Chapter 37
Configuring WebVPN
Table 37-6
WebVPN Remote System Configuration and End User Requirements (continued)
Task
Using E-mail
via Application Access
Using E-mail via
Web Access
Using E-mail via
E-mail Proxy
Capturing WebVPN Data
The CLI capture command lets you log information about websites that do not display properly over a
WebVPN connection. This data can help your Cisco customer support engineer troubleshoot problems.
The following sections describe how to use the capture command:
•
•
Enabling WebVPN capture affects the performance of the security appliance. Be sure to disable the
Note
capture after you generate the capture files needed for troubleshooting.
OL-10088-01
Remote System or End User Requirements
Fulfill requirements for Application Access
(See Using Applications)
If you are using an IMAP client and you lose your mail server connection or are unable to
Note
make a new connection, close the IMAP application and restart WebVPN.
Other mail clients
Web-based e-mail product installed
SSL-enabled mail application installed
Do not set the security appliance SSL version
to TLSv1 Only. Outlook and Outlook
Express do not support TLS.
Mail application configured
Creating a Capture File
Using a Browser to Display Capture Data
Specifications or Use Suggestions
To use mail, start Application Access from the
WebVPN Home page. The mail client is then
available for use.
We have tested Microsoft Outlook Express
versions 5.5 and 6.0.
WebVPN should support other SMTPS, POP3S, or
IMAP4S e-mail programs via port forwarding,
such as Netscape Mail, Lotus Notes, and Eudora,
but we have not verified them.
Supported:
Outlook Web Access
•
For best results, use OWA on Internet
Explorer 6.x or higher, Mozilla 1.7, or
Firefox 1.x.
Lotus iNotes
•
Other web-based e-mail products should also
work, but we have not verified them.
Supported mail applications:
Microsoft Outlook
•
Microsoft Outlook Express versions 5.5 and
•
6.0
Netscape Mail version 7
•
Eudora 4.2 for Windows 2000
•
Other SSL-enabled mail clients should also work,
but we have not verified them.
See instructions and examples for your mail
application in
"Using E-Mail over
Cisco Security Appliance Command Line Configuration Guide
Capturing WebVPN Data
WebVPN."
37-49