cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
391
Views
0
Helpful
2
Replies

vpn clients need to use ASA public IP

donaghq_2
Level 1
Level 1

Hello

I am using an ASA5510 running version 8.04

I have a requirement for vpn clients to terminate on the ASA (come in the outside interface) and to then use the public IP address of the ASA to access certain websites (go back out the same interface they came in). Is this possible?

What I would ultimately like to achieve is to have the vpn clients access certain websites through the ASA and the rest of the web through their own internet connection (split tunnelling). Would this be possibe in this scenario.

Thanks for your help.

1 Accepted Solution

Accepted Solutions

acomiskey
Level 10
Level 10

If vpn clients are 192.168.1.0/24 then...

global (outside) 1 interface

nat (outside) 1 192.168.1.0 255.255.255.0

same-security-traffic permit intra-interface

Then simply create your split tunnel acl and include all sites you want them to access through the remote ASA.

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805734ae.shtml

View solution in original post

2 Replies 2

acomiskey
Level 10
Level 10

If vpn clients are 192.168.1.0/24 then...

global (outside) 1 interface

nat (outside) 1 192.168.1.0 255.255.255.0

same-security-traffic permit intra-interface

Then simply create your split tunnel acl and include all sites you want them to access through the remote ASA.

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805734ae.shtml

implemented this in production - works well. just do the same setup as you would for any remote access and use the commands given above.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card