Cisco FirePOWER ASA 5500 series Configuration Manual page 700

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Getting Started with WebVPN
Figure 37-1
While you would expect to configure form parameters that let the security appliance include POST data
such as the username and password, you initially might not be aware of additional hidden parameters
that the web server requires. Some authentication applications expect hidden data which is neither
visible to nor entered by the user. You can, however, discover hidden parameters the authenticating web
server expects by making a direct authentication request to the web server from your browser without
the security appliance in the middle acting as a proxy. Analyzing the web server response using an HTTP
header analyzer reveals hidden parameters in a format similar to the following:
<param name>=<URL encoded value>&<param name>=<URL encoded>
Some hidden parameters are mandatory and some are optional. If the web server requires data for a
hidden parameter, it rejects any authentication POST request that omits that data. Because a header
analyzer does not tell you if a hidden parameter is mandatory or not, we recommend that you include all
hidden parameters until you determine which are mandatory.
This section describes:
Gathering HTTP Form Data
This section presents the steps for discovering and gathering necessary HTTP Form data. If you do not
know what parameters the authenticating web server requires, you can gather parameter data by
analyzing an authentication exchange using the following steps:
These steps require a browser and an HTTP header analyzer.
Note
Step 1
Start your browser and HTTP header analyzer, and connect directly to the web server login page without
going through the security appliance.
Step 2
After the web server login page has loaded in your browser, examine the login sequence to determine if
a cookie is being set during the exchange. If the web server has loaded a cookie with the login page,
configure this login page URL as the start-URL.
Enter the username and password to log in to the web server, and press Enter. This action generates the
Step 3
authentication POST request that you examine using the HTTP header analyzer.
Cisco Security Appliance Command Line Configuration Guide
37-10
SSO Authentication Using HTTP Forms
1
4
5
Tunnel
Gathering HTTP Form Data
Task Overview: Configuring SSO with HTTP Form Protocol
Detailed Tasks: Configuring SSO with HTTP Form Protocol
2
Auth Web
server
3
Web VPN
5
server
Other protected
web server
Chapter 37
Configuring WebVPN
OL-10088-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents