We want to configure Cisco's anyconnect service to offer around 50 VPN employees to connect to our offices. The problem with what you can see in the topology is that employees must point to one of our Public IP's to link to our datacenter. The question is, if the ASA is below in the topology that I show you, how to configure properly so that users can connect correctly via VPN?
Not a perfect setup for the ASA ... I would set it up AnyConnect VPN the following way:
Thank you, to be clear, for router 1 is this enough configuration to implement this?:
description Outside interface
ip address 188.8.131.52 255.255.255.248
ip nat outside
description Inside interface
ip address 192.168.23.2 255.255.255.248
ip nat inside
ip nat inside source static esp 192.168.23.10 interface gigabitEthernet 0/0
ip route 0.0.0.0 0.0.0.0 184.108.40.206
ip nat inside source list 1 interface GigabitEthernet0/0 overload
You configuration implies that you don't have a dedicated IP for this? Then the forwarding depends on the ASA config:
i don't dedicated Public IP Address, it's the same for the internet traffic of my company.
Not perfect but it will work. Just do a NAT/PAT for the ports as mentioned.