<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA SSL VPN problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-problems/m-p/1342490#M828599</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When connecting with Cisco VPN client, your client tells ASA which group (tunnel-group) the connection belongs to. When connecting to SSL VPN portal, your connection by default belongs to "tunnel-group DefaultWEBVPNGroup". You will need to configure this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool wohlerpool&lt;/P&gt;&lt;P&gt; authentication-server-group (inside) WohlerGroup LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy WohlerSSLPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also remove your "tunnel-group WohlerSSL"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if you want to have several different tunnel-groups for SSL VPN, then you need to choose one of a few methods for client to tell ASA which group it belongs to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. URL based. Client will have to browse to that specific URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group WohlerSSL webvpn-attributes&lt;/P&gt;&lt;P&gt; group-url &lt;A class="jive-link-custom" href="https://vpn.company.com/wohlerssl" target="_blank"&gt;https://vpn.company.com/wohlerssl&lt;/A&gt; enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You can add a drop-down box on the on the login page to select the group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group WohlerSSL webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias WohlerSSL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. You can also have your RADIUS server return IETF RADIUS [025] Class attribute. For example: "ou=WohlerSSLPolicy;". This attribute refers to "group-policy", not "tunnel-group", so everyone would still connect under tunnel-group DefaultWEBVPNGroup, but you could assign various parameters to the client using group-policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. If using local user database on ASA, you can also lock users into specific group policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username USERNAME password PASSWORD encrypted&lt;/P&gt;&lt;P&gt;username USERNAME attributes&lt;/P&gt;&lt;P&gt; group-lock value WohlerSSLPolicy  &lt;/P&gt;&lt;P&gt; service-type remote-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer you other question, you are looking for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy WohlerSSLPolicy attributes&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;  svc ask none default svc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Roman&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Aug 2009 21:10:35 GMT</pubDate>
    <dc:creator>Roman Rodichev</dc:creator>
    <dc:date>2009-08-03T21:10:35Z</dc:date>
    <item>
      <title>ASA SSL VPN problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-problems/m-p/1342489#M828584</link>
      <description>&lt;P&gt;Hi All, &lt;/P&gt;&lt;P&gt;I have two issue with SSL VPN configuration in ASA: &lt;/P&gt;&lt;P&gt;1- I have setup Microsoft IAS as RADIUS server for authentication. when I try to login to SSL VPN, the username and password in AD doesn't work and still I have to login with local username and password. RADIUS server is working with VPN client though. &lt;/P&gt;&lt;P&gt;2- I like when user acecss to webvpn, SVC package automatically download to client PC. But still clientless SSL VPN portal is shown rather than download SVC package. &lt;/P&gt;&lt;P&gt;Please find the show version and show run in the attachment. &lt;/P&gt;&lt;P&gt;any suggestion would be very appreciated. &lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-problems/m-p/1342489#M828584</guid>
      <dc:creator>alex goshtaei</dc:creator>
      <dc:date>2019-03-11T16:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-problems/m-p/1342490#M828599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When connecting with Cisco VPN client, your client tells ASA which group (tunnel-group) the connection belongs to. When connecting to SSL VPN portal, your connection by default belongs to "tunnel-group DefaultWEBVPNGroup". You will need to configure this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool wohlerpool&lt;/P&gt;&lt;P&gt; authentication-server-group (inside) WohlerGroup LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy WohlerSSLPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also remove your "tunnel-group WohlerSSL"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if you want to have several different tunnel-groups for SSL VPN, then you need to choose one of a few methods for client to tell ASA which group it belongs to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. URL based. Client will have to browse to that specific URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group WohlerSSL webvpn-attributes&lt;/P&gt;&lt;P&gt; group-url &lt;A class="jive-link-custom" href="https://vpn.company.com/wohlerssl" target="_blank"&gt;https://vpn.company.com/wohlerssl&lt;/A&gt; enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You can add a drop-down box on the on the login page to select the group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group WohlerSSL webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias WohlerSSL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. You can also have your RADIUS server return IETF RADIUS [025] Class attribute. For example: "ou=WohlerSSLPolicy;". This attribute refers to "group-policy", not "tunnel-group", so everyone would still connect under tunnel-group DefaultWEBVPNGroup, but you could assign various parameters to the client using group-policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. If using local user database on ASA, you can also lock users into specific group policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username USERNAME password PASSWORD encrypted&lt;/P&gt;&lt;P&gt;username USERNAME attributes&lt;/P&gt;&lt;P&gt; group-lock value WohlerSSLPolicy  &lt;/P&gt;&lt;P&gt; service-type remote-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer you other question, you are looking for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy WohlerSSLPolicy attributes&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;  svc ask none default svc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Roman&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Aug 2009 21:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-problems/m-p/1342490#M828599</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2009-08-03T21:10:35Z</dc:date>
    </item>
  </channel>
</rss>

