Creating And Applying Clientless Ssl Vpn Resources; Assigning Users To Group Policies; Using The Security Appliance Authentication Server; Using A Radius Server - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Chapter 37
Configuring Clientless SSL VPN

Creating and Applying Clientless SSL VPN Resources

Creating and applying policies for clientless SSL VPN that govern access to resources at the central site
includes the following task:
Chapter 30, "Configuring Connection Profiles, Group Policies, and Users"
instructions for all of these tasks.

Assigning Users to Group Policies

Assigning users to group policies simplifies the configuration by letting you apply policies to many
users. You can use an internal authentication server or a RADIUS server to assign users to group policies.
See
explanation of ways to simplify configuration with group policies.

Using the Security Appliance Authentication Server

You can configure users to authenticate to the security appliance internal authentication server, and
assign these users to a group policy on the security appliance.

Using a RADIUS Server

Using a RADIUS server to authenticate users, assign users to group policies by following these steps:
Step 1
Authenticate the user with RADIUS and use the Class attribute to assign that user to a particular group
policy.
Step 2
Set the class attribute to the group policy name in the format OU=group_name
For example, to assign a user of clientless SSL VPN to the SSL_VPN group, set the RADIUS Class
Attribute to a value of OU=SSL_VPN; (Do not omit the semicolon.)
Configuring Connection Profile Attributes for Clientless SSL
VPN
Table 37-1
addition to these attributes, you configure general connection profile attributes common to all VPN
connections. For step-by-step information on configuring connection profiles, see
Connection Profiles for Clientless SSL VPN Sessions"
Group Policies, and Users."
In earlier releases, "connection profiles" were known as "tunnel groups." You configure a connection
Note
profile with tunnel-group commands. This chapter often uses these terms interchangeably.
OL-12172-03
Assigning Users to Group Policies
Chapter 30, "Configuring Connection Profiles, Group Policies, and
provides a list of connection profile attributes that are specific to clientless SSL VPN. In
Creating and Applying Clientless SSL VPN Resources
in
Chapter 30, "Configuring Connection Profiles,
Cisco Security Appliance Command Line Configuration Guide
includes step-by-step
Users"for a thorough
"Configuring
37-21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents