
THE FASCINATING WORLD OF NETWORKING
OPTIMIZED FOR GOOGLE CHROME
PART II: Clientless SSL VPN using ASDM
Click in the links to test if everythink is OK:
Once authentication was successfull, ASA SSL Web portal webpage will be displayed listing the various bookmarks previously assigned to the profile.
In my GNS3 example:
Login From the Remote Host
To verify the configuration, open (from a remote host) a web browser and enter the login URL for the SSL VPN into the Address field.
The ASA SSL web portal web page will open listing the various bookmarks previously assigned to the profile.
NOTE: The browser URL must use Hypertext Transfer Protocol Secure (HTTPS) to connect to the SSL VPN. Be sure to use secure HTTP (HTTPS).
In my GNS3 example, after configuring this Clientless SSL VPN example:



As you can see, you can go to Home page, close this connection, and so on, by using the icons at the top right.
User either logout or the connection timeouts to close the connection.
Clientless SSL Connection Profiles Window
You can see the different SSL connections in this window: Configurations > Remote Access VPN > Clientless SSL VPN Access > Connection Profiles

Generated CLI Commands
The clientless SSL VPN wizard generates configuration settings for the following:
Enabling an SSL VPN on the specified interface:
webvpn enable management
Defining the Group Policy and identifying a list of WebVPN servers/URLs:
group-policy Clientless-SSL-Policy internal
group-policy Clientless-SSL-Policy attributes
vpn-tunnel-protocol ssl-clientless
webvpn
url-list value juantron
Local user database entry inherits the attributes from the group policy:
username juantron password fSTcv/cuX4Wp5kWs encrypted privilege 15
username juantron attributes
webvpn
url-list value juantron
Defining the Tunnel Group:
tunnel-group Clientless-SSL-VPN type remote-access
tunnel-group Clientless-SSL-VPN general-attributes
default-group-policy Clientless-SSL-Policy
Your e-mail will not be published.
You can use an invalid e-mail.