<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks yep I ended up using in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-through-vpn/m-p/2986537#M156802</link>
    <description>&lt;P&gt;Thanks yep I ended up using the Inside interface on the asa to pass the traffic through and that worked fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For anyone else reading this, the management-only command will indeed allow you to connect to it directly, but it will not allow transient traffic through.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Aug 2016 22:17:49 GMT</pubDate>
    <dc:creator>ryancisco01</dc:creator>
    <dc:date>2016-08-17T22:17:49Z</dc:date>
    <item>
      <title>Remote access through VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-through-vpn/m-p/2986535#M156774</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cisco ASA 9.1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Have created a new vpn tunnel solely for management purposes of network devices. there are 3 interfaces on the ASA&lt;/P&gt;
&lt;P&gt;outside&lt;/P&gt;
&lt;P&gt;Inside&lt;/P&gt;
&lt;P&gt;Management&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;there are devices that connect off the Inside Interface and I can connect to them just fine.&lt;/P&gt;
&lt;P&gt;I canot however connect to the ASA itself on the management interface or another device which is on the management interface (same subnet)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The SA shows packets are being decrypted, however packet capture on the management interface shows no traffic leaving the interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am aware of the "route lookup" command, however I am not running any nat on the firewall, i even tried adding&amp;nbsp;a no nat anyway but it did not make a difference.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is config snippet:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ssh 192.168.1.0 255.255.255.0 management&lt;BR /&gt;management-access management&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface Management0/0&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address&amp;nbsp;10.0.0.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There is no acl on the outside interface or management interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As I say the access to the Inside network works fine, I suspect, is it possible "management-only" command will not route traffic out? I have never used this command before so I am not sure what it does and it seems to affect access to devices via this interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-through-vpn/m-p/2986535#M156774</guid>
      <dc:creator>ryancisco01</dc:creator>
      <dc:date>2019-03-12T08:07:58Z</dc:date>
    </item>
    <item>
      <title>@ryancisco01,</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-through-vpn/m-p/2986536#M156788</link>
      <description>&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;A href="https://supportforums.cisco.com/users/ryancisco01"&gt;ryancisco01&lt;/A&gt;,&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Thanks for your post. If you connect a laptop directly to the management interface an statically assign it an IP address in the same subnet are you able to connect?&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;You are correct that for security purposes, the "management-only" command will not allow that interface to pass through any traffic. If you remove this, VPN peers should be able to access devices on that LAN providing the rest of your configuration is correct.&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;For your requirements, I'd suggest removing this command and testing again. Let me know how you get along.&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Kind regards,&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Luke&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;Please rate helpful posts and mark correct answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2016 11:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-through-vpn/m-p/2986536#M156788</guid>
      <dc:creator>Luke Oxley</dc:creator>
      <dc:date>2016-08-17T11:23:43Z</dc:date>
    </item>
    <item>
      <title>Thanks yep I ended up using</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-through-vpn/m-p/2986537#M156802</link>
      <description>&lt;P&gt;Thanks yep I ended up using the Inside interface on the asa to pass the traffic through and that worked fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For anyone else reading this, the management-only command will indeed allow you to connect to it directly, but it will not allow transient traffic through.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2016 22:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-through-vpn/m-p/2986537#M156802</guid>
      <dc:creator>ryancisco01</dc:creator>
      <dc:date>2016-08-17T22:17:49Z</dc:date>
    </item>
  </channel>
</rss>

