08-28-2013 03:12 AM
Gents ......we have cisco 2800 series with static ip ........we have some remote users which connects to router over VPN ......client of uses windows VPN software......now client want to replace router with Asa 5512.......the remote access users uses email when they connect to the router .....I have few question does Asa support windows remote access client or do I have to purchase something ie software etc
A sample confit of Asa would be really helpful
Thanks
08-28-2013 03:59 AM
ASA supports l2tp over IPsec:
http://www.cisco.com/en/US/docs/security/asa/asa90/configuration/guide/vpn_l2tp_ipsec.html
08-28-2013 04:43 AM
Thanks Marcin
Just a quick question
Why would you use L2TP or PPTP with ASA or router what is different them using anyconnect or exyVPN
secondly is there any document which shows windows configuration i mean end to end configuration
my last question is in your doco its written
ASA 5512-X | • – Base license: 2 sessions. Optional permanent or time-based licenses: 10, 25, 50, 100, or 250 sessions. Optional Shared licenses2: Participant or Server. For the Server license, 500-50,000 in increments of 500 and 50,000-545,000 in increments of 1000. – • Base license: 250 sessions. |
The windows VPN comes under which cateogary
Thanks Heaps
08-28-2013 04:52 AM
PPTP is essentially (security-wise) dead.
http://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol#Security
L2TP is used to establish a Layer 2 pipe between devices.
What ASA adds here is layer of security (IPsec).
EZVPN is essentially our framework of creating remote access VPN - using pure IPsec.
Without added overhead (and a few limitations) of L2TP over IPsec.
There's a lot of examples for L2tp over IPsec, including this one:
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807213a7.shtml
(If you're starting with ASA, use ASDM's VPN configuration wizard).
In practice we recommend most people to run Anyconnect, which allows both SSL and IPsec (IKEv2) connectivity to both ASA and IOS devices.
08-28-2013 05:27 AM
Thankls Marcin
Excellent reply.........I will close this thread but just need one more clarification.....the above example of ASDM is excellent ....we have new ASA 5512X and in example you have old ASA with Server 2000......My question is that ASDM config is same in 5512X or its different.....secondly we have only one static IP which we will give it to outside interface.........do i need to do NAT as we will use 192.X IP;s
Thanks heaps
08-28-2013 06:20 AM
The new CLI (NAT, some crypto) is a bit different but ASDM remains similar.
You only need to use NAT if you're planning to hairpin traffic (and maybe add a NAT exclusion, depeneding on your setup).
Check config guide against your actual needed config ;-)
One note about the config -it's using MD5, but support for MD5 was removed (AFAIR) in Vista. Use SHA.
08-28-2013 04:39 PM
the local Pcs behind inside interface will have NAT as they are private addresses......secondly i need config for split tunelling....as i dont want my employee to use internet or in this case i cant use split tunneling
Thanks and that will end my thread :-)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide