Using https for clientless ssl vpn sessions, Configuring clientless ssl vpn and asdm ports – Cisco ASA 5505 User Manual
Page 1593
74-7
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter 74 Configuring Clientless SSL VPN
Using SSL to Access the Central Site
•
Configuring Clientless SSL VPN and ASDM Ports, page 74-7
•
Configuring Support for Proxy Servers, page 74-8
•
Configuring SSL/TLS Encryption Protocols, page 74-10
Using HTTPS for Clientless SSL VPN Sessions
To permit clientless SSL VPN sessions on an interface, perform the following steps:
Prerequisites
In a web browser, users enter the ASA IP address in the format https:// address where address is the IP
address or DNS hostname of the ASA interface.
Restrictions
•
You must enable clientless SSL VPN sessions on the ASA interface that users connect to.
•
You must use HTTPS to access the ASA or load balancing cluster.
Configuring Clientless SSL VPN and ASDM Ports
Beginning with Version 8.0(2), the ASA supports both clientless SSL VPN sessions and ASDM
administrative sessions simultaneously on Port 443 of the outside interface. You do, however, have the
option to configure these applications on different interfaces.
Command
Purpose
Step 1
webvpn
Switches to webvpn configuration mode.
Step 2
enable
(with the name of
interface you want to use
for clientless SSL VPN
sessions)
Example:
hostname(config)# webvpn
hostname(config-webvpn)#
enable outside
Enables clientless SSL VPN sessions on the interface called
outside.