04-20-2016 08:34 PM - edited 03-12-2019 12:38 AM
Hi everyone,
I have seen one of our clients setup where they have cisco ASA with ssl anyconnect vpn.
on outside interface of vpn asa there is no acl.
Need to know how client traffic is coming from outside world to establish the vpn connections without any permit acl on outside interface?
Regards
Mahesh
Solved! Go to Solution.
04-20-2016 08:42 PM
Hi Mahesh,
The command "
Check this link:
http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html
Regards,
Aditya
please rate helpful posts and mark correct answers.
04-20-2016 09:10 PM
04-20-2016 08:42 PM
Hi Mahesh,
The command "
Check this link:
http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html
Regards,
Aditya
please rate helpful posts and mark correct answers.
04-20-2016 08:43 PM
Hi Mahesh,
You can check this config using the following command :
show run all
Regards,
Aditya
04-20-2016 09:05 PM
here is output
show run all sysopt
no sysopt connection timewait
sysopt connection tcpmss 1380
sysopt connection tcpmss minimum 0
sysopt connection permit-vpn********************************1
sysopt connection reclassify-vpn
no sysopt connection preserve-vpn-flows
no sysopt radius ignore-secret
no sysopt noproxyarp outside
no sysopt noproxyarp inside
no sysopt noproxyarp management
is the config 1 line will allow user vpn connections on outside interface without any acl?
Regards
MAhesh
04-20-2016 09:10 PM
Hi Mahesh,
Yes you are correct.
Regards,
Aditya
04-20-2016 09:15 PM
Many thanks Aditya.
Regards
Mahesh
04-20-2016 09:16 PM
Hi Mahesh,
Happy to help you. :)
Regards,
Aditya
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide