#

Thursday, February 2, 2023

Configuring WebVPN (Clientless SSL VPN) on Cisco ASA

This is a quick and easy way to give access to an internal resource from outside using SSL type of VPN without a vpn client.









Configuration on ASA will be like the following,
Assuming basic configuration is done, 

webvpn
 enable OUTSIDE

group-policy WEBVPN internal
group-policy WEBVPN attributes
 banner value "Unauthorized Access Denied"
 vpn-tunnel-protocol ssl-clientless
 
username cisco password cisco123
username cisco attributes
 vpn-group-policy WEBVPN

OUTSIDE is the G0/0 interface name, what I have done over there is that the group-policy and it's attributes were defined and the group policy is specified under username attributes.

When the user opens his web browser and browse the OUTSIDE interface IP, 
















The banner will be displayed after entering the username. In this example it is cisco and password is cisco123.

You can see that the following services will be accessible.

















If the routing is available from ASA to the server, the user will be able to gain access without the need of any access control entry.
What happens at the backend actually is a new IP will be assigned to the user session from ASA. The server will see that IP, not the real user IP.

Port Forwarding with WebVPN

As you can see on the dropdown, only http, https, cifs and ftp are the capable protocols. But if you need to do any other protocol like telnet, ssh etc, you will do a port forward in WebVPN.

webvpn
 port-forward APPS 30001 192.168.10.10 23

group-policy WEBVPN attributes
 webvpn
  port-forward value APPS

Anyone in the WebVPN group will have this access..

Now log off and login again will show another new icon "Application Access".









If JRE1.4 is working well on the users PC, you will get the dialog box to access. Because of Java issues, will not be possible to run on most machines. Even the later versions of JRE would not work.

No comments:

Post a Comment