37-3
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 37 Configuring Clientless SSL VPN
Getting Started
Understanding Features Not Supported in Clientless SSL VPN
The security appliance does not support the following features for clientless SSL VPN connections:
•
Inspection features under the Modular Policy Framework, inspecting configuration control.
•
Functionality the filter configuration commands provide, including the
vpn-filter
command.
•
NAT, reducing the need for globally unique IP addresses.
•
PAT, permitting multiple outbound sessions appear to originate from a single IP address.
•
QoS, rate limiting using the
police
command and
priority-queue
command.
•
Connection limits, checking either via the static or the Modular Policy Framework
set connection
command.
•
The
established
command, allowing return connections from a lower security host to a higher
security host if there is already an established connection from the higher level host to the lower
level host.
Using SSL to Access the Central Site
Clientless SSL VPN uses SSL and its successor, TLS1 to provide a secure connection between remote
users and specific, supported internal resources at a central site. This section includes the following
topics:
•
Using HTTPS for Clientless SSL VPN Sessions
•
Configuring Clientless SSL VPN and ASDM Ports
•
Configuring Support for Proxy Servers
•
Configuring SSL/TLS Encryption Protocols
Using HTTPS for Clientless SSL VPN Sessions
Establishing clientless SSL VPN sessions requires the following:
•
Enabling clientless SSL VPN sessions on the security appliance interface that users connect to.
•
Using HTTPS to access the security appliance or load balancing cluster. In a web browser, users
enter the security appliance IP address in the format
https:// address
where
address
is the IP address
or DNS hostname of the security appliance interface.
To permit clientless SSL VPN sessions on an interface, perform the following steps:
Step 1
In global configuration mode, enter the
webvpn
command to enter webvpn mode.
Step 2
Enter the
enable
command with the name of the interface that you want to use for clientless SSL VPN
sessions.
For example, to enable clientless SSL VPN sessions on the interface called outside, enter the following:
hostname(config)#
webvpn
hostname(config-webvpn)#
enable outside
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......