09-27-2016 08:04 AM - edited 03-12-2019 01:19 AM
Hi
I have AnyConnect RA SSL VPN configured on ASA. Lets assume following Addresses:
Outside Interface IP where the Users Connect to: 172.16.10.1
Inside net: 10.10.10.0/24 with inside interface IP 10.10.10.1/24
VPN Pool: 192.168.10.0/24
So this pool is not attached to any interface. After the users connect and get their IP Addresses from this pool, I want to allow access to only 10.10.10.100 in the inside net. Also internet access must be allowed.
To which interface must my access-lists be attached?
Thanks and Regards,
R
09-27-2016 11:12 AM
Generally they belong to "outside".
However we don't apply an interface access list to make such a restriction - we use a vpn-filter. Please refer to this guide:
http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html
11-18-2016 08:11 AM
Thanks Marvin. That helped!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide