I know this is a very old post, but I found the solution. I hope someone that stumbles upon this page will find this info useful.
As we all know, when navigating to the IP/FQDN of the ASA, as long as the URL is not matched against another connection profile, the DefaultWEBVPNGroup connection profile will be matched. The solution is to edit the connection profile DefaultWEBVPNGroup > Advanced > Clientless SSL VPN > Group URLs > Add > and here create the url of the ASAs IP (https://220.127.116.11) or FQDN (https://abc.net). Then, under "Group URLs" check to "Do not run Cisco Secure Desktop (CSD) on client machine when using group URLs ............
This will allow you to go to the main portal page and bypass CSD!!
Unfortunately, with this solution, you lose the ability to select an alias from the drop-down list.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...