I am looking for a complete way to set up the Cisco ASA 5520 into a clientless VPN setup. My goal is to have my clients use http or https from their Remote Connection. I would like a page to pop up and ask them for authentication via RADIUS and Windows NT login. Then I would like for them to have access to whatever they would have access to with our IPSEC VPN client.
If this will not be possible, what are my options? If i use the AnyConnect, isn't that an agent client?
I appreciate the response and will look at these documnets. RDP Plugin is for Remote Desktop? While alot of our users do use the Remote Desktop procedure, that does not always work. If one uses a laptop both at work and at home, they really have no where to Remote Desktop too, correct? Or am I off the mark on this one?
The point I was trying make is--I am using a laptop here at work right now. When I go home and use my Cisco VPN client to VPN in, I do not need to utilize remote desktop since I have my laptop configure to work as I would want it to remotely. Basically, I do not need to use Remote Desktop.
I guess it is safe to assume that no Cisco product right will allow us to use a SSL VPN which we can web in, authenticate and have access?
Sure there is. You need to be specific in what services you want.
You have 4 options:
Clientless SSL VPN (WebVPN)-Provides a remote client that requires an SSL-enabled Web browser to access HTTP or HTTPS Web servers on a corporate local-area network (LAN). In addition, clientless SSL VPN provides access for Windows file browsing through the Common Internet File System (CIFS) protocol. Outlook Web Access (OWA) is an example of HTTP access.
Thin-Client SSL VPN (Port Forwarding)-Provides a remote client that downloads a small Java-based applet and allows secure access for Transmission Control Protocol (TCP) applications that use static port numbers. Point of presence (POP3), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP), secure shell (ssh), and Telnet are examples of secure access. Because files on the local machine change, users must have local administrative privileges to use this method. This method of SSL VPN does not work with applications that use dynamic port assignments, such as some file transfer protocol (FTP) applications.
SSL VPN Client (Tunnel Mode)-Downloads a small client to the remote workstation and allows full secure access to resources on an internal corporate network. You can download permanently the SSL VPN Client (SVC) to a remote workstation, or you can remove the client once the secure session is closed.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :