This document provides step-by-step instructions on how to allow Cisco AnyConnect VPN client access to the Internet while they are tunneled into a Cisco Adaptive Security Appliance (ASA) 8.4(2). This configuration allows the client secure access to corporate resources via SSL while giving unsecured access to the Internet using split tunneling. This document will also give you information on how to use LDAP for user authentication.
This document requires a basic understanding of SSL protocol and LDAP. Ensure that you meet these requirements before you attempt this configuration:
ASA Security Appliance needs to run version 8.x
Cisco AnyConnect VPN Client 2.x or above.
Cisco 5500 Series ASA that runs software version 8.4(2)
Cisco AnyConnect SSL VPN Client version for Windows 2.5.6005
Hi Guys, One of our customer has the below requirement "PC should connect only to Corporate SSID . If CORP SSID is not in range then the PC should not connect to any other SSID" Can we do this with nam profiles.I don't think we can, b...
A customer has performed a security test/search in their network infrastructure, and the Room Kit unit was listed as a "SNMP vulnerability" in relation to MS02-006. Anyone know what this actually means, and if this is an issue that need to be resolve...
Hi AllI am trying to understand if it is possible to send password expiry notifications / reset password for RA VPN Users. The current setup uses 2FA as follows:1) User connects to FTD Outside Interface2) The FTD passes the request via RADIUS to ISE3...
Hi All,We are having the below license's in our environment Cisco ISE base 999 permanent Cisco ISE PlusCisco ISE ApexWe are using dot.1X, posture , profiling and BYOD.Apex and Plus licenses are going to expired soon can someone please expl...