1-7
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Clientless SSL VPN
Using SSL to Access Internal Servers
Note If you are already familiar with trustpools from Cisco IOS then you should be aware that the ASA
version is similar, but not identical.
Using SSL to Access Internal Servers
Clientless SSL VPN uses SSL and its successor, TLS1 to provide a secure connection between remote
users and specific, supported internal resources at an internal server. This section includes the following
topics:
• Using HTTPS for Clientless SSL VPN Sessions, page 1-7
• Configuring Clientless SSL VPN and ASDM Ports, page 1-8
• Configuring Support for Proxy Servers, page 1-8
• Configuring SSL/TLS Encryption Protocols, page 1-11
Using HTTPS for Clientless SSL VPN Sessions
To permit clientless SSL VPN sessions on an interface, perform the following steps:
Prerequisites
In a web browser, users enter the ASA address in the format https:// address where address is the IP
address or DNS hostname of the ASA interface.
Restrictions
• You must enable clientless SSL VPN sessions on the ASA interface that users connect to.
• You must use HTTPS to access the ASA or load balancing cluster.
Command Purpose
Step 1
webvpn
Switches to group policy webvpn configuration
mode.
Step 2
url-entry disable
Disables URL entry.