The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsASDM Book 3: Cisco ASA Series VPN ASDM Configuration Guide, 7.15
The following sections describe how to enable smart tunnel access with Clientless SSL VPN sessions, specify the applications to be provided with such access, and provide notes on using it.
To configure smart tunnel access, you create a smart tunnel list containing one or more applications eligible for smart tunnel access, and the endpoint operating system associated with the list. Because each group policy or local user policy supports one smart tunnel list, you must group the nonbrowser-based applications to be supported into a smart tunnel list. After creating a list, you assign it to one or more group policies or local user policies.
The following sections describe smart tunnels and how to configure them:
A smart tunnel is a connection between a TCP-based application and a private site, using a clientless (browser-based) SSL VPN session with the security appliance as the pathway, and the ASA as a proxy server. You can identify applications for which to grant smart tunnel access, and specify the local path to each application. For applications running on Microsoft Windows, you can also require a match of the SHA-1 hash of the checksum as a condition for granting smart tunnel access.
Lotus SameTime and Microsoft Outlook are examples of applications to which you may want to grant smart tunnel access.
Configuring smart tunnels requires one of the following procedures, depending on whether the application is a client or is a web-enabled application:
You can also list web-enabled applications for which to automate the submission of login credentials in smart tunnel connections over Clientless SSL VPN sessions.
Smart tunnel access lets a client TCP-based application use a browser-based VPN connection to access a service. It offers the following advantages to users, compared to plug-ins and the legacy technology, port forwarding:
The advantage of a plug-in is that it does not require the client application to be installed on the remote computer.
See the Supported VPN Platforms, Cisco ASA 5500 Series , for the platforms and browsers supported by smart tunnels.
The following requirements and limitations apply to smart tunnel access on Windows:
Proxy systems can be defined the client’s configuration of static proxy entry or automatic configuration, or by a PAC file. Only static proxy configurations are currently supported by Smart Tunnels.
These example instructions provide the minimum instructions required to add smart tunnel support for an application. See the field descriptions in the sections that follow for more information.
Choose Configuration > Remote Access VPN > Clientless SSL VPN Access > Portal > Smart Tunnels .
Double-click the smart tunnel list to add an application to; or click Add to create a list of applications, enter a name for this list in the List Name field, and click Add .
For example, click Add in the Smart Tunnels pane, enter Lotus in the List Name field, and click Add.
Click Add in the Add or Edit Smart Tunnel List dialog box.
Enter a string in the Application ID field to serve as a unique index to the entry within the smart tunnel list.
Enter the filename and extension of the application into the Process Name dialog box.
The following table shows example application ID strings and the associated paths required to support Lotus.
Table 1. Smart Tunnel Example: Lotus 6.0 Thick Client with Domino Server 6.5.5Application ID Example
Minimum Required Process Name
Select Windows next to OS.
Repeat for each application to add to the list.
Click OK in the Add or Edit Smart Tunnel List dialog box.
Assign the list to the group policies and local user policies to provide smart tunnel access to the associated applications, as follows:
A smart tunnel application list is essentially a filter of what applications are granted access to the tunnel. The default is to allow access for all processes started by the browser. With a Smart Tunnel enabled bookmark, the clientless session grants access only to processes initiated by the Web browser. For non-browser applications, an administrator can choose to tunnel all applications and thus remove the need to know which applications an end user may invoke.
Note | This configuration is applicable to Windows platforms only. |
The following table shows the situations in which processes are granted access.
Smart Tunnel Enabled Bookmark
Smart Tunnel Application Access
Application list specified
Any processes that match a process name in the application list are granted access.
Only processes that match a process name in the application list are granted access.
Smart tunnel is switched off
All processes (and their child processes) are granted access.
No process is granted access.
Smart Tunnel all Applications check box is checked.
All processes (and their child processes) are granted access.
This includes processes initiated by non-Smart Tunnel Web pages if the Web page is served by the same browser process.
All processes owned by the user who started the browser are granted access but not child processes of those original processes.
Choose Configuration > Remote Access VPN > AAA/Local Users > Local Users .
In the User Account window, highlight the username to edit.
Click Edit . The Edit User Account window appears.
In the left sidebar of the Edit User Account window, click VPN Policy > Clientless SSL VPN .
Perform one of the following:
The Clientless SSL VPN configuration of each ASA supports smart tunnel lists, each of which identifies one or more applications eligible for smart tunnel access. Because each group policy or username supports only one smart tunnel list, you must group each set of applications to be supported into a smart tunnel list.
The Add or Edit Smart Tunnel Entry dialog box lets you specify the attributes of an application in a smart tunnel list.
Navigate to Configuration > Remote Access VPN > Clientless SSL VPN Access > Portal > Smart Tunnels , and choose a smart tunnel application list to edit, or add a new one.
For a new list, enter a unique name for the list of applications or programs. Do not use spaces.
Following the configuration of the smart tunnel list, the list name appears next to the Smart Tunnel List attribute in the Clientless SSL VPN group policies and local user policies. Assign a name that will help you to distinguish its contents or purpose from other lists that you are likely to configure.
Click Add and add as many applications as you need to this smart tunnel list. The parameters are described below:
Note | A sudden problem with smart tunnel access may be an indication that a Process Name value is not up-to-date with an application upgrade. For example, the default path to an application sometimes changes following the acquisition of the company that produces the application and the next application upgrade. |
Note | If you enter Hash values and you need to support future versions or patches of an application with smart tunnel access, you must keep the smart tunnel list updated. A sudden problem with smart tunnel access may be an indication that the application list containing Hash values is not up-to-date with an application upgrade. You can avoid this problem by not entering a hash. |
Click OK to save the application, and create how ever many applications you need for this smart tunnel list.
When you are done creating your smart tunnel list, you must assign it to a group policy or a local user policy for it to become active, as follows:
Smart Tunnel Support
Application ID (Any unique string is OK.)