krotcw.blogg.se

Cisco asav smart tunnel applications
Cisco asav smart tunnel applications




cisco asav smart tunnel applications
  1. CISCO ASAV SMART TUNNEL APPLICATIONS HOW TO
  2. CISCO ASAV SMART TUNNEL APPLICATIONS SOFTWARE
  3. CISCO ASAV SMART TUNNEL APPLICATIONS PC

If your network is live, make sure that you understand the potential impact of any command.

cisco asav smart tunnel applications

All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment.

CISCO ASAV SMART TUNNEL APPLICATIONS PC

PC that runs Microsoft Vista, Windows XP SP2, or Windows 2000 Professional SP4 with Microsoft Installer version 3.1Ĭisco Adaptive Security Device Manager (ASDM) version 6.0(2)

CISCO ASAV SMART TUNNEL APPLICATIONS SOFTWARE

The information in this document is based on these software and hardware versions:Ĭisco ASA 5500 Series Adaptive Security Appliances that runs software version 8.0(2) There are no specific requirements for this document.

CISCO ASAV SMART TUNNEL APPLICATIONS HOW TO

This document describes how to configure smart tunnel on Cisco ASA 5500 Series Adaptive Security Appliances. Note: Make sure that the steps 4.b to 4.l described in the ASA Configuration Using ASDM 6.0(2) section of the ASA 8.x : Allow Split Tunneling for An圜onnect VPN Client on the ASA Configuration Example is not performed in order to configure the smart tunnel feature. For more information on how to configure Cisco An圜onnect SSL VPN client, refer to ASA 8.x: Allow Split Tunneling for An圜onnect VPN Client on the ASA Configuration Example. This document assumes that the Cisco An圜onnect SSL VPN Client configuration is already made and works properly so that the smart tunnel feature can be configured on the existing configuration. You can also list web-enabled applications for which to automate the submission of login credentials in smart tunnel connections over clientless SSL VPN sessions. Lotus SameTime and Microsoft Outlook Express are examples of applications to which you might want to grant smart tunnel access.ĭependent on whether the application is a client or is a web-enabled application, smart tunnel configuration requires one of these procedures:Ĭreate one or more smart tunnel lists of the client applications, and then assign the list to the group policies or local user policies for whom you want to provide smart tunnel access.Ĭreate one or more bookmark list entries that specify the URLs of the web-enabled applications eligible for smart tunnel access, and then assign the list to the DAPs, group policies, or local user policies for whom you want to provide smart tunnel access. For applications that run on Microsoft Windows, you can also require a match of the SHA-1 hash of the checksum as a condition for granting smart tunnel access. You can identify applications to which you want to grant smart tunnel access and specify the local path to each application. A smart tunnel is a connection between a TCP-based application and a private site, using a clientless (browser-based) SSL VPN session with the security appliance as the pathway and the security appliance as a proxy server.






Cisco asav smart tunnel applications