1-49
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Clientless SSL VPN
Understanding How KCD Works
Showing KCD Status Information
To display the domain controller information and the domain join status, follow these commands:
Showing Cached Kerberos Tickets
To display all Kerberos tickets cached on the ASA, enter the following commands:
Step 3
kcd-server
aaa-server-group
Example:
ASA(config)# aaa-server KG protocol kerberos
ASA(config)# aaa-server KG (inside) host DC
ASA(config-aaa-server-host_# kerberos-realm test.edu
ASA(webvpn-config)# kcd-server KG username user1
password abc123
ASA(webvpn-config)# no kcd-server
Specifies the domain controller name and realm.
The AAA server group must be a Kerberos type.
Shows sample output.
Step 4
(Optional)
no kcd-server
Removes the specified behavior for the ASA.
Step 5
(Optional)
kcd-server
name
reset
Resets the named kcd-server to the internal state.
Step 6
kcd-server <aaa-kerberos-grp> username
<user>
password
<pass>
user—Does not correspond to a specific administrative user
but simply a user with service-level privileges to add a device
on the Windows domain controller.
pass—The password does not correspond to a specific
password but simply a user with service-level password
privileges to add a device on the Windows domain controller.
Checks for the presence of a kcd-server and starts
the domain join process.
The Active Directory username and password are
used only in exec-mode and are not saved in the
configuration.
Note
Administrative privileges are required for
initial join. A user with service-level
priviledges on the domain controller will not
get access.
Step 7
no kcd-server
Removes the specified behavior for the ASA.
Command
Purpose
Command
Purpose
Step 1
webvpn
Switches to webvpn configuration mode.
Step 2
show webvpn kcd
Example:
ASA# show webvpn kcd
KCD-Server Name: DC
User
: user1
Password
: ****
KCD State
: Joined
Displays the domain controller information and the
domain join status.
Shows sample output returned from this command.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......