Cisco PIX 500 Series Configuration Manual page 640

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Configuring Connection Profiles
hostname(config-tunnel-webvpn)# nbns-server nbnsprimary master timeout 5 retry 3
hostname(config-tunnel-webvpn)# nbns-server 192.168.2.2 timeout 5 retry 3
hostname(config-tunnel-webvpn)#
The timeout interval can range from 1 through 30 seconds (default 2), and the number of retries can be
in the range 0 through 10 (default 2).
The nbns-server command in tunnel-group webvpn-attributes configuration mode replaces the
deprecated nbns-server command in webvpn configuration mode.
To specify alternative names for the group, use the group-alias command. Specifying the group alias
Step 4
creates one or more alternate names by which the user can refer to a tunnel-group. The group alias that
you specify here appears in the drop-down list on the user's login page. Each group can have multiple
aliases or no alias, each specified in separate commands. This feature is useful when the same group is
known by several common names, such as "Devtest" and "QA".
For each group alias, enter a group-alias command. Each alias is enabled by default. You can optionally
explicitly enable or disable each alias:
hostname(config-tunnel-webvpn)# group-alias alias [enable | disable]
hostname(config-tunnel-webvpn)#
For example, to enable the aliases QA and Devtest for a tunnel-group named QA, enter the following
commands:
hostname(config-tunnel-webvpn)# group-alias QA enable
hostname(config-tunnel-webvpn)# group-alias Devtest enable
hostname(config-tunnel-webvpn)#
The webvpn tunnel-group-list must be enabled for the (dropdown) group list to appear.
Note
To specify incoming URLs or IP addresses for the group, use the group-url command. Specifying a
Step 5
group URL or IP address eliminates the need for the user to select a group at login. When a user logs in,
the security appliance looks for the user's incoming URL or address in the tunnel-group-policy table. If
it finds the URL or address and if group-url is enabled in the connection profile, then the security
appliance automatically selects the associated connection profile and presents the user with only the
username and password fields in the login window. This simplifies the user interface and has the added
advantage of never exposing the list of groups to the user. The login window that the user sees uses the
customizations configured for that connection profile.
If the URL or address is disabled and group-alias is configured, then the dropdown list of groups is also
displayed, and the user must make a selection.
You can configure multiple URLs or addresses (or none) for a group. Each URL or address can be
enabled or disabled individually. You must use a separate group-url command for each URL or address
specified. You must specify the entire URL or address, including either the http or https protocol.
You cannot associate the same URL or address with multiple groups. The security appliance verifies the
uniqueness of the URL or address before accepting the URL or address for a connection profile.
For each group URL or address, enter a group-url command. You can optionally explicitly enable (the
default) or disable each URL or alias:
hostname(config-tunnel-webvpn)# group-url url [enable | disable]
hostname(config-tunnel-webvpn)#
For example, to enable the group URLs http://www.cisco.com and http://192.168.10.10 for the
tunnel-group named RadiusServer, enter the following commands:
hostname(config)# tunnel-group RadiusServer type webvpn
Cisco Security Appliance Command Line Configuration Guide
30-24
Chapter 30
Configuring Connection Profiles, Group Policies, and Users
OL-12172-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents