cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
514
Views
0
Helpful
4
Replies

Any Connect Via ASDM

Joshuabowers
Level 1
Level 1

When I tried to configure anyconnect via asdm wizard it asked for a IP Pool.

Does the ip pool correspond with a actual asa interface network like the inside interface or is it a separate pool of ips that have to be on a different network that doesn't exist on any of the interfaces..

1 Accepted Solution

Accepted Solutions

Hi,

Once the VPN client connects to ASA, it will tunnel all traffic between the client and ASA. In case you enable split tunneling, you can exclude subnets which shouldn't go over the VPN tunnel including intranet subnets. Also, you have an option to enable local LAN access which overcomes this problem.

Also, you don't need an ACL on outside interface to allow access to ASA AnyConnect Server

View solution in original post

4 Replies 4

Rahul Govindan
VIP Alumni
VIP Alumni

You can have it both ways, not necessary to have a separate network. I would recommend a separate network, so that access and NAT policies can be differentiated for your internal networks and VPN pool.

In the Asdm wizard it doesn't ask to program a default gateway. How does the vpn client know how to talk to other devices in the intranetwork. I like the idea of a separate subnet for the vpn pool.

for the outside interface would I just make a any source , outside interface ip = port 443 acl 

The client will get routes for the subnets you configure for access via the VPN once the tunnel is activated.

The traffic exiting the ASA at the other end will use the ASA's routing table.

If you use a pool other than the same subnet that the ASA inside interface is in, be sure that the remote networks know to use the ASA as the route for those pool addresses. (moot point if the ASA is the default gateway)

Hi,

Once the VPN client connects to ASA, it will tunnel all traffic between the client and ASA. In case you enable split tunneling, you can exclude subnets which shouldn't go over the VPN tunnel including intranet subnets. Also, you have an option to enable local LAN access which overcomes this problem.

Also, you don't need an ACL on outside interface to allow access to ASA AnyConnect Server