AD:Administrator/Password IP:172.16.1.250
domain: home.local
aaa-server ldap protocol ldapaaa-server ldap (inside) host 172.16.1.250ldap-base-dn dc=home,dc=localldap-scope subtreeldap-login-password Passwordldap-login-dn cn=Administrator,cn=users,dc=home,dc=local验证:ciscoasa(config)# test aaa-server authentication ldap username joker password $Server IP Address or name: 172.16.1.250INFO: Attempting Authentication test to IP address (172.16.1.250) (timeout: 12 seconds)INFO: Authentication SuccessfulAnyconnect 配置:ciscoasa(config)# show run ip local poolip local pool ip 10.0.0.1-10.0.0.10ciscoasa(config)# show run webvpnwebvpnenable insideanyconnect image disk0:/anyconnect-win-4.7.04056-webdeploy-k9.pkg 1anyconnect enabletunnel-group-list enablecachedisableerror-recovery disableciscoasa(config)# show run group-policygroup-policy ad internalgroup-policy ad attributesvpn-tunnel-protocol ssl-client ssl-clientlessaddress-pools value ipciscoasa(config)# show run tunnel-grouptunnel-group ad type remote-accesstunnel-group ad general-attributesauthentication-server-group ldapdefault-group-policy adtunnel-group ad webvpn-attributesgroup-alias ad enable
ASA self signed cert.
Notes:-The URL for your webvpn should be used as the fqdn and subject-name in the trustpoint config. If they do not match, you will see errors about a mismatch when you access your webvpn URL and the certificate is presented.-This is a self-signed cert. That means the end users browser does not have any knowledge of the ASA as a CA authority. This means you have to install the cert the first time it is presented to say you trust the ASA as a CA authority. You should only need to install it once.1. Prepare your ASA:hostname myasadomain-name cisco.comclock set 00:00:00 1 Jan 2010clock set timezone EST -52. Get to creating the certificate:crypto key generate rsa label sslvpnkeypair modulus 1024crypto ca trustpoint selfenroll selffqdn myasa.cisco.comsubject-name CN=myasa.cisco.comkeypair sslvpnkeypaircrypto ca enroll self noconfirm3. Apply the new certificate:ssl trust-point self outside4. Save the config:write mem
