to
log in once more.
Managing Passwords
Optionally, you can configure the security appliance to warn end users when their passwords are about
to expire. To do this, you specify the
password-management
command in tunnel-group
general-attributes mode or enable the feature using ASDM at Configuration > Remote Access VPN >
Clientless SSL VPN Access > Connection Profiles > Add or Edit > Advanced > General > Password
Management.
The security appliance supports password management for the RADIUS and LDAP protocols. It
supports the “password-expire-in-days” option for LDAP only.
You can configure password management for IPSec remote access and SSL VPN tunnel-groups.
Negotiate SSLv3
Java downloads
Negotiate SSLv3/TLSv1
Java downloads
Negotiate TLSv1
Java does NOT download
TLSv1Only
Java does NOT download
SSLv3Only
Java does NOT download
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......