The video helps you centralize your Cisco ASA AnyConnect VPN client group-policy configuration to your RADIUS server in case you would like to maintain configuration consistency on multiple ASA VPN devices. We will convert the group-policy configured in the previous lab into RADIUS attributes and, in addition, push out a Downloadable ACL (DACL). We will also demonstrate how per-user authorization still overwrites the configuration received from the group-policy.
The video looks into two additional methods of assigning IP address to Cisco ASA AnyConnect VPN client; using DHCP and RADIUS, in addition to the most popular local address pool. We will be using a Windows 2008 DHCP server and Cisco ACS 5.5 RADIUS server in this lab.
The video walks you through a basic setup of Cisco ASA AnyConnect client VPN that will serve as a foundation configuration of our subsequent labs. This includes supporting configuration such as routing, NAT, address pool, and default group-policy. We will have a working VPN setup that matches the traditional IPSec remote user VPN at the end of this lab.
The video walks you through a basic setup of Cisco ASA AnyConnect client VPN that will serve as a foundation configuration of our subsequent labs. This includes supporting configuration such as routing, NAT, address pool, and default group-policy. We will have a working VPN setup that matches the traditional IPSec remote user VPN at the end of this lab.
The video looks into some of the security features that can be implemented as part of Cisco ASA SSL clientless VPN. These features include Web ACL, Smart-Tunnel List, Portal Access Rule, URL bar removal, and homepage URL.
The video looks into some of the security features that can be implemented as part of Cisco ASA SSL clientless VPN. These features include Web ACL, Smart-Tunnel List, Portal Access Rule, URL bar removal, and homepage URL.
The video introduces you to an alternative method of per-application tunnelling on Cisco ASA SSL clientless VPN using Smart Tunnel. You will learn how the Smart Tunnel provides additional flexibility, enhances user experience, and resolves some of the issues found in Port-Forwarding. Smart Tunnel comes with many configurable options, some of which are included in this video.
The video introduces you to an alternative method of per-application tunnelling on Cisco ASA SSL clientless VPN using Smart Tunnel. You will learn how the Smart Tunnel provides additional flexibility, enhances user experience, and resolves some of the issues found in Port-Forwarding. Smart Tunnel comes with many configurable options, some of which are included in this video.
The video demonstrates a way to support TCP-based applications across Cisco ASA SSL clientless VPN outside of those available through bookmark and plugins using a feature called Port Forwarding. We will also discuss its characteristics and limitations as we go through configuration and testing.
The video continues with our bookmark configuration on Cisco ASA SSL clientless VPN by extending application supports to Telnet, SSH, RDP and VNC in a form of java plugins. We will also attempt to enable SSO on these applications and see which will succeed and fail.