Remote Access VPN clientless SSL - ASA

Next remote access VPN I would like to work with is SSL VPN clientless on ASA. The biggest advantage of this version is lack of software on the client machine, you only need internet browser.
Minimum configuration required is very simple:

webvpn
 port 444
 enable outside

username cisco password cisco
username cisco attributes
 service-type remote-access

and now we can test it:

asa-webvpn-1-1.jpg

asa-webvpn-1-2.jpg

On the ASA we can also monitor this session:

asa1# sh vpn-sessiondb webvpn

Session Type: WebVPN

Username     : cisco                  Index        : 16
Public IP    : 192.168.202.237
Protocol     : Clientless
License      : AnyConnect Premium
Encryption   : RC4                    Hashing      : SHA1
Bytes Tx     : 7367                   Bytes Rx     : 12748
Group Policy : DfltGrpPolicy          Tunnel Group : DefaultWEBVPNGroup
Login Time   : 12:50:22 UTC Thu Dec 11 2014
Duration     : 0h:04m:55s
Inactivity   : 0h:00m:00s
NAC Result   : Unknown
VLAN Mapping : N/A                    VLAN         : none

asa1#

You need to remember that only traffic generated from the browser session can be encrypted, not like IPsec, where all traffic generated from the computer is sent over the tunnel (with one exception - split tunnel). If we for example ping the host 7.7.7.7, the traffic will be sent over the internet:

asa-webvpn-1-3.jpg

As you see the ping is not allowed on the outside interface and we can’t ping this host.

asa1(config)# sh run access-list OUT
access-list OUT extended permit icmp any host 9.9.9.9
asa1(config)#

We can test the tunnel by generating http from the webvpn portal:

asa-webvpn-1-4.jpg

I enabled http server on R15.

asa-webvpn-1-5.jpg

asa-webvpn-1-6.jpg

To secure web based application is straightforward. For other types application we can use Port Forwarding (legacy) and Smart Tunnel. More information about both you can find here:

a) Port Forwarding:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/webvpn.html#wp1291474

b) Smart Tunnel:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/webvpn.html#wp1218044

I pasted documentation from 8.2 version because the one I’m working on (8.4) doesn’t include CLI, only gui.

 
3
Kudos
 
3
Kudos

Now read this

GET VPN - part three

This is the third post about the GET VPN series. You should read my previous two posts before you start reading this one. Today I will change the authentication method for ISAKMP (phase1) from pre-share key to the certification. Let’s... Continue →