Hi, everyone
First of all i am totally new in configuring cisco asa, but nor commandline nor asdm is not an obstacle for me. So, please, don't judge me very much.
So am using asa 5520 device.
Requirement for the setup are:
1. The main result is ssl vpn.
2. in our company we are using public ip addresses. so basically 157.128.182.0 subnet is dedicated for servers, 157.128.201.0 is dedicated for vpn ip pool, and 157.128.202.0 subnet is dedicates another vpn pool for admins.
Default gateway will be 0 0 157.128.182.254. As I have already noticed there can be only one default route. So how other subnets should be connected to the internet while all the subnets are public addresses.
That i have already done, is interface setup.
Management0/0 "outside" no management only 157.128.182.250 security 0
GigabitEthernet0/0 "inside0" no management only 157.128.201.253 security 100
GigabitEthernet0/0 "inside1" no management only 157.128.202.252 security 100
same-security-traffic permit inter-interface is enabled.
So i need some further guidance how everything should be setup.
Do i need to use split tunneling? What acl's should i use?
What nat control should i use, if not when how inside* interfaces should access internet?
Thanks in advance.
Regards,
Thomas
First of all i am totally new in configuring cisco asa, but nor commandline nor asdm is not an obstacle for me. So, please, don't judge me very much.
So am using asa 5520 device.
Requirement for the setup are:
1. The main result is ssl vpn.
2. in our company we are using public ip addresses. so basically 157.128.182.0 subnet is dedicated for servers, 157.128.201.0 is dedicated for vpn ip pool, and 157.128.202.0 subnet is dedicates another vpn pool for admins.
Default gateway will be 0 0 157.128.182.254. As I have already noticed there can be only one default route. So how other subnets should be connected to the internet while all the subnets are public addresses.
That i have already done, is interface setup.
Management0/0 "outside" no management only 157.128.182.250 security 0
GigabitEthernet0/0 "inside0" no management only 157.128.201.253 security 100
GigabitEthernet0/0 "inside1" no management only 157.128.202.252 security 100
same-security-traffic permit inter-interface is enabled.
So i need some further guidance how everything should be setup.
Do i need to use split tunneling? What acl's should i use?
What nat control should i use, if not when how inside* interfaces should access internet?
Thanks in advance.
Regards,
Thomas