If you have checked the allow user to select then you need to configure the Alias for the connection profile and next time the user will connect he would see that alias configured there. If there are multiple connection with the group-alias configured than you will see a drop down list and the user can select the group he want to connect to.
If you do not select this option than no matter how many connection profile you will configure the connect will always land on the DefaultWebVPNGroup profile.
If you do not wan to use the group alias you also have the option to configure a group-url. If you configure a group-url then you don't check "allow user to select connection profile". you can configure a url and use that url to connect in that user will not know how many other profiles are there.
to configure the group-url you need to do the following:
Have you got FQDN for your VPN SERVER IP address , if yes you can specific your Group URL for each group ,where other group will be unknown to end user .
One advantage of using group-url over group-alias (group drop-down) is that you do not expose the group names as the latter method does.
How do you configure the group-url if the ASA VPN gateway is behind a NAT device?
The host/URL that the user enters will be used for the group mapping. Therefore, you have to use the NAT'd address, not the actual address on the ASA's outside interface. The best alternative is to use FQDN instead of IP address for group-url mapping.
All mapping is implemented on HTTP protocol level (based on information the browser sends) and a URL is composed to map from information in incoming HTTP headers. The host name or IP is taken from the host header and the rest of the URL from the HTTP request line. This means that the host/URL the user enters will be used for the group mapping.
ASA 8.x: Allow Users to Select a Group at WebVPN Login via Group-Alias and Group-URL Method
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :