EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1542 background imageLoading...
Page #1542 background image
67-78
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 67 Clientless SSL VPN
Configuring Browser Access to Client-Server Plug-ins
To retrieve a plug-in redistributed by Cisco and import it into the adaptive security appliance, perform
the following steps:
Step 1 Create a temporary directory named plugins on the computer you use to establish ASDM sessions with
the adaptive security appliance.
Step 2 Download the plug-ins you want from the Cisco website to the plugins directory.
Step 3 Choose Configuration > Remote Access VPN > Clientless SSL VPN Access > Portal > Client-Server
Plug-ins.
This pane displays the plug-ins that are available to clientless SSL sessions. The hash and date of these
plug-ins are also provided.
Step 4 Click Import.
The Import Client-Server Plug-in dialog box opens.
Step 5 Use the following descriptions to enter the field values.
Fields
The Import Client-Server Plug-in dialog box displays the following fields:
• Plug-in Name—Select one of the following values:
–
ica to provide plug-in access to Citrix MetaFrame or Web Interface services. Then specify the
path to the ica-plugin.jar file in the Remote Server field, as described below.
–
rdp to provide plug-in access to Remote Desktop Protocol services. Then specify the path to
the rdp-plugin.jar file in the Remote Server field.
–
ssh,telnet to provide plug-in access to both Secure Shell and Telnet services. Then specify the
path to the ssh-plugin.jar file in the Remote Server field.
–
vnc to provide plug-in access to Virtual Network Computing services. Then specify the path to
the vnc-plugin.jar file in the Remote Server field.
ssh-plugin.080430.jar SSH The Secure Shell-Telnet plug-in lets the remote
user establish a Secure Shell or Telnet connection
to a remote computer.
Note Because keyboard-interactive
authentication is not supported by
JavaSSH, it cannot be supported with SSH
plugin. (Keyboard interactive is a generic
authentication method used to implement
different authentication mechanisms.
Cisco redistributes this plug-in
without any changes to it per the
GNU General Public License. The
web site containing the source of the
redistributed plug-in is
http://javassh.org/
vnc-plugin.080130.jar VNC The Virtual Network Computing plug-in lets the
remote user use a monitor, keyboard, and mouse to
view and control a computer with remote desktop
sharing turned on. This version changes the
default color of the text, and contains updated
French and Japanese help files.
Cisco redistributes this plug-in
without any changes to it per the
GNU General Public License. The
web site containing the source of the
redistributed plug-in is
http://www.tightvnc.com/
Table 67-9 Plug-ins Redistributed by Cisco
Cisco Download Link Protocol Description Source of Redistributed Plug-in

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals