AD:Administrator/Password IP:172.16.1.250
domain: home.local
aaa-server ldap protocol ldap
aaa-server ldap (inside) host 172.16.1.250
ldap-base-dn dc=home,dc=local
ldap-scope subtree
ldap-login-password Password
ldap-login-dn cn=Administrator,cn=users,dc=home,dc=local
验证:
ciscoasa(config)# test aaa-server authentication ldap username joker password $
Server IP Address or name: 172.16.1.250
INFO: Attempting Authentication test to IP address (172.16.1.250) (timeout: 12 seconds)
INFO: Authentication Successful
Anyconnect 配置:
ciscoasa(config)# show run ip local pool
ip local pool ip 10.0.0.1-10.0.0.10
ciscoasa(config)# show run webvpn
webvpn
enable inside
anyconnect image disk0:/anyconnect-win-4.7.04056-webdeploy-k9.pkg 1
anyconnect enable
tunnel-group-list enable
cache
disable
error-recovery disable
ciscoasa(config)# show run group-policy
group-policy ad internal
group-policy ad attributes
vpn-tunnel-protocol ssl-client ssl-clientless
address-pools value ip
ciscoasa(config)# show run tunnel-group
tunnel-group ad type remote-access
tunnel-group ad general-attributes
authentication-server-group ldap
default-group-policy ad
tunnel-group ad webvpn-attributes
group-alias ad enable
ASA self signed cert.
Notes:
-The URL for your webvpn should be used as the fqdn and subject-name in the trustpoint config. If they do not match, you will see errors about a mismatch when you access your webvpn URL and the certificate is presented.
-This is a self-signed cert. That means the end users browser does not have any knowledge of the ASA as a CA authority. This means you have to install the cert the first time it is presented to say you trust the ASA as a CA authority. You should only need to install it once.
1. Prepare your ASA:
hostname myasa
domain-name cisco.com
clock set 00:00:00 1 Jan 2010
clock set timezone EST -5
2. Get to creating the certificate:
crypto key generate rsa label sslvpnkeypair modulus 1024
crypto ca trustpoint self
enroll self
fqdn myasa.cisco.com
subject-name CN=myasa.cisco.com
keypair sslvpnkeypair
crypto ca enroll self noconfirm
3. Apply the new certificate:
ssl trust-point self outside
4. Save the config:
write mem