Let me just start off by saying: Yes, I know this is inherently insecure.
That being said, can an ASA appliance be coerced into opening up a clientless SSL connection based solely on source IP?
A related question is whether or not the ASA can forward a username\password to a destination server without the user entering it at the ASA?
Here's the situation: I need to set up a way for a client to be able to come to the ASA and, based on source IP, be forwarded to a Virtual Desktop Interface. I know that piece is easy but I need to attach credentials that Windows Active Directory will accept.
1. An ASA cannot use the source IP address directly for authentication, however using either DAP or NAC you can control which tunnel group a particular client will connect to based on the source IP address. For more information regarding DAP, please refer to the following link:
You could also try using Digital certificates. If the certificate contains the source IP address in the CN then it will use the IP address to authenticate the client. For more information on using digital certificates for authentication you can refer to the following link:
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :