Conclusion of CISCO ASA configuration SSL VPN steps in SPOTO CCIE
Conclusion of CISCO ASA configuration SSL VPN steps in SPOTO CCIE
CISCO ASA is the most mainstream firewall in the world currently. So how should we configure this kind of firewall? This problem has stumped many people. Today I will teach you how to configure CISCO ASA's SSL VPN in SPOTO CCIE.
CISCO ASA Configure SSL VPN Steps in SPOTO CCIE :
ip local pool vpnpool 192.168.100.200-192.168.100.254 mask 255.255.255.0 webvpn
enable outside
svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1
tunnel-group-list enable
svc enable
access-list split-tunnel remark Internet
access-list split-tunnel standard permit host x.x.x.x (Public network IP )
group-policy clientgroup internal
group-policy clientgroup attributes
vpn-tunnel-protocol webvpn
split-tunnel-policy tunnelspecified
split-tunnel-network-list value split-tunnel
webvpn
svc keep-installer installed
svc re key time 30
svc re key method ssl
username ssluser1 password ssluser1
aaa local authentication attempts max-fail 16
tunnel-group sslgroup type remote-access
tunnel-group sslgroup general-attributes
address-pool vpnpool
default-group-policy clientgroup
tunnel-group sslgroup webvpn-attributes
group-alias sslgroup_users enable
global ( outside) 101 interface
nat (inside) 101 0.0.0.0 0.0.0.0 route outside 0.0.0.0 0.0.0.0 Public network gateway
More Cisco technical articles are available at SPOTO CLUB, which not only allows you to learn Cisco work skills but also helps you pass various CISCO exams, such as CCIE WRITTEN EXAM and CCIE LAB EXAM!
More you may be interested:
Summary of two Cisco S4500 switch configurations
Stable SPOTO CCIE RS LAB(TS2, Diag2+, LAB3)
Try many times, final pass the CCIE RS!
- Tags:
- CISCO ASA
- SSL VPN
- SPOTO CCIE