<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Webvpn with digital certificates in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667399#M535153</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am very new to webvpn and digital certificates. I have to configure a cisco webvpn solution using digital certificates (for now its self signed). I also need to publish an internal url to the ssl vpn. They have an acive directory server for authentication purposes and the protocol to be used in LDAP. I would need to provide java rdp access to that url. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can some one point me to the right direction on how I should be starting to work on this solution. I have seen a few configuration examples on Cisco site but some are there without digital certs and some are there with them. I am just a bit confused on which to follow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help will be very much appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:03:04 GMT</pubDate>
    <dc:creator>sidcracker</dc:creator>
    <dc:date>2019-03-11T21:03:04Z</dc:date>
    <item>
      <title>Cisco Webvpn with digital certificates</title>
      <link>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667399#M535153</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am very new to webvpn and digital certificates. I have to configure a cisco webvpn solution using digital certificates (for now its self signed). I also need to publish an internal url to the ssl vpn. They have an acive directory server for authentication purposes and the protocol to be used in LDAP. I would need to provide java rdp access to that url. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can some one point me to the right direction on how I should be starting to work on this solution. I have seen a few configuration examples on Cisco site but some are there without digital certs and some are there with them. I am just a bit confused on which to follow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help will be very much appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667399#M535153</guid>
      <dc:creator>sidcracker</dc:creator>
      <dc:date>2019-03-11T21:03:04Z</dc:date>
    </item>
    <item>
      <title>Cisco Webvpn with digital certificates</title>
      <link>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667400#M535158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; When we are defining specific urls to be accessed on the corporate site, should the following process be folowed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Defining the webvpn functions under group policy eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; functions url-entry file-access file-entry file-browsing mapi port-forward filter &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; http-proxy auto-download citrix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Configuring the group policy on the tunnel group eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt;default-group-policy GroupPolicy1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Configuring the URL list on which resources to be accessible eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;enable outside&lt;/P&gt;&lt;P&gt;url-list ServerList "WSHAWLAP" cifs://10.2.2.2 1&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;url-list ServerList "FOCUS_SRV_1" &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.2.2.3"&gt;https://10.2.2.3&lt;/A&gt;&lt;SPAN&gt; 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;url-list ServerList "FOCUS_SRV_2" &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://10.2.2.4"&gt;http://10.2.2.4&lt;/A&gt;&lt;SPAN&gt; 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Questions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. How do I configure active directory authentication on the ASA. The users should be authenticated by AD before accessing the resources&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. What is the purpose of the digital certificate and how do i configure it for webvpn to use it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 02:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667400#M535158</guid>
      <dc:creator>sidcracker</dc:creator>
      <dc:date>2011-07-25T02:37:15Z</dc:date>
    </item>
    <item>
      <title>Cisco Webvpn with digital certificates</title>
      <link>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667401#M535160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; COuld someone tell me if this is the way to authenticate LDAP with ASA. Will this take Active Directory authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#aaa-server LDAP_SRV_GRP protocol ldap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- Configure the AAA Server.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-group)#aaa-server LDAP_SRV_GRP (inside) &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; host 192.168.1.2&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-base-dn dc=ftwsecurity, dc=cisco, dc=com&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-login-dn cn=admin, cn=users, dc=ftwsecurity, dc=cisco, dc=com&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-login-password **********&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-scope subtree&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#server-type microsoft&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- Configure the tunnel group to use the new AAA setup.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#tunnel-group ExampleGroup2 general-att&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)#authentication-server-group LDAP_SRV_GRP&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#aaa-server LDAP_SRV_GRP protocol ldap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- Configure the AAA Server.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-group)#aaa-server LDAP_SRV_GRP (inside) &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; host 192.168.1.2&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-base-dn dc=ftwsecurity, dc=cisco, dc=com&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-login-dn cn=admin, cn=users, dc=ftwsecurity, dc=cisco, dc=com&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-login-password **********&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#ldap-scope subtree&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#server-type microsoft&lt;/P&gt;&lt;P&gt;ciscoasa(config-aaa-server-host)#exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- Configure the tunnel group to use the new AAA setup.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)#tunnel-group ExampleGroup2 general-att&lt;/P&gt;&lt;P&gt;ciscoasa(config-tunnel-general)#authentication-server-group LDAP_SRV_GRP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 02:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667401#M535160</guid>
      <dc:creator>sidcracker</dc:creator>
      <dc:date>2011-07-25T02:43:27Z</dc:date>
    </item>
    <item>
      <title>Cisco Webvpn with digital certificates</title>
      <link>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667402#M535165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sorry that you are not getting prompt replies, please feel free to post this question on the VPN section of the support forums, they are the experts and I am very sure they will be able to help you quicker on this issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a quick research and this document may help you. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808b3cff.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808b3cff.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 03:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667402#M535165</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-07-25T03:25:02Z</dc:date>
    </item>
    <item>
      <title>Cisco Webvpn with digital certificates</title>
      <link>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667403#M535170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Maykol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will post the solution in the VPN forum&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 03:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-webvpn-with-digital-certificates/m-p/1667403#M535170</guid>
      <dc:creator>sidcracker</dc:creator>
      <dc:date>2011-07-25T03:33:25Z</dc:date>
    </item>
  </channel>
</rss>

