67-29
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 67 Clientless SSL VPN
Configuring Proxy Bypass
If you configure proxy bypass using ports rather than path masks, depending on your network
configuration, you might need to change your firewall configuration to allow these ports access to the
adaptive security appliance. Use path masks to avoid this restriction. Be aware, however, that path masks
can change, so you might need to use multiple pathmask statements to exhaust the possibilities.
A path is the text in a URL that follows the domain name. For example, in the URL
www.example.com/hrbenefits, hrbenefits is the path. Similarly, for the URL
www.example.com/hrinsurance, hrinsurance is the path. If you want to use proxy bypass for all hr sites,
you can avoid using the command multiple times by using the * wildcard as follows: /hr*.
Fields
• Interface—Displays the VLAN configured for proxy bypass.
• Port—Displays the port configured for proxy bypass.
• Path Mask—Displays the URI path to match for proxy bypass.
• URL—Displays the target URLs.
• Rewrite—Displays the rewrite options. These are a combination of XML, link, or none.
• Add/Edit—Click to add a proxy bypass entry or edit a selected entry.
• Delete—Click to delete a proxy bypass entry.
Modes
The following table shows the modes in which this feature is available:
Add/Edit Proxy Bypass Rule
This pane lets you set rules for when the adaptive security appliance performs little or no content
rewriting.
Fields
• Interface Name—Select the VLAN for proxy bypass.
• Bypass Condition—Specify either a port or a URI for proxy bypass.
–
Port—(radio button) Click to use a port for proxy bypass. The valid port numbers are
20000-21000.
–
Port (field)—Enter a high-numbered port for the adaptive security appliance to reserve for
proxy bypass.
–
Path Mask—(radio button) Click to use a URL for proxy bypass.
–
Path Mask—(Field) Enter a URL for proxy bypass. It can contain a regular expression.
• URL—Define target URLs for proxy bypass.
–
URL—(drop-down list) Click either http or https as the protocol.
–
URL (text field)—Enter a URL to which you want to apply proxy bypass.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
• — • ——