Attached a simple layout. So VPN networks have to travel through the 800 router. As you said Brent i assume a full DMZ will do this the best way but how exactly. http://www.dataphone.se/~martyboy/network.jpg
Hi,
Yes i know. They have shipped a configured router for access to their network. The WAN public IP is one of ours ( not beeing used of course ) but the LAN side is as i said a public network ( .252 ) The Public IP on the LAN side is NOT ours but something the configured.
So on the cisco...
Hi!
We have a customer with one ASA5505 base license. They are going to get connected to another company by VPN. This company is very strict about who´s connecting so instead of using the ASA as VPN device they have configured and shipped a cisco 800 router. This router is configured with a...
Hi!
Can someone give me a good explanation why you should use outbound access-lists instead of inbound.
Example.
I want to restrict inside users to only use http and https. As i understand you can use inbound on inside interface or/and outbound on outside interface. I have always used...
Hi,
I have no problems getting the vpn tunnel to work but the clients on the remote network don´t have any internet access. I assume it has something to do with NAT at the HQ side but i can´t figure it out.
Hi,
I am about to configure a site to site VPN between to ASA. I have no problem setting up the tunnel but i want one ASA to use the HQ ASA as internet gateway. I know this is possible but i havent tried it yet.
Any ideas anyone? If you got any information on Ciscos homepage it would be...
Don´t put your vpn-pool on the same subnet as your local lan. Chose a different subnet for the vpn-pool.
Your nat exempt looks weird. It should be something like this
access-list no_nat extended permit ip "local lan" "vpn pool"
I have done some more testing and i am getting mixed results. The polices work 100%. The host scan checks 5 different registry and filechecks.
Firefox works but when i use the RDP plugin i can´t use swedish characters. With IE it works 100%
You have to define wich traffic the VPN should listen to. I can´t find that anywhere in your config.
One suggestion. The second ASA with DHCP on the outside interface. Why don´t you use the easy VPN on that asa instead? In such scenario you configure the asa as a vpn client, works great...
Hi,
well it seems that the only browsers that works good is IE. Firefox doesnt work at all. Sometimes it doesnt read the policies at all. We are in testphase so gonna do some more digging, i can´t post the result here.
I am using the latest version, 8.04 on a 5510 with AIP module.
So,
It seems i have found a solution for this. I configured 3 different dynamic access policies and pointed them to different bookmarks. It works pretty well.
Martin
Hi Guys,
I have the following scenario. Users login with the clientless ssl. CSD checks for certain registry keys. If found i want the users to login and have full access to the portal. If the check fails i still want users to be able to login but have a restricted portal.
Is that possible?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.