<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO ASA5506-X AnyConnect could not access from outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa5506-x-anyconnect-could-not-access-from-outside/m-p/4050201#M1068054</link>
    <description>Hi,&lt;BR /&gt;Is the ISP router configured to port forward SSL/TLS (tcp/443) and DTLS (udp/443) to the ASA's outside interface IP address? If not you will have to configure this.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
    <pubDate>Sun, 22 Mar 2020 22:17:04 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-03-22T22:17:04Z</dc:date>
    <item>
      <title>CISCO ASA5506-X AnyConnect could not access from outside</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5506-x-anyconnect-could-not-access-from-outside/m-p/4050191#M1068052</link>
      <description>&lt;P&gt;I am setting up Any Connect on an ASA-5506-X. &amp;nbsp; Our ISP provided a static IP address to its modem, and told us that if we connect ASA-5506-X to port#1 of the modem, the modem will be in pass-through mode that will not interfere with what we set up from ASA. &amp;nbsp;The outside inferface of ASA-5506-X got an IP address "192.168.0.2" from the ISP's modem. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set up AnyConnect via ASDM wizard, but I got the error message (see attached). &amp;nbsp; I tried to connect to AnyConnect from client' workstation by entering ISP's static IP address (&lt;A href="http://xx.xxx.xxx.xx" target="_blank" rel="noopener"&gt;http://xx.xxx.xxx.xx&lt;/A&gt;) but could not access the AnyConnect logon page. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Below is my ASA configuration after removing all public IP address. &amp;nbsp; &amp;nbsp;I hope you can help me out with this AnyConnect issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Serial Number:&amp;nbsp;&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(2)&lt;BR /&gt;!&lt;BR /&gt;hostname XXXX&lt;BR /&gt;enable password&amp;nbsp;&lt;BR /&gt;names&lt;BR /&gt;ip local pool Any-Connect 192.168.1.120-192.168.1.130 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet 192.168.1.50 255.255.255.255 inside_1&lt;BR /&gt;telnet 192.168.1.49 255.255.255.255 inside_1&lt;BR /&gt;telnet 192.168.1.48 255.255.255.255 inside_1&lt;BR /&gt;telnet 192.168.1.50 255.255.255.255 inside_2&lt;BR /&gt;telnet 192.168.1.49 255.255.255.255 inside_2&lt;BR /&gt;telnet 192.168.1.48 255.255.255.255 inside_2&lt;BR /&gt;telnet 192.168.1.50 255.255.255.255 inside_3&lt;BR /&gt;telnet 192.168.1.49 255.255.255.255 inside_3&lt;BR /&gt;telnet 192.168.1.48 255.255.255.255 inside_3&lt;BR /&gt;telnet 192.168.1.50 255.255.255.255 inside_4&lt;BR /&gt;telnet 192.168.1.49 255.255.255.255 inside_4&lt;BR /&gt;telnet 192.168.1.48 255.255.255.255 inside_4&lt;BR /&gt;telnet 192.168.1.50 255.255.255.255 inside_5&lt;BR /&gt;telnet 192.168.1.49 255.255.255.255 inside_5&lt;BR /&gt;telnet 192.168.1.48 255.255.255.255 inside_5&lt;BR /&gt;telnet 192.168.1.50 255.255.255.255 inside_6&lt;BR /&gt;telnet 192.168.1.49 255.255.255.255 inside_6&lt;BR /&gt;telnet 192.168.1.48 255.255.255.255 inside_6&lt;BR /&gt;telnet 192.168.1.50 255.255.255.255 inside_7&lt;BR /&gt;telnet 192.168.1.49 255.255.255.255 inside_7&lt;BR /&gt;telnet 192.168.1.48 255.255.255.255 inside_7&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.1.18 198.80.55.5&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.51-192.168.1.100 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.8.03036-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy GroupPolicy_Any-connect internal&lt;BR /&gt;group-policy GroupPolicy_Any-connect attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 192.168.1.18&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain none&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username olivia password $sha512$5000$JmMGT04rwICRpl+UcsCx9w==$V6CWBLv4wRg2LTGomvCSwg== pbkdf2&lt;BR /&gt;username admin password $sha512$5000$DW3jU9UqW05BG6yivW5Isw==$1zdMs4ae53W4/cQJdwSPMg== pbkdf2 privilege 15&lt;BR /&gt;tunnel-group Any-connect type remote-access&lt;BR /&gt;tunnel-group Any-connect general-attributes&lt;BR /&gt;address-pool Any-Connect&lt;BR /&gt;default-group-policy GroupPolicy_Any-connect&lt;BR /&gt;tunnel-group Any-connect webvpn-attributes&lt;BR /&gt;group-alias Any-connect enable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:ff18c8290b37dfad2d8d980835f9dc61&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 21:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5506-x-anyconnect-could-not-access-from-outside/m-p/4050191#M1068052</guid>
      <dc:creator>LorenzoYu12221</dc:creator>
      <dc:date>2020-03-22T21:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA5506-X AnyConnect could not access from outside</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5506-x-anyconnect-could-not-access-from-outside/m-p/4050201#M1068054</link>
      <description>Hi,&lt;BR /&gt;Is the ISP router configured to port forward SSL/TLS (tcp/443) and DTLS (udp/443) to the ASA's outside interface IP address? If not you will have to configure this.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sun, 22 Mar 2020 22:17:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5506-x-anyconnect-could-not-access-from-outside/m-p/4050201#M1068054</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-22T22:17:04Z</dc:date>
    </item>
  </channel>
</rss>

