Sunday, August 27, 2006

CISCO ASA SVC WebVPN

SSL VPN Client

The SSL VPN Client (SVC) is a VPN tunneling technology that give remote users the benefits of an IPSEC VPN client without the need for network administrators to install and configure IPSEC VPN Clients on remote computers. The SVC use the SSL encryption that is already present on the remote computer as well as the WebVPN login and authentication of the security appliance.

The n the user connect to the security appliance, if the user satisfies the login and authentication, and if the security appliance identifes the user as requiring the SVC, the security appliance download the SVC to the remote computer. If the security appliance identifies the user as having the option to use the SVC, the security appliance download the SVC to the remote computer while presenting a link on the user screen to skip the SVC installation.

After downloading, the SVC installs and configures itself, and the SVC either remains or uninstalls itself (depending on the configuration) from the remote computer when the connection terminates.

Installing the SVC Software

Installing the SVC consists of copying the SVC image s to the security appliance and assigning an order to the images

Step 1 – Copy the svc image to the security appliance using the copy command in privileged EXEC mode

Step 2 – Assign an ordre to the SVC images using the svc image command from the wevvpn mode

svc image filename oder


Enabling SVC

After installing SVC, you can enable SVC by performing the webvpn mode :

Step 1 – enable interface in webvpn configuration mode

(config) webvpn
(config-webvpn) enable outside

Step 2 – from webvpn enter the svc enable command

(config-webvpn) svc enable

Step 3 – configure a method of address assignment (dhcp, and/or user-assigned addressing, local ip pool)

(config-webvpn) ip local pool vpn_users 192.168.1.100-192.168.1.200 mask 255.255.255.0

Step 4 – Assign IP addresses to a tunnel group

(config) tunnel-group remote_users general-attributes
(config-tunnel-general) address-pool vpn_users

Step 5 – Assign a default group policy to the tunnel group with the default-group-policy

(config-tunnel-general) default-group-policy sales

Step 6 - Create and enable a group alias that displays in the group list on the WebVPN Login page using the group-alias command

(config) tunnel-group remote_users webvpn-attributes
(config-tunnel-webvpn) group-alias sales_department enable

Step 7 – Enable the display of the tunnel-group list on the WebVPN Login pae from webvpn mode

(config) webvpn
(config-webvpn) tunnel-group-list enable


Step 8 – identify WebVPN as a permitted VPN tunneling protocole for the group or user with the vpn-tunnel-protocol

(config) group-policy sales attributes
(config-group-policy) webvpn
(config-goup-webvpn) vpn-tunnel-protocol webvpn


Step 9 – Enable or require an SVC for a specific group or user by using the svc command from either group-policy webvpn mode or username webvpn mode

svc {none enable required}



Enabling permanent SVC installation

Enabling permanent SVC installation disable the automatic uninstalling feature of the SVC. The SVC remains installed on the remote computer for subsequent SVC connections, reducing the SVC connection time for the remote user.

To enable permament SVC installation for a specific group or user, use the svc keep-installer command

svc keep-installer {installed none} – installed specifies the SVC permanently installed on the remote computer, none specifies the SVC is removed from the remote computer after the active SVC connection terminates. By default the permanent SVC installation are disabled. The SVC uninstalls at the end of every SVC session.


Viewing SVC Sessions

You can view information about active SVC sessions using the

show vpn-sessiondb svc



Logging Off SVC Sessions

To log off all SVC sessions use the – vpn-sessiondb logoff svc

You can logoff individual svc sessions using either the name option, or th index option

vpn-session-db logoff name name
vpn-session-db logoff index index