1-59
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Clientless SSL VPN
Configuring Application Access
Following the configuration of the smart tunnel auto sign-on server list, you must assign it to a group
policy or a local user policy for it to become active, as described in the next section.
The next step is to add servers to the server list.
Adding Servers to a Smart Tunnel Auto Sign-on Server List
The following steps describe how to add servers to the list of servers for which to provide auto sign-on
in smart tunnel connections, and assign that list to a group policies or a local user.
Prerequisites
You must use the
smart-tunnel auto-signon
list
command to create a list of servers first. You can assign
only one list to a group policy or username.
Restrictions
•
The smart-tunnel auto sign-on feature supports only applications communicating HTTP and HTTPS
using Internet Explorer and Firefox.
•
Firefox requires the administrator to specify hosts using an exact host name or IP address (instead
of a host mask with wild cards, a subnet using IP addresses, or a netmask). For example, within
Firefox, you cannot enter *.cisco.com and expect auto sign-on to host email.cisco.com.
Detailed Steps
To enable smart tunnel auto sign-on in clientless (browser-based) SSL VPN sessions, use the following
commands:
config-webvpn
Switches to config-webvpn configuration mode.
smart-tunnel auto-signon HR use-domain ip
192.32.22.56 255.255.255.0
Adds all hosts in the subnet and adds the Windows
domain to the username if authentication requires it.
(Optional)
no smart-tunnel auto-signon HR use-domain ip
192.32.22.56 255.255.255.0
Removes that entry from the list and the list named
HR if the entry removed is the only entry in the list.
no smart-tunnel auto-signon HR
Removes the entire list from the ASA configuration.
smart-tunnel auto-signon intranet host *.example.com
Adds all hosts in the domain to the smart tunnel auto
sign-on list named intranet.
no smart-tunnel auto-signon intranet host
*.example.com
Removes that entry from the list.
Command
Purpose
Command
Purpose
Step 1
webvpn
Switches to webvpn configuration mode.
Step 2
group-policy webvpn
or
username webvpn
Switches to group-policy webvpn configuration
mode.
Switches to username webvpn configuration mode.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......