<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks for the clarification. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879039#M153668</link>
    <description>&lt;P&gt;Thanks for the clarification. I hadn't seen that update.&lt;/P&gt;</description>
    <pubDate>Fri, 27 May 2016 10:40:52 GMT</pubDate>
    <dc:creator>Julian Regel</dc:creator>
    <dc:date>2016-05-27T10:40:52Z</dc:date>
    <item>
      <title>Access to management network</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879033#M153662</link>
      <description>&lt;P&gt;I have an ASA that is being used for AnyConnect VPN access. The ASA has three interfaces: inside, outside and management.&lt;BR /&gt;&lt;BR /&gt;The management interface is for:&lt;BR /&gt;&lt;BR /&gt;- administration through ASDM from a host on the management network&lt;BR /&gt;- syslog to a centralised log host on the management network&lt;BR /&gt;- snmp to a monitoring host on the management network&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;All network access to the management network is through a core ASA server on the network (not the AnyConnect VPN ASA). This acts as a single choke point into the management network.&lt;BR /&gt;&lt;BR /&gt;I want to grant access to the management network for AnyConnect VPN users, but I want that traffic to route through the core ASA and not straight out of the management interface.&lt;BR /&gt;&lt;BR /&gt;Is this possible? Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879033#M153662</guid>
      <dc:creator>Julian Regel</dc:creator>
      <dc:date>2019-03-12T07:46:43Z</dc:date>
    </item>
    <item>
      <title>Hi Julian,</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879034#M153663</link>
      <description>&lt;P&gt;Hi Julian,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The below link should help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/107596-asa-reverseroute.html&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/vpn_params.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH,&lt;/P&gt;
&lt;P&gt;Ab&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2016 13:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879034#M153663</guid>
      <dc:creator>Abhishek Purohit</dc:creator>
      <dc:date>2016-05-20T13:43:42Z</dc:date>
    </item>
    <item>
      <title>Since the management network</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879035#M153664</link>
      <description>&lt;P&gt;Since the management network is directly connected to the ASA, sending traffic to the core ASA is not possible as the AnyConnect ASA sees the network as directly connected and will prefer that route. &amp;nbsp;You would need to either implement an access server that you first jump to and then access the management network from there. Or, you can configure the AnyConnect ASA into multiple context mode with an Admin context and a second context with a name of your choice. &amp;nbsp;The admin context will host the management interface and all other interfaces will be on the second context. &amp;nbsp;Then configure routing to the management network to point to the core ASA.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 22 May 2016 07:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879035#M153664</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-05-22T07:40:23Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply.</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879036#M153665</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;I don't think you can run AnyConnect VPN in a context, so splitting isn't an option?&lt;/P&gt;
&lt;P&gt;I was hoping there was a way to separate routing for management plane traffic from data plane traffic, but it looks like this may not be possible.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2016 09:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879036#M153665</guid>
      <dc:creator>Julian Regel</dc:creator>
      <dc:date>2016-05-27T09:09:59Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply.</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879037#M153666</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;I've had a look at both links, but I can't see which bits are required to solve my issue. Please can you advise? Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2016 09:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879037#M153666</guid>
      <dc:creator>Julian Regel</dc:creator>
      <dc:date>2016-05-27T09:21:45Z</dc:date>
    </item>
    <item>
      <title>As of ASA version 9.5(2) you</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879038#M153667</link>
      <description>&lt;P&gt;As of ASA version 9.5(2) you can have AnyConnect in multiple context mode.&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html&lt;/A&gt;&lt;/P&gt;
&lt;TABLE border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD rowspan="1" colspan="2"&gt;
&lt;P class="pB1_Body1"&gt;&lt;B class="cBold"&gt;Remote Access Features&lt;/B&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-166855"&gt;&lt;/A&gt;Support for Remote Access VPN in multiple context mode&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-166857"&gt;&lt;/A&gt;&lt;EM class="Default-Paragraph-Font"&gt;You can now use the following remote access features in multiple context mode:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="pBu1_Bullet1"&gt;&lt;A name="pgfId-166858"&gt;&lt;/A&gt;&lt;EM class="Default-Paragraph-Font"&gt; AnyConnect 3.x and later (SSL VPN only; no IKEv2 support)&lt;/EM&gt;&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;&lt;A name="pgfId-166859"&gt;&lt;/A&gt;&lt;EM class="Default-Paragraph-Font"&gt; Centralized AnyConnect image configuration&lt;/EM&gt;&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;&lt;A name="pgfId-166860"&gt;&lt;/A&gt;&lt;EM class="Default-Paragraph-Font"&gt; AnyConnect image upgrade&lt;/EM&gt;&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;&lt;A name="pgfId-166861"&gt;&lt;/A&gt;&lt;EM class="Default-Paragraph-Font"&gt; Context Resource Management for AnyConnect connections&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="pN1_Note1"&gt;&lt;A name="pgfId-166862"&gt;&lt;/A&gt;&lt;B&gt;Note&lt;/B&gt;&lt;A href="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" class="show-image-alone" title="Related image, diagram or screenshot."&gt;&lt;IMG width="9" height="2" border="0" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" /&gt;&lt;/A&gt;: The AnyConnect Apex license is required for multiple context mode; you cannot use the default or legacy license.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-166863"&gt;&lt;/A&gt;We introduced the following commands: &lt;B class="cBold"&gt;limit-resource vpn anyconnect, limit-resource vpn burst anyconnect&lt;/B&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-166864"&gt;&lt;/A&gt;We modified the following screen: &lt;B class="cBold"&gt;Configuration &amp;gt; Context Management &amp;gt; Resource Class &amp;gt; Add Resource Class&lt;/B&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2016 10:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879038#M153667</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-05-27T10:21:51Z</dc:date>
    </item>
    <item>
      <title>Thanks for the clarification.</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879039#M153668</link>
      <description>&lt;P&gt;Thanks for the clarification. I hadn't seen that update.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2016 10:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879039#M153668</guid>
      <dc:creator>Julian Regel</dc:creator>
      <dc:date>2016-05-27T10:40:52Z</dc:date>
    </item>
    <item>
      <title>Please remember to more the</title>
      <link>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879040#M153669</link>
      <description>&lt;P&gt;Please remember to more the discussion as solved so we stop monitoring it.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 09:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-management-network/m-p/2879040#M153669</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-06-01T09:33:50Z</dc:date>
    </item>
  </channel>
</rss>

