Unable to use SSL VPN client and Secure Desktop on same PC
When I have Cisco Secure Desktop disabled on the 3030 concentrator the SSL VPN client works perfectly. If I enable Cisco Secure Desktop on the concentrator I am unable to use the SSL VPN client when I connect. I have the option checked to be able to switch between the secure and the guest desktops as well as enabled all of the options under the VPN policy for the groups that I created. However, it doesn't even appear the SSL client is loading. Now if I disable the Secure Desktop on the concentrator and reconnect the SSL VPN client loads up and works. If I then re-enable the Secure desktop and stay connected with my SSL VPN connection and rebrowse to the concentrators public interface the secure desktop loads and the SSL VPN client stays loaded as well. So I see the SSL gold key in the system tray as well as the gold lock for the secure desktop in the tray. If I disconnect at this point and try to reconnect only the secure desktop loads up. What's up with that?? Is there a way to choose which loads??
Re: Unable to use SSL VPN client and Secure Desktop on same PC
The Cisco WebVPN solution offers a simple and elegant way to create a completely secure and customizable SSL VPN session on any third-party computer without leaving any data behind after the session ends. Cisco Secure Desktop is a key component of the Cisco WebVPN solution. Cisco Secure Desktop is part of Cisco VPN 3000 Concentrator Software Release 4.7 and will be included in future Cisco ASA 5500 Series security appliances, Cisco IOS. routers, and the Cisco WebVPN Services Module for Cisco Catalyst. 6500 Series switches and Cisco 7600 Series routers.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...