Hello,
does anyone know how to bypass the Cisco ASA portal page (clientless SSL VPN), so I can access some internal machine directly from outside using a certain group policy? (or otherwise, be creative)
I'm asking because the internal machine uses HTTP/1.1 name-based vhosts that I wish to transparently access from the outside, yet use ASA's authentication mechanisms before getting there. Using the "homepage" setting doesn't seem to pass the HTTP/1.1 Host header.
Yes, I could use an unused external IP and NAT it to the inside host, but lose the ASA's authentication features I guess.
Also, I found that I am unable to use special DNS servers for Clientless SSL VPN connections. I tried all of the following, to no avail, it still uses the default servers.
dns server-group DMZ-DNS
name-server 192.168.1.3
group-policy GrpPolicy attributes
dns-server value 192.168.1.3
tunnel-group TGroup webvpn-attributes
authentication certificate
dns-group DMZ-DNS
Software version is ASA 8.2(5) and we can't change that for now.
Thanks.