AD:Administrator/Password IP:172.16.1.250
    domain: home.local

    1. aaa-server ldap protocol ldap
    2. aaa-server ldap (inside) host 172.16.1.250
    3. ldap-base-dn dc=home,dc=local
    4. ldap-scope subtree
    5. ldap-login-password Password
    6. ldap-login-dn cn=Administrator,cn=users,dc=home,dc=local
    7. 验证:
    8. ciscoasa(config)# test aaa-server authentication ldap username joker password $
    9. Server IP Address or name: 172.16.1.250
    10. INFO: Attempting Authentication test to IP address (172.16.1.250) (timeout: 12 seconds)
    11. INFO: Authentication Successful
    12. Anyconnect 配置:
    13. ciscoasa(config)# show run ip local pool
    14. ip local pool ip 10.0.0.1-10.0.0.10
    15. ciscoasa(config)# show run webvpn
    16. webvpn
    17. enable inside
    18. anyconnect image disk0:/anyconnect-win-4.7.04056-webdeploy-k9.pkg 1
    19. anyconnect enable
    20. tunnel-group-list enable
    21. cache
    22. disable
    23. error-recovery disable
    24. ciscoasa(config)# show run group-policy
    25. group-policy ad internal
    26. group-policy ad attributes
    27. vpn-tunnel-protocol ssl-client ssl-clientless
    28. address-pools value ip
    29. ciscoasa(config)# show run tunnel-group
    30. tunnel-group ad type remote-access
    31. tunnel-group ad general-attributes
    32. authentication-server-group ldap
    33. default-group-policy ad
    34. tunnel-group ad webvpn-attributes
    35. group-alias ad enable

    ASA self signed cert.

    1. Notes:
    2. -The URL for your webvpn should be used as the fqdn and subject-name in the trustpoint config. If they do not match, you will see errors about a mismatch when you access your webvpn URL and the certificate is presented.
    3. -This is a self-signed cert. That means the end users browser does not have any knowledge of the ASA as a CA authority. This means you have to install the cert the first time it is presented to say you trust the ASA as a CA authority. You should only need to install it once.
    4. 1. Prepare your ASA:
    5. hostname myasa
    6. domain-name cisco.com
    7. clock set 00:00:00 1 Jan 2010
    8. clock set timezone EST -5
    9. 2. Get to creating the certificate:
    10. crypto key generate rsa label sslvpnkeypair modulus 1024
    11. crypto ca trustpoint self
    12. enroll self
    13. fqdn myasa.cisco.com
    14. subject-name CN=myasa.cisco.com
    15. keypair sslvpnkeypair
    16. crypto ca enroll self noconfirm
    17. 3. Apply the new certificate:
    18. ssl trust-point self outside
    19. 4. Save the config:
    20. write mem