1-4
Cisco ASA Series CLI Configuration Guide
Chapter 1 Setting General VPN Parameters
Using Client Update to Ensure Acceptable IPsec Client Revision Levels
The following example shows how to set a maximum Anyconnect VPN session limit of 450:
hostname(config)#
vpn-sessiondb max-anyconnect-premium-or-essentials-limit 450
hostname(config)#
Using Client Update to Ensure Acceptable IPsec Client
Revision Levels
Note
The information in this section applies to IPsec connections only.
The client update feature lets administrators at a central location automatically notify VPN client users
that it is time to update the VPN client software and the VPN 3002 hardware client image.
Remote users might be using outdated VPN software or hardware client versions. You can use the
client-update
command at any time to enable updating client revisions; specify the types and revision
numbers of clients to which the update applies; provide a URL or IP address from which to get the
update; and, in the case of Windows clients, optionally notify users that they should update their VPN
client version. For Windows clients, you can provide a mechanism for users to accomplish that update.
For VPN 3002 hardware client users, the update occurs automatically, with no notification. This
command applies only to the IPsec remote-access tunnel-group type.
To perform a client update, enter the
client-update
command in either general configuration mode or
tunnel-group ipsec-attributes configuration mode. If the client is already running a software version on
the list of revision numbers, it does not need to update its software. If the client is not running a software
version on the list, it should update. The following procedure explains how to perform a client update:
Step 1
In global configuration mode, enable client update by entering this command:
hostname(config)#
client-update enable
hostname(config)#
Step 2
In global configuration mode, specify the parameters for the client update that you want to apply to all
clients of a particular type. That is, specify the type of client, the URL or IP address from which to get
the updated image, and the acceptable revision number or numbers for that client. You can specify up to
four revision numbers, separated by commas.
If the user’s client revision number matches one of the specified revision numbers, there is no need to
update the client. This command specifies the client update values for all clients of the specified type
across the entire ASA.
Use this syntax:
hostname(config)#
client-update type
type
url
url-string
rev-nums
rev-numbers
hostname(config)#
The available client types are
win9X
(includes Windows 95, Windows 98 and Windows ME platforms),
winnt
(includes Windows NT 4.0, Windows 2000 and Windows XP platforms),
windows
(includes all
Windows based platforms), and
vpn3002
(VPN 3002 hardware client).
If the client is already running a software version on the list of revision numbers, it does not need to
update its software. If the client is not running a software version on the list, it should update. You can
specify up to three of these client update entries. The keyword
windows
covers all of the allowable
Windows platforms. If you specify
windows
, do not specify the individual Windows client types.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......