dardan:ccna_security:labs:configure_anyconnect_ssl_vpn_asa
## Configure the SSL VPN interface connection profile ##Specify the VPN encryption protocol. ##Specify the client image to upload to AnyConnect users ## Configure AAA local authentication ## Configure the client address assignment ## Configure the network name resolution ## Exempt address translation for VPN traffic ##Review the AnyConnect client deployment details ## Review the Summary screen and apply the configuration to the ASA ## Verify the AnyConnect client profile ip local pool Remote-Pool 192.168.1.100-192.168.1.125 mask 255.255.255.0 object network NETWORK_OBJ_192.168.1.96_27 subnet 192.168.1.96 255.255.255.224 webvpn tunnel-group-list enable anyconnect image disk0:/asdm-7101.bin 1 anyconnect enable username REMOTE-USER password ********** privilege 2 group-policy GroupPolicy_AnyConnect-SSL-VPN internal group-policy GroupPolicy_AnyConnect-SSL-VPN attributes vpn-tunnel-protocol ssl-client dns-server value 192.168.2.3 wins-server none default-domain value ccnacommunity.com exit tunnel-group AnyConnect-SSL-VPN type remote-access tunnel-group AnyConnect-SSL-VPN general-attributes default-group-policy GroupPolicy_AnyConnect-SSL-VPN address-pool Remote-Pool tunnel-group AnyConnect-SSL-VPN webvpn-attributes group-alias AnyConnect-SSL-VPN enable nat (IN,OUT) 1 source static any any destination static NETWORK_OBJ_192.168.1.96_27 NETWORK_OBJ_192.168.1.96_27 no-proxy-arp route-lookup ##Connecting to an AnyConnect SSL VPN ## Log in from the remote host. ex https://209.165.200.226/ ## Perform platform detection (if required). ## Install the AnyConnect VPN Client (if required). ##Establish an AnyConnect SSL VPN Connection ## Confirm VPN connectivity
dardan/ccna_security/labs/configure_anyconnect_ssl_vpn_asa.txt · Last modified: 2019/02/05 15:53 by dardan
