View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

SEC0123 - SSL VPN AnyConnect Client Basic (Part 1)

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0
Lab Document: 
<Please login to see the content>
The video walks you through a basic setup of Cisco ASA AnyConnect client VPN that will serve as a foundation configuration of our subsequent labs. This includes supporting configuration such as routing, NAT, address pool, and default group-policy. We will have a working VPN setup that matches the traditional IPSec remote user VPN at the end of this lab.
 
Part 1 of this video goes over the basic configuration AnyConnect VPN
 
Topic:
  • Basic AnyConnect VPN
  • IP Address Pool
  • ASA EIGRP Routing
  • ASA Twice NAT (Identity NAT)
  • Split-Tunnel ACL 
  • Group-Policy Configuration
  • Testing on Windows 7 and iPhone

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at labminutes.com, Metha enjoys learning and challenges himself with new technologies.

2 comments

Hi

how we can close the default portal for the ASA outside interface IP and let it work with the tunnel elias name

ex

can't access by https://ASA IP

but can Access https://ASA IP /sales

thanks

To our knowledge, there is no command available to achieve this. However, what you can do is to create a HTML page with not login box, upload it to the ASA, and assign it to the DefaultWeb Tunnel-Group so that way, when users land on the default page, they have no way to login.

Poll

Vote for the Next Video Series