Remote Access VPN clientless SSL - ASA

Next remote access VPN I would like to work with is SSL VPN clientless on ASA. The biggest advantage of this version is lack of software on the client machine, you only need internet browser.
Minimum configuration required is very simple:

webvpn
 port 444
 enable outside

username cisco password cisco
username cisco attributes
 service-type remote-access

and now we can test it:

asa-webvpn-1-1.jpg

asa-webvpn-1-2.jpg

On the ASA we can also monitor this session:

asa1# sh vpn-sessiondb webvpn

Session Type: WebVPN

Username     : cisco                  Index        : 16
Public IP    : 192.168.202.237
Protocol     : Clientless
License      : AnyConnect Premium
Encryption   : RC4                    Hashing      : SHA1
Bytes Tx     : 7367                   Bytes Rx     : 12748
Group Policy : DfltGrpPolicy          Tunnel Group : DefaultWEBVPNGroup
Login Time   : 12:50:22 UTC Thu Dec 11 2014
Duration     : 0h:04m:55s
Inactivity   : 0h:00m:00s
NAC Result   : Unknown
VLAN Mapping : N/A                    VLAN         : none

asa1#

You need to remember that only traffic generated from the browser session can be encrypted, not like IPsec, where all traffic generated from the computer is sent over the tunnel (with one exception - split tunnel). If we for example ping the host 7.7.7.7, the traffic will be sent over the internet:

asa-webvpn-1-3.jpg

As you see the ping is not allowed on the outside interface and we can’t ping this host.

asa1(config)# sh run access-list OUT
access-list OUT extended permit icmp any host 9.9.9.9
asa1(config)#

We can test the tunnel by generating http from the webvpn portal:

asa-webvpn-1-4.jpg

I enabled http server on R15.

asa-webvpn-1-5.jpg

asa-webvpn-1-6.jpg

To secure web based application is straightforward. For other types application we can use Port Forwarding (legacy) and Smart Tunnel. More information about both you can find here:

a) Port Forwarding:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/webvpn.html#wp1291474

b) Smart Tunnel:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/webvpn.html#wp1218044

I pasted documentation from 8.2 version because the one I’m working on (8.4) doesn’t include CLI, only gui.

 
3
Kudos
 
3
Kudos

Now read this

VPN - GRE over IPsec SSO

As I promised in my last post I will add the stateful switchover to the following scenario: The first step is to remove tunnel1 from r5 and r4 and then add tunnel0 on r4. Next implementation of HSRP and changing ‘tunnel source’ on r3 and... Continue →