04-10-2014 12:42 PM - edited 03-10-2019 09:37 PM
I'm having lots of issues having so-called "Clientless-SSL-Tunnel" AnyConnect VPN sessions - that is, those which are enacted by visiting https://<ASA IP> via a Browser, and letting the Java/ActiveX plugin automatically run the AnyConnect VPN Fat Client for you - honour Downloadable ACLs.
Our setup is integrated via RADIUS to Cisco ACS 4.0.
The Dynamic Group Policy -> Connection Profile appears to work for either (direct using AnyConnect VPN Fat Client or indirect via Browser -> ActiveX /Java Client), however, our Downloadable ACLs only take affect if the user instantiates the SSL VPN via the AnyConnect VPN Fat Client; users who access via the "Browser -> https://<ASA IP>" route first appear to have no ACL applied at all?
I understand that I can tweak the custom "Cisco VPN/3000/etc" RADIUS settings, such as "WebVPN-Filters" and "WebVPN-Access-List" to apply an ACL that is locally configured on the ASA Firewall, but what do I need to configure to make "WebVPN/Clientless-SSL-Tunnel" sessions honour the dACL which our ACS is sending?
Solved! Go to Solution.
04-14-2014 08:30 AM
This is a known issue with certain ASA software Versions please see cisco bug CSCtv19046 - DACL is not applied to AC when connection via the webportal. You will probably need to update your ASA to 8.4(4.1) or later.
04-14-2014 08:30 AM
This is a known issue with certain ASA software Versions please see cisco bug CSCtv19046 - DACL is not applied to AC when connection via the webportal. You will probably need to update your ASA to 8.4(4.1) or later.
04-14-2014 01:24 PM
Thanks - upgraded to 8.4(7) which seems to have done the trick.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide