1-62
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Group Policies
Step 5
You can ensure that an AnyConnect connection through a proxy, firewall, or NAT device remains open,
even if the device limits the time that the connection can be idle by adjusting the frequency of keepalive
messages using the
anyconnect ssl keepalive comand:
anyconnect ssl keepalive {none
|
seconds
}
Adjusting keepalives also ensures the AnyConnect client does not disconnect and reconnect when the
remote user is not actively running a socket-based application, such as Microsoft Outlook or Microsoft
Internet Explorer.
The following example configures the security appliance to enable the AnyConnect client to send
keepalive messages, with a frequency of 300 seconds (5 minutes):
hostname(config-group-webvpn)#
anyconnect ssl keepalive 300
hostname(config-group-webvpn)#
Step 6
To enable the AnyConnect client to perform a re-key on an SSL session, use the
anyconnect ssl rekey
command:
anyconnect ssl rekey
{
method
{
ssl
|
new-tunnel
} |
time
minutes
|
none
}}
By default, re-key is disabled.
Specifying the method as new-tunnel specifies that the AnyConnect client establishes a new tunnel
during SSL re-key. Specifying the method as
none
disables re-key. Specifying the method as
ssl
specifies
that SSL renegotiation takes place during re-key. Instead of specifying the method, you can specify the
time; that is, the number of minutes from the start of the session until the re-key takes place, from 1
through 10080 (1 week).
The following example configures the AnyConnect client to renegotiate with SSL during re-key and
configures the re-key to occur 30 minutes after the session begins:
hostname(config-group-webvpn)#
anyconnect ssl rekey method ssl
hostname(config-group-webvpn)#
anyconnect ssl rekey time 30
hostname(config-group-webvpn)#
Step 7
The Client Protocol Bypass feature allows you to configure how the ASA manages IPv4 traffic when it
is expecting only IPv6 traffic or how it manages IPv6 traffic when it is expecting only IPv4 traffic.
When the AnyConnect client makes a VPN connection to the ASA, the ASA could assign it an IPv4,
IPv6, or both an IPv4 and IPv6 address. If the ASA assigns the AnyConnect connection only an IPv4
address or only an IPv6 address, you can now configure the Client Bypass Protocol to drop network
traffic for which the ASA did not assign an IP address, or allow that traffic to bypass the ASA and be
sent from the client unencrypted or “in the clear”.
For example, assume that the ASA assigns only an IPv4 address to an AnyConnect connection and the
endpoint is dual stacked. When the endpoint attempts to reach an IPv6 address, if Client Bypass Protocol
is disabled, the IPv6 traffic is dropped; however, if Client Bypass Protocol is enabled, the IPv6 traffic is
sent from the client in the clear.
Use the client-bypass-protocol command to enable or disable the client bypass protocol feature. This is
the command syntax:
client-bypass-protocol {enable | disable}
The following example enables client bypass protocol:
hostname(config-group-policy)#
client-bypass-protocol enable
hostname(config-group-policy)#
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......