30-70
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Group Policies
Specifying the SSO Server
Single sign-on support, available only for clientless SSL VPN sessions, lets users access different secure
services on different servers without reentering a username and password more than once. The
sso-server value
command, when entered in group-policy-webvpn mode, lets you assign an SSO server
to a group policy.
To assign an SSO server to a group policy, use the
sso-server value
command in group-policy-webvpn
configuration mode. This command requires that your configuration include CA SiteMinder command.
hostname(config-group-webvpn)#
sso-server value
server_name
hostname(config-group-webvpn)#
To remove the assignment and use the default policy, use the
no
form of this command. To prevent
inheriting the default policy, use the
sso-server none
command.
hostname(config-group-webvpn)#
sso-server {value
server_name
|
none}
hostname(config-group-webvpn)#
[no] sso-server value
server_name
The default policy assigned to the SSO server is DfltGrpPolicy.
The following example creates the group policy “my-sso-grp-pol” and assigns it to the SSO server
named “example”:
hostname(config)#
group-policy my-sso-grp-pol internal
hostname(config)#
group-policy my-sso-grp-pol attributes
hostname(config-group-policy)#
webvpn
hostname(config-group-webvpn)#
sso-server value example
hostname(config-group-webvpn)#
Configuring SVC
The SSL VPN Client (SVC) is a VPN tunneling technology that gives remote users the benefits of an
IPSec VPN client without the need for network administrators to install and configure IPSec VPN clients
on remote computers. The SVC uses the SSL encryption that is already present on the remote computer
as well as the clientless SSL VPN sessions login and authentication of the security appliance.
To establish an SVC session, the remote user enters the IP address of an interface of the security
appliance configured to support clientless SSL VPN sessions. The browser connects to that interface and
displays the clientless SSL VPN login screen. If the user satisfies the login and authentication, and the
security appliance identifies the user as
requiring
the SVC, the security appliance downloads the SVC
to the remote computer. If the security appliance identifies the user as having the
option
to use the SVC,
the security appliance downloads the SVC to the remote computer while presenting a link on the user
screen to skip the SVC installation.
After downloading, the SVC installs and configures itself, and then the SVC either remains or uninstalls
itself (depending on the configuration) from the remote computer when the connection terminates.
The security appliance might have several unique SVC images residing in cache memory for different
remote computer operating systems. When the user attempts to connect, the security appliance can
consecutively download portions of these images to the remote computer until the image and operating
system match, at which point it downloads the entire SVC. You can order the SVC images to minimize
connection setup time, with the first image downloaded representing the most commonly-encountered
remote computer operating system. For complete information about installing and using SVC, see
Chapter 38, “Configuring AnyConnect VPN Client Connections”
.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......