In this course you will learn how to setup and configure the clientless SSL VPN solution within the Cisco ASA firewall. With the clientless SSL solution in the Cisco ASA firewall you will have a good complent to the client based VPN solutions such as the IPSec client and AnyConnect Client.
The best thing with the clientless SSL VPN is that you run it all in the browser. Over a secure connection protected with SSL you can reach internal resources such as file shares and FTP-server but also unencrypted http web-servers. Furthemore you will be able to reach any inside TCP port with the built in port forwarding application access solution, with just the browser as a proxy.
In this course you will learn how to setup this solution in various ways, how to customize access and how to controll authentication and authorization (who should have access to what) from Active Directory using LDAP.
Remember! 30 days money-back guarantee with no questions asked. I want you to be satisfied with my course. No Happy - No Pay!
Also, please take advantage of the free previews to see what you will get.
See you inside!
In this lecture we will globally enable the portal.
What is the url entry field? How can it be used? In this lecture I will demonstrate the usage of the url entry field.
With a bookmark list users does not have to enter path names to resources manually. Instead we can pre-define which resource to publish and make it easier for the end user.
We might not want the user to reach anything on the inside. We will take a look at how to lock down the access.
Without a proper SSL certificate the clientless portal is almost unusable. In this lecture I will explain how to request and install a certificate signed by a public trusted root authority.
There is a way to add support for more protocols in the portal. But I will explain in this lecture how it (does not) work.
With local accounts in the ASA the solution does not scale very well. In this lecture I will show how to make an LDAP connection from the firewall to an Active Directory server to enable user to login with their AD credentials.
We can use the Actie Directory not only for atuthentication but also a souce of authorization. Who should have access to what. And with the Dynamic Access Policies this is super powerful!
Learn how to setup the browser to proxy any specific TCP port with a port forwarding applet.
A few words on how we can tweak the look and feel of the web portal.
I have been working in IT since 1991. My focus the last 15 years has been in Routing&Switching and Security. I have certifications in Cisco (CCNA, CCNP, CCSP) since 2000, also certified Checkpoing CCSA/CCSP and ISC2 CISSP. After 20+ years as an IT consultant I have a broad as well as deep knowledge in TCP/IP, routing, switching and firewalling.