Table of Contents
Table of Contents
Via GUI
Clientless VPN
- First step is to go to the menu and click Wizards>SSL VPN Wizard...
- Click on the Clientless SSL VPN Access and Next
- Name the Profile (ex: home), Choose the newly created Certificate (Adding Self Signed Certificates to ASA), Check off Connection Group Alias/URL and add name (ex: Home), Check off Display Group Alias list at the login page, Click Next
- For user authetication, choose either Authentication using AAA server group, or Authenticate using local user Database. If the local, create any users required. If AAA Server Group, follow these instructions first to choose the server group.
- Create a new Group Policy, name accordingly (ex: HomeSSLGRPPLC )
- If you wish to add Bookmarks, click manage and add any details you need. I will not go into detail in this walkthrough.
- Click Finish
- Drown down Network (Client) Access, Click AnyConnect Connection Profiles
- Click on "Assign Certificate to Interface" below the Access and DTLS port configuration options, and make sure an SSL Certificate is chose for the outside interface.
...
Edit group Policy for IP Pool and AAA Authentication
Via CLI
Notes
- If the VPN isn't responding to the client or clientless, it may be due to your provider blocking ports. I change single host IP management ports to 445, but most providers block that port due to MS SMB protocols going over 445. Changing the port to something like 446, 446, or anything above 1024 should work without issue in those cases.