Assign an Interface to WebVPN
With the HTTPS server enabled, WebVPN must be assigned an interface. WebVPN must be
enabled on all interfaces from which the end user will access the WebVPN service. This can
be accomplished by using the enable command while in the WebVPN mode:
enable if-name
tgasa(config)# webvpn
tgasa(config-webvpn)# enable outside
Step 4: Assign Authentication for WebVPN
Assignment of an authentication server group to WebVPN is the final step to enable basic
WebVPN functionality. You must configure at least one authentication server group on the
ASA 55X0 Security Appliance before an authentication group to the WebVPN service can be
assigned. The authentication-server-group group tag command is used while in WebVPN
mode to assign one or more authentication server groups to the WebVPN service. This
command can also be used within the pop3s, imap4s, and smtps subcommand modes to
assign authentication for specific e-mail proxies.
Step 5: Assign a NetBIOS Name Server
Microsoft’s Common Internet File System (SMB/CIFS) requires a NetBIOS Name Server
(NBNS) for queries to map a NetBIOS name to IP addresses. WebVPN will use NetBIOS to
access or allow file sharing through a WebVPN connection. The initial NBNS server
configured will be the primary server, and all subsequent servers will be considered
redundant backups. The ASA 55X0 supports three NBNS server entries.
Command Description
text-color Sets the color of the text bars on the login, home, and file
access pages.
secondary-colors Sets the color of the secondary title bars on the login, home,
and file access pages.
secondary-text-colors Sets the color of the secondary text bars on the login, home,
and file access pages.
NOTE Because both WebVPN and ASDM use HTTPS, they cannot be assigned the same
interface. If this is done, an error message will display, informing the end user of the
problem.