Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I would like to use LDAP and RSA (double authentication) for my SSL VPN clients. I can successfully authenticate users if my login page forces the users to enter a second username. If I have the configuration set so they only have to enter their us...
Andy,You should be able to use the CLI and modify the crypto map entry for this specific tunnel. So if the existing IP address is a.a.a.a and the new address is b.b.b.b, the command would be:crypto map crypto_map_name ## set peer a.a.a.a b.b.b.bYou ...
Steven,Have you watched the logs on the ASA to see if the ICMP echo even comes in from the router side of the tunnel?On a side note, I would recommend removing some of your less secure ISAKMP policies (130, 140, and 150). I would also remove the ISA...
Jason,Here is a link that you can refer to for some reference. http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080808395.shtmlAnd here are a few issues I see with your config...1. Basically, you will want to conf...
Kim,Yes, you can configure your ASA to support both AnyConnect and IPSec VPN connections concurrently. In short, for the IPSec configuration, you will need to configure at least one ISAKMP policy, an IPSEC transform set, a crypto map, tunnel group, ...
Joe,The following should get the job done.access-list VPN-POOL standard permit 172.16.241.0 255.255.255.0access-list VPN-POOL standard permit 172.16.242.0 255.255.255.0no nat (outside) 0 access-list internet-access nat (outside) 20 access-list VPN-PO...