37-49
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
Chapter 37 Configuring WebVPN
Capturing WebVPN Data
Capturing WebVPN Data
The CLI capture command lets you log information about websites that do not display properly over a
WebVPN connection. This data can help your Cisco customer support engineer troubleshoot problems.
The following sections describe how to use the capture command:
• Creating a Capture File
• Using a Browser to Display Capture Data
Note Enabling WebVPN capture affects the performance of the security appliance. Be sure to disable the
capture after you generate the capture files needed for troubleshooting.
Using E-mail
via Application Access
Fulfill requirements for Application Access
(See Using Applications)
To use mail, start Application Access from the
WebVPN Home page. The mail client is then
available for use.
Note If you are using an IMAP client and you lose your mail server connection or are unable to
make a new connection, close the IMAP application and restart WebVPN.
Other mail clients We have tested Microsoft Outlook Express
versions 5.5 and 6.0.
WebVPN should support other SMTPS, POP3S, or
IMAP4S e-mail programs via port forwarding,
such as Netscape Mail, Lotus Notes, and Eudora,
but we have not verified them.
Using E-mail via
Web Access
Web-based e-mail product installed Supported:
• Outlook Web Access
For best results, use OWA on Internet
Explorer 6.x or higher, Mozilla 1.7, or
Firefox 1.x.
• Lotus iNotes
Other web-based e-mail products should also
work, but we have not verified them.
Using E-mail via
E-mail Proxy
SSL-enabled mail application installed
Do not set the security appliance SSL version
to TLSv1 Only. Outlook and Outlook
Express do not support TLS.
Supported mail applications:
• Microsoft Outlook
• Microsoft Outlook Express versions 5.5 and
6.0
• Netscape Mail version 7
• Eudora 4.2 for Windows 2000
Other SSL-enabled mail clients should also work,
but we have not verified them.
Mail application configured See instructions and examples for your mail
application in “Using E-Mail over WebVPN.”
Table 37-6 WebVPN Remote System Configuration and End User Requirements (continued)
Task Remote System or End User Requirements Specifications or Use Suggestions