View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

SEC0123 - SSL VPN AnyConnect Client Basic (Part 1)

Average: 5 (1 vote)
Difficulty Level: 
Lab Document: 
<Please login to see the content>
The video walks you through a basic setup of Cisco ASA AnyConnect client VPN that will serve as a foundation configuration of our subsequent labs. This includes supporting configuration such as routing, NAT, address pool, and default group-policy. We will have a working VPN setup that matches the traditional IPSec remote user VPN at the end of this lab.
Part 1 of this video goes over the basic configuration AnyConnect VPN
  • Basic AnyConnect VPN
  • IP Address Pool
  • ASA EIGRP Routing
  • ASA Twice NAT (Identity NAT)
  • Split-Tunnel ACL 
  • Group-Policy Configuration
  • Testing on Windows 7 and iPhone

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at, Metha enjoys learning and challenges himself with new technologies.



how we can close the default portal for the ASA outside interface IP and let it work with the tunnel elias name


can't access by https://ASA IP

but can Access https://ASA IP /sales


To our knowledge, there is no command available to achieve this. However, what you can do is to create a HTML page with not login box, upload it to the ASA, and assign it to the DefaultWeb Tunnel-Group so that way, when users land on the default page, they have no way to login.