EasyManuals Logo
Home>Cisco>Firewall>FirePOWER ASA 5500 series

Cisco FirePOWER ASA 5500 series User Manual

Cisco FirePOWER ASA 5500 series
989 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #629 background imageLoading...
Page #629 background image
30-75
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
Chapter 30 Configuring Tunnel Groups, Group Policies, and Users
Configuring User Attributes
hostname(config-username)# group-lock {value tunnel-grp-name | none}
hostname(config-username)# no group-lock
hostname(config-username)
The following example shows how to set group lock for the user named anyuser:
hostname(config)# username anyuser attributes
hostname(config-username)# group-lock value tunnel-group-name
hostname(config-username)
Enabling Password Storage for Software Client Users
Specify whether to let users store their login passwords on the client system. Password storage is
disabled by default. Enable password storage only on systems that you know to be in secure sites. To
disable password storage, enter the password-storage command with the disable keyword. To remove
the password-storage attribute from the running configuration, enter the no form of this command. This
enables inheritance of a value for password-storage from the group policy.
hostname(config-username)# password-storage {enable | disable}
hostname(config-username)# no password-storage
hostname(config-username)
This command has no bearing on interactive hardware client authentication or individual user
authentication for hardware clients.
The following example shows how to enable password storage for the user named anyuser:
hostname(config)# username anyuser attributes
hostname(config-username)# password-storage enable
hostname(config-username)
Configuring WebVPN for Specific Users
The following sections describe how to customize a WebVPN configuration for specific users. Enter
username webvpn configuration mode by using the webvpn command in username configuration mode.
WebVPN lets users establish a secure, remote-access VPN tunnel to the security appliance using a web
browser. There is no need for either a software or hardware client. WebVPN provides easy access to a
broad range of web resources and web-enabled applications from almost any computer that can reach
HTTPS Internet sites. WebVPN uses SSL and its successor, TLS1, to provide a secure connection
between remote users and specific, supported internal resources that you configure at a central site. The
security appliance recognizes connections that need to be proxied, and the HTTP server interacts with
the authentication subsystem to authenticate users.
The username webvpn configuration mode commands define access to files, MAPI proxy, URLs and
TCP applications over WebVPN. They also identify ACLs and types of traffic to filter. WebVPN is
disabled by default. These webvpn commands apply only to the username from which you configure
them. Notice that the prompt changes, indicating that you are now in username webvpn configuration
mode.
hostname(config-username)# webvpn
hostname(config-username-webvpn)#
To remove all commands entered in username webvpn configuration mode, use the no form of this
command:
hostname(config-username)# no webvpn
hostname(config-username)#

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco FirePOWER ASA 5500 series and is the answer not in the manual?

Cisco FirePOWER ASA 5500 series Specifications

General IconGeneral
BrandCisco
ModelFirePOWER ASA 5500 series
CategoryFirewall
LanguageEnglish

Related product manuals