<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567138#M1088069</link>
    <description>&lt;P&gt;Yes we have two outside interfaces one named outside and the other anyconnect.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Mar 2022 15:07:24 GMT</pubDate>
    <dc:creator>chris.bias</dc:creator>
    <dc:date>2022-03-09T15:07:24Z</dc:date>
    <item>
      <title>Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567103#M1088065</link>
      <description>&lt;P&gt;I have a Cisco ASA 5516-X with a new interface that I am setting up for Cisco AnyConnect. I have gone through the AnyConnect VPN Wizard but I am not able to get to the IP address that I have configured (12.190.109.100) from outside but I can ping it from the ASA CLI. I don't believe it is a firewall issue but any advice would be great.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 14:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567103#M1088065</guid>
      <dc:creator>chris.bias</dc:creator>
      <dc:date>2022-03-09T14:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567110#M1088066</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1259946"&gt;@chris.bias&lt;/a&gt;so you've configured a new outside interface? Does that mean you have multiple outside interfaces?&lt;/P&gt;
&lt;P&gt;Can you provide the running configuration please, it will make it easier to identify the issue.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 14:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567110#M1088066</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T14:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567138#M1088069</link>
      <description>&lt;P&gt;Yes we have two outside interfaces one named outside and the other anyconnect.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567138#M1088069</guid>
      <dc:creator>chris.bias</dc:creator>
      <dc:date>2022-03-09T15:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567140#M1088070</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1259946"&gt;@chris.bias&lt;/a&gt; your default route is via the interface Gig1/1 (outside), so return traffic will go out that interface. You'd have to enable VPN on that outside interface.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567140#M1088070</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T15:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567145#M1088071</link>
      <description>&lt;P&gt;When I try to enable it on the outside interface it gives me this error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[OK] webvpn&lt;BR /&gt;webvpn&lt;BR /&gt;[ERROR] enable outside&lt;BR /&gt;Port 443 on outside can not be configured due to conflict&lt;/P&gt;&lt;P&gt;[OK] no enable anyconnect&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567145#M1088071</guid>
      <dc:creator>chris.bias</dc:creator>
      <dc:date>2022-03-09T15:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567150#M1088072</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1259946"&gt;@chris.bias&lt;/a&gt; you've got a static NAT for tcp/443 on that outside interface, so you cannot enable RAVPN on tcp/443 when that NAT is configured. Change the NAT from the interface IP address to a dedicated NAT ip address.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567150#M1088072</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T15:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567179#M1088073</link>
      <description>&lt;P&gt;I apologize this is where I am new to ASA configs but how would I go about that? This is a production system so I want to be careful not to take down other centers.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567179#M1088073</guid>
      <dc:creator>chris.bias</dc:creator>
      <dc:date>2022-03-09T15:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567186#M1088074</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1259946"&gt;@chris.bias&lt;/a&gt; well you will have to plan this change, as obviously the clients will have to connect to a different public IP address instead of the ASA's outside interface IP address. Hopefully the users connect to an FQDN, so you can just change the DNS entry?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example NAT rule below using a spare public IP address. Replace the private and public IP addresses to match your environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network WEBSVR&lt;BR /&gt; host 172.16.1.1&lt;BR /&gt; nat (INSIDE,OUTSIDE) static 1.2.3.4 service tcp 443 443&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567186#M1088074</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T15:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567197#M1088076</link>
      <description>&lt;P&gt;Right now this is used to connect other sites using the site to site vpn so they use the inside IP address and use a IKEv key that connects to a Sonicwall device.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567197#M1088076</guid>
      <dc:creator>chris.bias</dc:creator>
      <dc:date>2022-03-09T15:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567205#M1088077</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1259946"&gt;@chris.bias&lt;/a&gt; I don't understand your last comment. tcp/443 isn't going to be used for S2S VPN. In short if you want to enable AnyConnect RAVPN on your ASA, it has to be on an outside interface. For you to do that, you have to remove your NAT rule, as it's translating https behind the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network int_zvm_443&lt;BR /&gt;&amp;nbsp;nat (inside,&lt;STRONG&gt;outside&lt;/STRONG&gt;) static &lt;STRONG&gt;interface&lt;/STRONG&gt; service tcp &lt;STRONG&gt;https https&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 15:57:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567205#M1088077</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T15:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567288#M1088087</link>
      <description>&lt;P&gt;It appears that one NAT is using that interface and we would lose another system.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 17:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567288#M1088087</guid>
      <dc:creator>chris.bias</dc:creator>
      <dc:date>2022-03-09T17:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567294#M1088088</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1259946"&gt;@chris.bias&lt;/a&gt; correct, that has been what I've been saying. &lt;/P&gt;
&lt;P&gt;If you cannot change that system, then consider using IKEv2/IPSec VPN instead of SSL-VPN or enable SSL VPN on a port other than tcp/443.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 17:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567294#M1088088</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T17:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567313#M1088093</link>
      <description>&lt;P&gt;Okay so I changed the port on the SSL VPN and everything looks like it is working now. Just need to get it working with LDAP to communicate with our AD system.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 17:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567313#M1088093</guid>
      <dc:creator>chris.bias</dc:creator>
      <dc:date>2022-03-09T17:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567317#M1088094</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1259946"&gt;@chris.bias&lt;/a&gt; ok, refer to &lt;A href="https://integratingit.wordpress.com/2020/04/03/asa-remote-access-vpn-using-ldap/" target="_self"&gt;this&lt;/A&gt; guide to setup RAVPN with LDAP.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 17:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4567317#M1088094</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-09T17:58:36Z</dc:date>
    </item>
  </channel>
</rss>

